Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Hands Off My Docker Containers: Dynamic Java Instrumentation in Three Easy Steps

Instrumenting your application with an APM tool is not always easy. Configuration is often complicated, and managing agent files can be daunting. AppDynamics has developed a three-step solution for automating Java agent deployment and infrastructure monitoring in a Docker environment.

How to identify malicious IP activity using Falco

One of the most common security use cases, is the ability to identify connections generated by malicious actors, or internal components connecting to suspicious servers (e.g malware C&Cs). In this post, we will show how to leverage the Falco engine, to identify connections made to IPs that were flagged by multiple security sensors, and are streamed as a feed to the Falco engine.

Using Terraform for container security as code with Sysdig Secure

In the following tutorial you can learn how to implement container security as code. You probably have a CI/CD pipeline to automatically rebuild your container images. What if you could define your container security as code, push it into a Git repository to version control changes and then enforce your policy in your container orchestration tool like Docker or Kubernetes using Sysdig Secure?

Why Containers and Kubernetes are Dominating the AWS re:Invent Conversation

Technologists from across the country and around the world are flocking to Las Vegas this week for AWS re:Invent. The tens of thousands of expected attendees may come from various backgrounds and industries, but there’s a common topic on the top of everyone’s mind: Kubernetes.

Monitoring Java in Docker: Overcoming past limitations

Before the release of Java 9 and 10, there were several limitations to deploying and monitoring Java in Docker. This post explores how the latest versions of Java address the most common of these limitations, and includes examples of how to make the most of monitoring Java in Docker.

Dynamic DNS & Falco: detecting unexpected network activity

Since the inception of Falco, we’ve seen users write custom rules covering a number of different use cases. Because Falco is behavioral monitoring with a syntax that leverages system calls, you can write a rule for just about anything: opening a file, becoming root, or making a network connection.