InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Linux Tracing - Do You Know What Your Servers Are Actually Doing?

Presented by

Nick "Ghost" Gregory

About this talk

There's a whole world of system tracing, instrumentation, and profiling built into nearly every Linux system that goes untouched by most. While originally developed to help with debugging and performance tuning, the same tools can be used to provide security insights that are difficult or almost impossible to get any other way. In this interactive session we will discuss these tracing systems, suggest tips on how to use them, and provide some actionable takeaways on types of data you can extract, all in just a few lines of code. This webcast is designed for developers and systems administrators who run Linux systems and want more visibility into what those systems are doing, either for performance reasons, or for security (or both!). During this webcast you will learn: - Best practices on how to use the `perf` cli to gather profiling information on applications. - Top tips on how to use Linux kprobes and uprobes to instrument specific functions in the kernel or userland. - How to implement a simple script to monitor the DNS requests and TCP connections made by any program on the system.
Capsule8

Capsule8

1116 subscribers13 talks
Secure Production, Avoid Disruption
Capsule8 provides modern enterprises scalable Linux workload protection. The pioneer behind “ops-friendly” Linux security, Capsule8 Protect is purpose-built to deliver monitoring, detection and response with a single agent that can be deployed across heterogenous production environments. By using Capsule8, security teams have the visibility needed to detect incidents and protect against unwanted behavior, allowing them reduce downtime and avoid costly business disruption.
Related topics