ºÝºÝߣshows by User: Sysdig / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Sysdig / Wed, 30 Jan 2019 14:24:04 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Sysdig Wordpress y Docker, de desarrollo a produccion /slideshow/wordpress-y-docker-de-desarrollo-a-produccion/129846227 wordcampzaragoza-190130142404
Docker esta revolucionando cómo desplegamos nuestras aplicaciones. Desde el entorno de desarrollo hasta la puesta en producción. Veremos las ventajas que nos aporta Docker para el desarrollo en WordPress, las herramientas y procesos desde el punto de vista de un desarrollador. A la hora de mover nuestra aplicación WordPress a producción, presentaremos los retos que presenta y las ventajas que aportan herramientas de orquestación como Kubernetes. Tanto si eres un desarrollador como si también tienes que gestionar los sistemas que alojan tu WordPress, saldrás de esta charla queriendo poner todos tus WordPress en contenedores.]]>

Docker esta revolucionando cómo desplegamos nuestras aplicaciones. Desde el entorno de desarrollo hasta la puesta en producción. Veremos las ventajas que nos aporta Docker para el desarrollo en WordPress, las herramientas y procesos desde el punto de vista de un desarrollador. A la hora de mover nuestra aplicación WordPress a producción, presentaremos los retos que presenta y las ventajas que aportan herramientas de orquestación como Kubernetes. Tanto si eres un desarrollador como si también tienes que gestionar los sistemas que alojan tu WordPress, saldrás de esta charla queriendo poner todos tus WordPress en contenedores.]]>
Wed, 30 Jan 2019 14:24:04 GMT /slideshow/wordpress-y-docker-de-desarrollo-a-produccion/129846227 Sysdig@slideshare.net(Sysdig) Wordpress y Docker, de desarrollo a produccion Sysdig Docker esta revolucionando cómo desplegamos nuestras aplicaciones. Desde el entorno de desarrollo hasta la puesta en producción. Veremos las ventajas que nos aporta Docker para el desarrollo en WordPress, las herramientas y procesos desde el punto de vista de un desarrollador. A la hora de mover nuestra aplicación WordPress a producción, presentaremos los retos que presenta y las ventajas que aportan herramientas de orquestación como Kubernetes. Tanto si eres un desarrollador como si también tienes que gestionar los sistemas que alojan tu WordPress, saldrás de esta charla queriendo poner todos tus WordPress en contenedores. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wordcampzaragoza-190130142404-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Docker esta revolucionando cómo desplegamos nuestras aplicaciones. Desde el entorno de desarrollo hasta la puesta en producción. Veremos las ventajas que nos aporta Docker para el desarrollo en WordPress, las herramientas y procesos desde el punto de vista de un desarrollador. A la hora de mover nuestra aplicación WordPress a producción, presentaremos los retos que presenta y las ventajas que aportan herramientas de orquestación como Kubernetes. Tanto si eres un desarrollador como si también tienes que gestionar los sistemas que alojan tu WordPress, saldrás de esta charla queriendo poner todos tus WordPress en contenedores.
Wordpress y Docker, de desarrollo a produccion from Sysdig
]]>
1508 1 https://cdn.slidesharecdn.com/ss_thumbnails/wordcampzaragoza-190130142404-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What Prometheus means for monitoring vendors /slideshow/what-prometheus-means-for-monitoring-vendors/112245696 whatprometheusmeansformonitoringvendors-180830101757
Sysdig presentation at PromCon 2018 by Jorge Salamero @bencerillo Users have been looking for a better understanding of how Prometheus monitoring and other commercial monitoring tools compare and contrast when it comes to Docker and Kubernetes monitoring. Are they enemies? Lovers? Twins separated at birth? Let's go there. This talk will discuss the Prometheus ecosystem from a vendor perspective.]]>

Sysdig presentation at PromCon 2018 by Jorge Salamero @bencerillo Users have been looking for a better understanding of how Prometheus monitoring and other commercial monitoring tools compare and contrast when it comes to Docker and Kubernetes monitoring. Are they enemies? Lovers? Twins separated at birth? Let's go there. This talk will discuss the Prometheus ecosystem from a vendor perspective.]]>
Thu, 30 Aug 2018 10:17:57 GMT /slideshow/what-prometheus-means-for-monitoring-vendors/112245696 Sysdig@slideshare.net(Sysdig) What Prometheus means for monitoring vendors Sysdig Sysdig presentation at PromCon 2018 by Jorge Salamero @bencerillo Users have been looking for a better understanding of how Prometheus monitoring and other commercial monitoring tools compare and contrast when it comes to Docker and Kubernetes monitoring. Are they enemies? Lovers? Twins separated at birth? Let's go there. This talk will discuss the Prometheus ecosystem from a vendor perspective. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whatprometheusmeansformonitoringvendors-180830101757-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sysdig presentation at PromCon 2018 by Jorge Salamero @bencerillo Users have been looking for a better understanding of how Prometheus monitoring and other commercial monitoring tools compare and contrast when it comes to Docker and Kubernetes monitoring. Are they enemies? Lovers? Twins separated at birth? Let&#39;s go there. This talk will discuss the Prometheus ecosystem from a vendor perspective.
What Prometheus means for monitoring vendors from Sysdig
]]>
640 6 https://cdn.slidesharecdn.com/ss_thumbnails/whatprometheusmeansformonitoringvendors-180830101757-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
15 kubernetes failure points you should watch /slideshow/15-kubernetes-failure-points-you-should-watch/103353884 15kubernetesfailurepointsyoushouldwatch-180627225140
When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From monitoring solution agnostic perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).]]>

When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From monitoring solution agnostic perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).]]>
Wed, 27 Jun 2018 22:51:40 GMT /slideshow/15-kubernetes-failure-points-you-should-watch/103353884 Sysdig@slideshare.net(Sysdig) 15 kubernetes failure points you should watch Sysdig When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From monitoring solution agnostic perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/15kubernetesfailurepointsyoushouldwatch-180627225140-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From monitoring solution agnostic perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
15 kubernetes failure points you should watch from Sysdig
]]>
6048 5 https://cdn.slidesharecdn.com/ss_thumbnails/15kubernetesfailurepointsyoushouldwatch-180627225140-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Docker Runtime Security /slideshow/docker-runtime-security/103195540 dockerruntimesecurityfalco-180626212809
While there have been many improvements around securing containers, there is still a large gap in monitoring the behaviour of containers in production. Sysdig Falco is an open source behavioural activity monitor for containerized environments. Sysdig Falco can detect and alert on anomalous behaviour at the application, file, system, and network level. In this session get a deep dive into Falco: How does behavioural security differ from existing security solutions like image scanning, seccomp, SELinux or AppArmor? What can Sysdig Falco detect? Building and customizing rules for your Docker and Kubernetes apps. Forensics analysis with Sysdig Inspect even when the container doesn't exist anymore! Read more on: https://sysdig.com/blog/docker-runtime-security/ https://sysdig.com/blog/runtime-security-kubernetes-sysdig-falco/]]>

While there have been many improvements around securing containers, there is still a large gap in monitoring the behaviour of containers in production. Sysdig Falco is an open source behavioural activity monitor for containerized environments. Sysdig Falco can detect and alert on anomalous behaviour at the application, file, system, and network level. In this session get a deep dive into Falco: How does behavioural security differ from existing security solutions like image scanning, seccomp, SELinux or AppArmor? What can Sysdig Falco detect? Building and customizing rules for your Docker and Kubernetes apps. Forensics analysis with Sysdig Inspect even when the container doesn't exist anymore! Read more on: https://sysdig.com/blog/docker-runtime-security/ https://sysdig.com/blog/runtime-security-kubernetes-sysdig-falco/]]>
Tue, 26 Jun 2018 21:28:09 GMT /slideshow/docker-runtime-security/103195540 Sysdig@slideshare.net(Sysdig) Docker Runtime Security Sysdig While there have been many improvements around securing containers, there is still a large gap in monitoring the behaviour of containers in production. Sysdig Falco is an open source behavioural activity monitor for containerized environments. Sysdig Falco can detect and alert on anomalous behaviour at the application, file, system, and network level. In this session get a deep dive into Falco: How does behavioural security differ from existing security solutions like image scanning, seccomp, SELinux or AppArmor? What can Sysdig Falco detect? Building and customizing rules for your Docker and Kubernetes apps. Forensics analysis with Sysdig Inspect even when the container doesn't exist anymore! Read more on: https://sysdig.com/blog/docker-runtime-security/ https://sysdig.com/blog/runtime-security-kubernetes-sysdig-falco/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dockerruntimesecurityfalco-180626212809-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While there have been many improvements around securing containers, there is still a large gap in monitoring the behaviour of containers in production. Sysdig Falco is an open source behavioural activity monitor for containerized environments. Sysdig Falco can detect and alert on anomalous behaviour at the application, file, system, and network level. In this session get a deep dive into Falco: How does behavioural security differ from existing security solutions like image scanning, seccomp, SELinux or AppArmor? What can Sysdig Falco detect? Building and customizing rules for your Docker and Kubernetes apps. Forensics analysis with Sysdig Inspect even when the container doesn&#39;t exist anymore! Read more on: https://sysdig.com/blog/docker-runtime-security/ https://sysdig.com/blog/runtime-security-kubernetes-sysdig-falco/
Docker Runtime Security from Sysdig
]]>
749 6 https://cdn.slidesharecdn.com/ss_thumbnails/dockerruntimesecurityfalco-180626212809-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CI / CD / CS - Continuous Security in Kubernetes /slideshow/ci-cd-cs-continuous-security-in-kubernetes/103194091 cicdcscontinuoussecurityonkubernetes-180626211555
Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great at reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How can we prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process?]]>

Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great at reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How can we prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process?]]>
Tue, 26 Jun 2018 21:15:55 GMT /slideshow/ci-cd-cs-continuous-security-in-kubernetes/103194091 Sysdig@slideshare.net(Sysdig) CI / CD / CS - Continuous Security in Kubernetes Sysdig Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great at reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How can we prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cicdcscontinuoussecurityonkubernetes-180626211555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great at reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How can we prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process?
CI / CD / CS - Continuous Security in Kubernetes from Sysdig
]]>
1237 2 https://cdn.slidesharecdn.com/ss_thumbnails/cicdcscontinuoussecurityonkubernetes-180626211555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Continuous Security /slideshow/continuous-security-97859916/97859916 ci2fcd2fcs-180521112810
Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How we can prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process? ]]>

Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How we can prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process? ]]>
Mon, 21 May 2018 11:28:10 GMT /slideshow/continuous-security-97859916/97859916 Sysdig@slideshare.net(Sysdig) Continuous Security Sysdig Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How we can prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ci2fcd2fcs-180521112810-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Continuous Delivery helps to keep your software and Docker images updated and deploy new versions in production easily. Microservices are great reducing the attack vector and limiting the privileges or credentials access of each piece of your application. Containers provide an opportunity to implement better security, small, immutable, single process and purpose. In this session, we will discover real use case examples on how to make your CI/CD pipeline interact with Docker security tools. But security doesn’t stop where your deployment pipeline ends. How we can prepare for 0-days and policy violations that happen at run-time? Can we make it part of the CI/CD process?
Continuous Security from Sysdig
]]>
344 3 https://cdn.slidesharecdn.com/ss_thumbnails/ci2fcd2fcs-180521112810-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The top 5 Kubernetes metrics to monitor /slideshow/the-top-5-kubernetes-metrics-to-monitor-80194802/80194802 thetop5kubernetesmetricstomonitor-ccwfs-170926232425
The Top 5 Kubernetes metrics to monitor]]>

The Top 5 Kubernetes metrics to monitor]]>
Tue, 26 Sep 2017 23:24:25 GMT /slideshow/the-top-5-kubernetes-metrics-to-monitor-80194802/80194802 Sysdig@slideshare.net(Sysdig) The top 5 Kubernetes metrics to monitor Sysdig The Top 5 Kubernetes metrics to monitor <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thetop5kubernetesmetricstomonitor-ccwfs-170926232425-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Top 5 Kubernetes metrics to monitor
The top 5 Kubernetes metrics to monitor from Sysdig
]]>
1010 3 https://cdn.slidesharecdn.com/ss_thumbnails/thetop5kubernetesmetricstomonitor-ccwfs-170926232425-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The top 5 Kubernetes metrics to monitor /slideshow/the-top-5-kubernetes-metrics-to-monitor/73804837 thetop5kubernetesmetricstomonitor-final-170328172926
How to Monitor Kubernetes, the 5 layers that really matter]]>

How to Monitor Kubernetes, the 5 layers that really matter]]>
Tue, 28 Mar 2017 17:29:26 GMT /slideshow/the-top-5-kubernetes-metrics-to-monitor/73804837 Sysdig@slideshare.net(Sysdig) The top 5 Kubernetes metrics to monitor Sysdig How to Monitor Kubernetes, the 5 layers that really matter <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thetop5kubernetesmetricstomonitor-final-170328172926-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to Monitor Kubernetes, the 5 layers that really matter
The top 5 Kubernetes metrics to monitor from Sysdig
]]>
4873 6 https://cdn.slidesharecdn.com/ss_thumbnails/thetop5kubernetesmetricstomonitor-final-170328172926-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Behavioural activity monitoring on CoreOS with Sysdig Falco /slideshow/behavioural-activity-monitoring-on-coreos-with-sysdig-falco/72684788 behaviouralactivitymonitoringoncoreoswithsysdigfalco-170301073901
Complimentary to CoreOS Clair, Sysdig Falco analyses running containers for unexpected behavior detecting unknown vulnerabilities]]>

Complimentary to CoreOS Clair, Sysdig Falco analyses running containers for unexpected behavior detecting unknown vulnerabilities]]>
Wed, 01 Mar 2017 07:39:01 GMT /slideshow/behavioural-activity-monitoring-on-coreos-with-sysdig-falco/72684788 Sysdig@slideshare.net(Sysdig) Behavioural activity monitoring on CoreOS with Sysdig Falco Sysdig Complimentary to CoreOS Clair, Sysdig Falco analyses running containers for unexpected behavior detecting unknown vulnerabilities <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/behaviouralactivitymonitoringoncoreoswithsysdigfalco-170301073901-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Complimentary to CoreOS Clair, Sysdig Falco analyses running containers for unexpected behavior detecting unknown vulnerabilities
Behavioural activity monitoring on CoreOS with Sysdig Falco from Sysdig
]]>
1038 6 https://cdn.slidesharecdn.com/ss_thumbnails/behaviouralactivitymonitoringoncoreoswithsysdigfalco-170301073901-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Monitor Microservices /slideshow/how-to-monitor-microservices/72412134 howtomonitormicroservices-170221135820
How to Monitor Microservices running in Docker, Kubernetes, Openshift, DC/OS Mesos or any other container orchestration platform.]]>

How to Monitor Microservices running in Docker, Kubernetes, Openshift, DC/OS Mesos or any other container orchestration platform.]]>
Tue, 21 Feb 2017 13:58:20 GMT /slideshow/how-to-monitor-microservices/72412134 Sysdig@slideshare.net(Sysdig) How to Monitor Microservices Sysdig How to Monitor Microservices running in Docker, Kubernetes, Openshift, DC/OS Mesos or any other container orchestration platform. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtomonitormicroservices-170221135820-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to Monitor Microservices running in Docker, Kubernetes, Openshift, DC/OS Mesos or any other container orchestration platform.
How to Monitor Microservices from Sysdig
]]>
3470 6 https://cdn.slidesharecdn.com/ss_thumbnails/howtomonitormicroservices-170221135820-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WTF my container just spawned a shell! /slideshow/wtf-my-container-just-spawned-a-shell/71907988 wtfmycontainerjustspawnedashell-170208114801
Comparison of security tools for dynamic scanning Docker container with a focus on Sysdig Falco ]]>

Comparison of security tools for dynamic scanning Docker container with a focus on Sysdig Falco ]]>
Wed, 08 Feb 2017 11:48:01 GMT /slideshow/wtf-my-container-just-spawned-a-shell/71907988 Sysdig@slideshare.net(Sysdig) WTF my container just spawned a shell! Sysdig Comparison of security tools for dynamic scanning Docker container with a focus on Sysdig Falco <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wtfmycontainerjustspawnedashell-170208114801-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Comparison of security tools for dynamic scanning Docker container with a focus on Sysdig Falco
WTF my container just spawned a shell! from Sysdig
]]>
60103 7 https://cdn.slidesharecdn.com/ss_thumbnails/wtfmycontainerjustspawnedashell-170208114801-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Trace everything, when APM meets SysAdmins /slideshow/trace-everything-when-apm-meets-sysadmins/71907392 traceeverythingwhenapmmeetssysadmins-170208113242
Using Sysdig Tracers, a lightweight open source APM like syscall tracing ]]>

Using Sysdig Tracers, a lightweight open source APM like syscall tracing ]]>
Wed, 08 Feb 2017 11:32:42 GMT /slideshow/trace-everything-when-apm-meets-sysadmins/71907392 Sysdig@slideshare.net(Sysdig) Trace everything, when APM meets SysAdmins Sysdig Using Sysdig Tracers, a lightweight open source APM like syscall tracing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/traceeverythingwhenapmmeetssysadmins-170208113242-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Using Sysdig Tracers, a lightweight open source APM like syscall tracing
Trace everything, when APM meets SysAdmins from Sysdig
]]>
901 2 https://cdn.slidesharecdn.com/ss_thumbnails/traceeverythingwhenapmmeetssysadmins-170208113242-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
You're monitoring Kubernetes Wrong /slideshow/youre-monitoring-kubernetes-wrong/70058744 2016-11-8kubecon-161212144009
Based on experience with hundreds of customers, here's a set of best practices for monitoring Kubernetes and monitoring your applications running inside docker containers.]]>

Based on experience with hundreds of customers, here's a set of best practices for monitoring Kubernetes and monitoring your applications running inside docker containers.]]>
Mon, 12 Dec 2016 14:40:09 GMT /slideshow/youre-monitoring-kubernetes-wrong/70058744 Sysdig@slideshare.net(Sysdig) You're monitoring Kubernetes Wrong Sysdig Based on experience with hundreds of customers, here's a set of best practices for monitoring Kubernetes and monitoring your applications running inside docker containers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016-11-8kubecon-161212144009-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Based on experience with hundreds of customers, here&#39;s a set of best practices for monitoring Kubernetes and monitoring your applications running inside docker containers.
You're monitoring Kubernetes Wrong from Sysdig
]]>
993 2 https://cdn.slidesharecdn.com/ss_thumbnails/2016-11-8kubecon-161212144009-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Dark Art of Container Monitoring - Spanish https://es.slideshare.net/slideshow/the-dark-art-of-container-monitoring-spanish/69429076 thedarkartofcontainermonitoring-spanish-161122230409
Retos de la infrastructura con contenedores Problemática de la monitorización tradicional Buenas prácticas monitorizando contenedores, Docker y Kubernetes Sysdig, monitorización nativa de contenedores]]>

Retos de la infrastructura con contenedores Problemática de la monitorización tradicional Buenas prácticas monitorizando contenedores, Docker y Kubernetes Sysdig, monitorización nativa de contenedores]]>
Tue, 22 Nov 2016 23:04:08 GMT https://es.slideshare.net/slideshow/the-dark-art-of-container-monitoring-spanish/69429076 Sysdig@slideshare.net(Sysdig) The Dark Art of Container Monitoring - Spanish Sysdig Retos de la infrastructura con contenedores Problemática de la monitorización tradicional Buenas prácticas monitorizando contenedores, Docker y Kubernetes Sysdig, monitorización nativa de contenedores <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thedarkartofcontainermonitoring-spanish-161122230409-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Retos de la infrastructura con contenedores Problemática de la monitorización tradicional Buenas prácticas monitorizando contenedores, Docker y Kubernetes Sysdig, monitorización nativa de contenedores
from Sysdig
]]>
492 6 https://cdn.slidesharecdn.com/ss_thumbnails/thedarkartofcontainermonitoring-spanish-161122230409-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lions, Tigers and Deers: What building zoos can teach us about securing microservices? /slideshow/lions-tigers-and-deers-what-building-zoos-can-teach-us-about-securing-microservices/69343208 sysdigcontainersecurity-161121084540
How to secure microservices running in containers? Strategies for Docker, Kubernetes, Openshift, RancherOS, DC/OS Mesos. Privileges, resources and visibility constrains with capabilities, cgroups and namespaces. Image vulnerability scanning and behaviour security monitoring with Sysdig Falco. ]]>

How to secure microservices running in containers? Strategies for Docker, Kubernetes, Openshift, RancherOS, DC/OS Mesos. Privileges, resources and visibility constrains with capabilities, cgroups and namespaces. Image vulnerability scanning and behaviour security monitoring with Sysdig Falco. ]]>
Mon, 21 Nov 2016 08:45:40 GMT /slideshow/lions-tigers-and-deers-what-building-zoos-can-teach-us-about-securing-microservices/69343208 Sysdig@slideshare.net(Sysdig) Lions, Tigers and Deers: What building zoos can teach us about securing microservices? Sysdig How to secure microservices running in containers? Strategies for Docker, Kubernetes, Openshift, RancherOS, DC/OS Mesos. Privileges, resources and visibility constrains with capabilities, cgroups and namespaces. Image vulnerability scanning and behaviour security monitoring with Sysdig Falco. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sysdigcontainersecurity-161121084540-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to secure microservices running in containers? Strategies for Docker, Kubernetes, Openshift, RancherOS, DC/OS Mesos. Privileges, resources and visibility constrains with capabilities, cgroups and namespaces. Image vulnerability scanning and behaviour security monitoring with Sysdig Falco.
Lions, Tigers and Deers: What building zoos can teach us about securing microservices? from Sysdig
]]>
625 2 https://cdn.slidesharecdn.com/ss_thumbnails/sysdigcontainersecurity-161121084540-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Building Trustworthy Containers /slideshow/building-trustworthy-containers/67686318 sysdig2016trustworthycontainers-161026165325
Containers have the potential to improve the security of typical deployments, but for many the argument has not yet been made convincingly. This talk will describe the existing security technologies around containers, and show how their use can make container-based systems more secure than the alternatives. It will then go further, describing new technologies that allow admins to have even greater confidence in the security of their systems, beyond anything possible with traditional deployment techniques.]]>

Containers have the potential to improve the security of typical deployments, but for many the argument has not yet been made convincingly. This talk will describe the existing security technologies around containers, and show how their use can make container-based systems more secure than the alternatives. It will then go further, describing new technologies that allow admins to have even greater confidence in the security of their systems, beyond anything possible with traditional deployment techniques.]]>
Wed, 26 Oct 2016 16:53:25 GMT /slideshow/building-trustworthy-containers/67686318 Sysdig@slideshare.net(Sysdig) Building Trustworthy Containers Sysdig Containers have the potential to improve the security of typical deployments, but for many the argument has not yet been made convincingly. This talk will describe the existing security technologies around containers, and show how their use can make container-based systems more secure than the alternatives. It will then go further, describing new technologies that allow admins to have even greater confidence in the security of their systems, beyond anything possible with traditional deployment techniques. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sysdig2016trustworthycontainers-161026165325-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Containers have the potential to improve the security of typical deployments, but for many the argument has not yet been made convincingly. This talk will describe the existing security technologies around containers, and show how their use can make container-based systems more secure than the alternatives. It will then go further, describing new technologies that allow admins to have even greater confidence in the security of their systems, beyond anything possible with traditional deployment techniques.
Building Trustworthy Containers from Sysdig
]]>
228 2 https://cdn.slidesharecdn.com/ss_thumbnails/sysdig2016trustworthycontainers-161026165325-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A brief history of system calls /slideshow/a-brief-history-of-system-calls/67677711 briefhistoryofsystemcalls-161026142344
System calls are the primary mechanism of user-to-kernel interaction. Today the Linux system call interface has achieved a primacy and ubiquity that make it an ideal layer at which to understand single-system and distributed-system pathologies. Sysdig advances the art of system call observability by drawing on the systems that came before it. Informed by his work with /proc, process tools and DTrace, Adam will walk through a history of system calls and system call observability from simple systems like truss and strace, moderns ones like DTrace and SystemTab, and ancient ones from the early days of Unix.]]>

System calls are the primary mechanism of user-to-kernel interaction. Today the Linux system call interface has achieved a primacy and ubiquity that make it an ideal layer at which to understand single-system and distributed-system pathologies. Sysdig advances the art of system call observability by drawing on the systems that came before it. Informed by his work with /proc, process tools and DTrace, Adam will walk through a history of system calls and system call observability from simple systems like truss and strace, moderns ones like DTrace and SystemTab, and ancient ones from the early days of Unix.]]>
Wed, 26 Oct 2016 14:23:44 GMT /slideshow/a-brief-history-of-system-calls/67677711 Sysdig@slideshare.net(Sysdig) A brief history of system calls Sysdig System calls are the primary mechanism of user-to-kernel interaction. Today the Linux system call interface has achieved a primacy and ubiquity that make it an ideal layer at which to understand single-system and distributed-system pathologies. Sysdig advances the art of system call observability by drawing on the systems that came before it. Informed by his work with /proc, process tools and DTrace, Adam will walk through a history of system calls and system call observability from simple systems like truss and strace, moderns ones like DTrace and SystemTab, and ancient ones from the early days of Unix. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/briefhistoryofsystemcalls-161026142344-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> System calls are the primary mechanism of user-to-kernel interaction. Today the Linux system call interface has achieved a primacy and ubiquity that make it an ideal layer at which to understand single-system and distributed-system pathologies. Sysdig advances the art of system call observability by drawing on the systems that came before it. Informed by his work with /proc, process tools and DTrace, Adam will walk through a history of system calls and system call observability from simple systems like truss and strace, moderns ones like DTrace and SystemTab, and ancient ones from the early days of Unix.
A brief history of system calls from Sysdig
]]>
893 1 https://cdn.slidesharecdn.com/ss_thumbnails/briefhistoryofsystemcalls-161026142344-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Designing Tracing Tools /slideshow/designing-tracing-tools/67650612 sysdigsummit2016designingtracingtools-161025231331
You have a system with an advanced programmatic tracer: do you know what to do with it? Brendan has used numerous tracers in production environments, and has published hundreds of tracing-based tools. In this talk he will share tips and know-how for creating CLI tracing tools and GUI visualizations, to solve real problems effectively. Programmatic tracing is an amazing superpower, and this talk will show you how to wield it!]]>

You have a system with an advanced programmatic tracer: do you know what to do with it? Brendan has used numerous tracers in production environments, and has published hundreds of tracing-based tools. In this talk he will share tips and know-how for creating CLI tracing tools and GUI visualizations, to solve real problems effectively. Programmatic tracing is an amazing superpower, and this talk will show you how to wield it!]]>
Tue, 25 Oct 2016 23:13:31 GMT /slideshow/designing-tracing-tools/67650612 Sysdig@slideshare.net(Sysdig) Designing Tracing Tools Sysdig You have a system with an advanced programmatic tracer: do you know what to do with it? Brendan has used numerous tracers in production environments, and has published hundreds of tracing-based tools. In this talk he will share tips and know-how for creating CLI tracing tools and GUI visualizations, to solve real problems effectively. Programmatic tracing is an amazing superpower, and this talk will show you how to wield it! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sysdigsummit2016designingtracingtools-161025231331-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> You have a system with an advanced programmatic tracer: do you know what to do with it? Brendan has used numerous tracers in production environments, and has published hundreds of tracing-based tools. In this talk he will share tips and know-how for creating CLI tracing tools and GUI visualizations, to solve real problems effectively. Programmatic tracing is an amazing superpower, and this talk will show you how to wield it!
Designing Tracing Tools from Sysdig
]]>
525 2 https://cdn.slidesharecdn.com/ss_thumbnails/sysdigsummit2016designingtracingtools-161025231331-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Extending Sysdig with Chisel /slideshow/extending-sysdig-with-chisel/67650192 sysdigccwfsextendingsysdig-161025225323
Sysdig is infinitely extensible through Chisels, and now you’re going to learn how to build one. Using a real-world example, we’re going to show you how to leverage sysdig’s luascript engine to build powerful new functionality customized to your needs.]]>

Sysdig is infinitely extensible through Chisels, and now you’re going to learn how to build one. Using a real-world example, we’re going to show you how to leverage sysdig’s luascript engine to build powerful new functionality customized to your needs.]]>
Tue, 25 Oct 2016 22:53:23 GMT /slideshow/extending-sysdig-with-chisel/67650192 Sysdig@slideshare.net(Sysdig) Extending Sysdig with Chisel Sysdig Sysdig is infinitely extensible through Chisels, and now you’re going to learn how to build one. Using a real-world example, we’re going to show you how to leverage sysdig’s luascript engine to build powerful new functionality customized to your needs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sysdigccwfsextendingsysdig-161025225323-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sysdig is infinitely extensible through Chisels, and now you’re going to learn how to build one. Using a real-world example, we’re going to show you how to leverage sysdig’s luascript engine to build powerful new functionality customized to your needs.
Extending Sysdig with Chisel from Sysdig
]]>
960 2 https://cdn.slidesharecdn.com/ss_thumbnails/sysdigccwfsextendingsysdig-161025225323-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Intro to sysdig in 15 minutes /slideshow/intro-to-sysdig-in-15-minutes/67649835 sysdigccwfsluca15minutes-161025223702
Well, the title says it all. Get ready to be really productive, really fast.]]>

Well, the title says it all. Get ready to be really productive, really fast.]]>
Tue, 25 Oct 2016 22:37:02 GMT /slideshow/intro-to-sysdig-in-15-minutes/67649835 Sysdig@slideshare.net(Sysdig) Intro to sysdig in 15 minutes Sysdig Well, the title says it all. Get ready to be really productive, really fast. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sysdigccwfsluca15minutes-161025223702-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Well, the title says it all. Get ready to be really productive, really fast.
Intro to sysdig in 15 minutes from Sysdig
]]>
756 2 https://cdn.slidesharecdn.com/ss_thumbnails/sysdigccwfsluca15minutes-161025223702-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Sysdig-48x48.jpg?cb=1548858205 www.sysdig.com/ https://cdn.slidesharecdn.com/ss_thumbnails/wordcampzaragoza-190130142404-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/wordpress-y-docker-de-desarrollo-a-produccion/129846227 Wordpress y Docker, de... https://cdn.slidesharecdn.com/ss_thumbnails/whatprometheusmeansformonitoringvendors-180830101757-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/what-prometheus-means-for-monitoring-vendors/112245696 What Prometheus means ... https://cdn.slidesharecdn.com/ss_thumbnails/15kubernetesfailurepointsyoushouldwatch-180627225140-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/15-kubernetes-failure-points-you-should-watch/103353884 15 kubernetes failure ...