Hi [[ session.user.profile.firstName ]]

Kubernetes Open-Source Security: Falco + NATS + kubeless demo

Join us to learn about container runtime security, and how to secure your container runtime environment with Falco and Kubeless. We'll also demo Falco detecting abnormal behavior in a container, and Kubeless taking action on the compromised container.
Recorded Jun 12 2018 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Ducy
Presentation preview: Kubernetes Open-Source Security: Falco + NATS + kubeless demo

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building an Open Source Container Security Stack Aug 2 2018 5:00 pm UTC 60 mins
    Daniel Nurmi from Anchore with Jorge Salamero Sanz & Michael Ducy from Sysdig
    Container security is top-of-mind for any organization adopting Docker and Kubernetes. In this session Sysdig and Anchore present how you can build a complete open source container security stack for Docker and Kubernetes with Falco and Anchore Engine.

    This session will live demo:

    -Using Falco, NATS and Kubeless to build a Kubernetes response engine and implement real-time attack remediation with security playbooks using FaaS.
    -How Anchore Engine can detect software vulnerabilities in your images, and how it can be integrated with Jenkins, Kubernetes and Falco.
  • Comparing Prometheus custom metrics to APM Jul 31 2018 5:00 pm UTC 30 mins
    Eric Carter
    Developers have numerous options for instrumenting code to monitor and troubleshoot application performance. When should you turn to custom metrics like Prometheus, statsd and JMX? When are tracing and APM the right fit? How do these solutions compare?

    Join us for our online session to learn:
    - The advantages and disadvantages of different approaches for application performance monitoring
    - When you should choose one solution over another and what the best use cases are for each
    - How to consolidate monitoring and accelerate troubleshooting when using multiple options
  • Best practices for Forensics and Incident Response in Containers Jul 26 2018 5:00 pm UTC 30 mins
    Knox Anderson
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Open source Kubernetes run-time security with Falco Jul 24 2018 5:00 pm UTC 30 mins
    Michael Ducy
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • Sysdig & SANS Institute: Forensics and Incident Response in Containers Recorded: Jul 20 2018 61 mins
    Knox Anderson, Sysdig and Jake Williams, SANS Analyst
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Kubernetes Security Features Recorded: Jul 3 2018 22 mins
    Jorge Salamero Sanz
    Kubernetes security features focus on infrastructure layer: verifying that configuration is safe, follow the security best practices, the last privileges and your deployment has no known issues. How that compares with runtime security?
    - Kubernetes RBAC overview
    - Kubernetes Pod Security Policy
    - Kubernetes Network Policy
    - Securing Kubernetes components and applications
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack Recorded: Jun 26 2018 18 mins
    Knox Anderson
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • How do enterprises use containers? A discussion of 2018 Docker usage. Recorded: Jun 21 2018 45 mins
    Eric Carter
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Kubernetes Open-Source Security: Falco + NATS + kubeless demo Recorded: Jun 12 2018 30 mins
    Michael Ducy
    Join us to learn about container runtime security, and how to secure your container runtime environment with Falco and Kubeless. We'll also demo Falco detecting abnormal behavior in a container, and Kubeless taking action on the compromised container.
  • Sysdig + Grafana: Dashboards or metric exploration, which one should you use? Recorded: Jun 5 2018 31 mins
    Eric Carter, Davide Schiera
    Visualization of container metrics and time series data with dashboards and graphs using tools like Grafana and Sysdig can give valuable insight into what’s happening in your microservices environment.

    Join us for a discussion of what each of these solutions provides to help simplify monitoring and troubleshooting across a wide scope of technologies including Prometheus, Docker, and Kubernetes.
  • 15 Failure Points in Kubernetes and How to Monitor Them Recorded: May 22 2018 23 mins
    Jorge Salamero Sanz
    There is a lot of discussion nowadays on how to use containers in production - are you there already?

    When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From an agnostic monitoring solution perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
  • Frictionless Application Development:Radically Change How You Secure and Monitor Recorded: May 10 2018 61 mins
    Knox Anderson and Eric Carter
    To address the challenges containers present, Red Hat's OpenShift Container Platform provides a fully managed container platform. In addition, the Sysdig Container Intelligence Platform, brings a container-native monitoring and security solution that gives you full visibility and control of your OpenShift environment. Sysdig provides workflows to proactively scale, and manage your application performance across your private and public cloud infrastructure.
  • Container Forensics & Troubleshooting with Sysdig Inspect Recorded: Apr 27 2018 40 mins
    Jorge Salamero Sanz, Technical Marketing Manager, Sysdig
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • Best Practices for Monitoring and Securing Containers and Microservices Recorded: Apr 17 2018 49 mins
    Eric Carter, Director of Product Marketing, Sysdig and Knox Anderson, Product Marketing, Sysdig
    Containers and microservices are designed to provide a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement.

    We’ll discuss how to overcome this challenge and specifically discuss:

    - Benefits and drawbacks of different approaches to data collection in containers
    - How using metadata from orchestrators like Kubernetes helps optimize and secure your containers
    - Best practices for alerting and compliance in a distributed ephemeral infrastructure
    - How troubleshooting and forensics has changed in containerized environments
  • Monitoring Containers & Microservices with Sysdig Monitor Recorded: Apr 12 2018 59 mins
    Eric Carter, Director of Product Marketing
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • DevOps and Cloud Native Recorded: Apr 3 2018 37 mins
    Michael Ducy, Director of Community & Evangelism, Sysdig
    You just got “done” with the transformation of your organization (or parts of it) to leverage more DevOps practices, and now the next hot thing is taking over the industry: containers, Cloud Native, SRE, GitOps, Kubernetes, etc. What’s a DevOps Manager to do? Throw away the last few years and rebrand the team as Cloud Native SREs?

    Technological advancement not only provides advancement in “what” a modern technology architecture looks like, it can also provide advancement in the processes and the day to day of an organization’s technology teams. We’ve seen this before in the move from mainframe to client-server, and client-server to Cloud.

    In this presentation I’ll talk about the relationship of DevOps to Cloud Native technologies, and help make sense of all the jargon - containers, microservices, orchestration (and Kubernetes), SRE, GitOps, etc. I’ll also talk about how some processes & practices in the world of DevOps change when leveraging these technologies. Attendees will leave from this webinar with a base understanding of what a DevOps operating model looks like when leveraging modern Cloud Native technologies.
  • 5 reasons why containers change PCI compliance Recorded: Mar 27 2018 29 mins
    Knox Anderson, Product Marketing Manager, Sysdig
    As more and more containerized applications get moved into production environments security & compliance become greater concerns. In this webinar we'll review PCI compliance initiatives, talk about how containers change your compliance lifecycle, and how to stay compliant while maintaining the benefits of containers.

    Specifically we'll cover
    - Live examples of user activity auditing
    - Managing dynamic network maps of your containerized infrastructure
    - Container Intrusion detection
    - Forensic analysis of unauthorized data access
  • Using Prometheus Metrics for Monitoring Containers Recorded: Mar 15 2018 50 mins
    Eric Carter & Jorge Salamero Sanz
    Open source Prometheus is designed to help you monitor the performance and health of containers and application stacks in microservices deployments. It provides a wealth of metrics exposed via Prometheus endpoints for a wide range of applications and infrastructure components. Applications developers love Prometheus as it helps them see how their code behaves – especially as things move from development into production. Operations teams benefit as well by gaining insight into system performance and identifying anomalies during runtime.

    If you’re just getting started with containers or Prometheus, or if you’re looking for ways to optimize an existing deployment, join us to learn how Prometheus metrics can be best utilized for monitoring container-based microservices environments.

    In this webinar we’ll discuss and demo:

    -Methods for instrumenting your environment to collect and use -Prometheus metrics and time-series data for visibility into your application infrastructure
    -Correlating Prometheus and other metric types with like Kubernetes orchestration metadata to monitor service-oriented environments
    -How to build effective dashboards for keeping watch over critical systems and information running in development and production
    -Using Prometheus metrics to detect, alert, troubleshoot and resolve common scenarios you will face in your container-based cloud
  • Principles of Monitoring Microservices Recorded: Mar 13 2018 42 mins
    Michael Ducy, Director of Community & Evangelism, Sysdig
    Containers and Microservices have radically changed how you get visibility into your applications. As developers have started to leverage orchestration systems on top of containers, the game is changing yet again. What was a simple application on a host before is now a sophisticated, dynamically orchestrated, multi-container architecture. It’s amazing for development - but introduces a whole new set of challenges for monitoring and visibility.

    In this talk we’ll lay out five key principles for monitoring microservices and the containers they are based on. These principles take into account the operational difference of containers and microservices when compared to traditional architectures.

    This talk is for the operator that needs to help development teams understand how visibility of apps has changed, and help teams implement these ideas. You’ll walk away with a good understanding of the challenges of monitoring microservices and how you can set your team up for success.
  • Monitoring Kubernetes with kube-state-metrics Recorded: Mar 1 2018 54 mins
    Eric Carter, Product Marketing & Jorge Salamero Sanz, Technical Marketing
    Kubernetes simplifies deployment, scaling and maintenance of container-based services within and across clouds. At the same time, its dynamic nature adds complexity to app and infrastructure monitoring and troubleshooting. How can you ensure visibility into the health of application services in addition to the Kubernetes cluster itself?

    Using Kubernetes metadata and metrics - including kube-state-metrics - you can get critical insight into how your cluster is performing to ensure your users get the best experience.

    Join us for this webinar to discover how to effectively monitor Kubernetes. In this session we will discuss and demo:

    - How to correlate infrastructure, container, and orchestrator metrics for a complete picture of service performance
    - How to use kube-state-metrics to answer important questions about the condition of your Kubernetes cluster
    - How to detect, troubleshoot and resolve common scenarios you will face in your Kubernetes-based cloud
The Cloud-Native Intelligence Company
Sysdig is the cloud-native intelligence company. We have created the only unified platform to deliver monitoring, troubleshooting, and security in a microservices-friendly architecture. Our open source technologies have attracted a community of over a million developers, administrators and other IT professionals looking for deep visibility into systems and containers. Our container intelligence platform monitors and secures millions of containers across hundreds of enterprises, including Fortune 500 companies and web-scale properties. Learn more at www.sysdig.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Kubernetes Open-Source Security: Falco + NATS + kubeless demo
  • Live at: Jun 12 2018 5:00 pm
  • Presented by: Michael Ducy
  • From:
Your email has been sent.
or close