Operations | Monitoring | ITSM | DevOps | Cloud

Automated Falco rule tuning

We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On one side, they allow you to get started right away. On the other, it can take many working hours to learn the technology, configuration, and syntax to be able to customize the rules to fit your applications. Falco’s default security rules are no different.

Gremlin ALFI Demo - AWS RDS Unavailable - Chaos Engineering

In this demo, we'll share how you can use ALFI (Application Level Failure Injection) to make AWS RDS unavailable. This enables you to learn how your application handles different failure modes. We'll be using the ALFI Latency attack to perform this Chaos Engineering experiment.

DORA Metrics Explained

DORA metrics, also known as Accelerate metrics, are universally lauded as good metrics for tracking Engineering team productivity and software delivery performance. Learn the whats and whys of the four DORA metrics: Deployment Frequency, Change Lead Time, Change Failure Rate and Mean Time to Recovery, and how to use them the right way. LINKS SLEUTH A deploy-based Accelerate Metrics tracker both managers and developers love.

20 Best Software Development Tools in 2021

With the increase in popularity and adoption of software development across the industry, developers and organizations are constantly looking for tools to make their lives easier. The right set of tools can quickly help you get the maximum output each day, but the road to finding your arsenal of the best software development tools is not easy. That’s why we researched for you!

CVE-2021-31440: Kubernetes container escape using eBPF

In a recent post by ZDI, researchers found an out-of-bounds access flaw (CVE-2021-31440) in the Linux kernel’s (5.11.15) implementation of the eBPF code verifier: an incorrect register bounds calculation occurs while checking unsigned 32-bit instructions in an eBPF program. The flaw can be leveraged to escalate privileges and execute arbitrary code in the context of the kernel.