Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Using Prometheus Metrics for Monitoring Containers
    Using Prometheus Metrics for Monitoring Containers Eric Carter & Jorge Salamero Sanz Recorded: Mar 15 2018 50 mins
    Open source Prometheus is designed to help you monitor the performance and health of containers and application stacks in microservices deployments. It provides a wealth of metrics exposed via Prometheus endpoints for a wide range of applications and infrastructure components. Applications developers love Prometheus as it helps them see how their code behaves – especially as things move from development into production. Operations teams benefit as well by gaining insight into system performance and identifying anomalies during runtime.

    If you’re just getting started with containers or Prometheus, or if you’re looking for ways to optimize an existing deployment, join us to learn how Prometheus metrics can be best utilized for monitoring container-based microservices environments.

    In this webinar we’ll discuss and demo:

    -Methods for instrumenting your environment to collect and use -Prometheus metrics and time-series data for visibility into your application infrastructure
    -Correlating Prometheus and other metric types with like Kubernetes orchestration metadata to monitor service-oriented environments
    -How to build effective dashboards for keeping watch over critical systems and information running in development and production
    -Using Prometheus metrics to detect, alert, troubleshoot and resolve common scenarios you will face in your container-based cloud
  • Principles of Monitoring Microservices
    Principles of Monitoring Microservices Michael Ducy, Director of Community & Evangelism, Sysdig Recorded: Mar 13 2018 42 mins
    Containers and Microservices have radically changed how you get visibility into your applications. As developers have started to leverage orchestration systems on top of containers, the game is changing yet again. What was a simple application on a host before is now a sophisticated, dynamically orchestrated, multi-container architecture. It’s amazing for development - but introduces a whole new set of challenges for monitoring and visibility.

    In this talk we’ll lay out five key principles for monitoring microservices and the containers they are based on. These principles take into account the operational difference of containers and microservices when compared to traditional architectures.

    This talk is for the operator that needs to help development teams understand how visibility of apps has changed, and help teams implement these ideas. You’ll walk away with a good understanding of the challenges of monitoring microservices and how you can set your team up for success.
  • Monitoring Kubernetes with kube-state-metrics
    Monitoring Kubernetes with kube-state-metrics Eric Carter, Product Marketing & Jorge Salamero Sanz, Technical Marketing Recorded: Mar 1 2018 54 mins
    Kubernetes simplifies deployment, scaling and maintenance of container-based services within and across clouds. At the same time, its dynamic nature adds complexity to app and infrastructure monitoring and troubleshooting. How can you ensure visibility into the health of application services in addition to the Kubernetes cluster itself?

    Using Kubernetes metadata and metrics - including kube-state-metrics - you can get critical insight into how your cluster is performing to ensure your users get the best experience.

    Join us for this webinar to discover how to effectively monitor Kubernetes. In this session we will discuss and demo:

    - How to correlate infrastructure, container, and orchestrator metrics for a complete picture of service performance
    - How to use kube-state-metrics to answer important questions about the condition of your Kubernetes cluster
    - How to detect, troubleshoot and resolve common scenarios you will face in your Kubernetes-based cloud
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Recorded: Feb 27 2018 30 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Recorded: Feb 22 2018 54 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • Container troubleshooting with Sysdig
    Container troubleshooting with Sysdig Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Recorded: Feb 15 2018 45 mins
    SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?

    Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.

    In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:

    -Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
    -Debug a 502 HTTP error on a load-balanced Python app with HAproxy
    -Troubleshoot a Kubernetes CrashLoopBackOff error

    Who should attend?

    If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Recorded: Feb 8 2018 49 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:
    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • 20 Docker Security Tools Compared
    20 Docker Security Tools Compared Jorge Salamero Sanz and Knox Anderson Recorded: Jan 25 2018 39 mins
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    -How to secure Docker containers and what are the best practices
    -Why you need to both static and dynamic (run-time) scanning for your images
    -What other container security measures and policies are necessary in production

    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • Container Runtime Security with Sysdig Falco
    Container Runtime Security with Sysdig Falco Michael Ducy, Director of Community and Evangelism, Sysdig Recorded: Jan 24 2018 40 mins
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.

Embed in website or blog