SlideShare a Scribd company logo
Monitoring & Securing
Microservices in
Kubernetes
Michael Ducy - @mfdii - Sysdig
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Let’s talk about Microservices
A quick refresher
• Let’s define microservices:
The term "Microservice Architecture" has sprung up over the last few years to describe
a particular way of designing software applications as suites of independently
deployable services. While there is no precise definition of this architectural style, there
are certain common characteristics around organization around business capability,
automated deployment, intelligence in the endpoints, and decentralized control of
languages and data.
http://www.martinfowler.com/articles/microservices.html
Stop, It’s not SOA
• Services tend to have smaller concerns than SOA Services
• Architectural Concepts incorporates Innovations:
– In Infrastructure
– In Automation
– In Continuous Delivery
– In Development
– In Monitoring
http://www.martinfowler.com/articles/microservices.html
What you think it looks like
http://microservices.io/i/Microservice_Architecture.png
What it really looks like.
https://www.appcentrica.com/wp-content/uploads/2016/11/Microservices-Architecture-1.png
But it’s probably more like
https://i.stack.imgur.com/y27IV.png
Let’s talk about Containers
What’s a Container?
Containers ARE NOT lightweight VMs.
What’s a Container?
A combination of:
● An image
● Cgroups
● Namespaces
● Linux Security Modules:
○ SELinux, App armor, seccomp
Containers vs. Zones vs. Jails vs. VMs
Thanks to Jessie Frazelle (@jessfraz) for this slide https://goo.gl/7fVKFa
Containers
Cgroups
Namespaces
LSMs
Zones
First class
concept
Jails
First class
concept
VMs
First class
concept
Read more about this here: https://blog.jessfraz.com/post/containers-zones-jails-vms/
What’s a Container
The Old Way The New Way
Heavy, Non Portable Light, Easily Portable
What’s a Container
The Old Way The New Way
Heavy, Non Portable Light, Easily Portable
Application
Artifact
Virtual Machine
Artifact
Container
Artifact
cgroups
Control Groups
Limits the quantity of a resource that can be consumed.
Memory, CPU, Net, etc
namespaces
namespaces
Limits what resources can be accessed
Cgroup CLONE_NEWCGROUP Cgroup root directory
IPC CLONE_NEWIPC System V IPC, POSIX message queues
Network CLONE_NEWNET Network devices, stacks, ports, etc.
Mount CLONE_NEWNS Mount points
PID CLONE_NEWPID Process IDs
User CLONE_NEWUSER User and group IDs
UTS CLONE_NEWUTS Hostname and NIS domain name
Linux Security Modules
SELinux
System wide execution policy
AppArmor
System wide execution policy, focused on processes
Seccomp
Per process system call isolation
Why is it magic?
Container
Image
Container
Runtime
cgroup
namespace
LSM
Containers + Microservices
Containers + Microservices
Containers
Limited scope
Easily deployable
Immutable
Versionable
Microservices
Limited Scope
CD used for deployment
Service Guarantees
Versionable API
Containers make
Microservices easier.
https://i.stack.imgur.com/y27IV.png
https://www.appcentrica.com/wp-content/uploads/2016/11/Microservices-Architecture-1.png
The Five Principles
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
A Paradigm Shift
Traditional management
focuses on apps running
on VMs and Hosts.
Containers shift the
management focus to
apps running as isolated
process.
vs.
Monitor Containers & What’s Inside
Monitoring needs to focus on:
● Isolated processes in the context of the container
○ Resource limits
● Isolated processes in the context of the orchestrator
○ Resource limits
○ Scaling limits
Monitor Containers & What’s Inside
Monitoring needs to focus on:
● Monitoring the application itself.
● Discovery of metrics for your language runtime,
application services, database, etc
● Discovery of metrics exposed by developers
○ Prometheus, JMX, etc
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Average VM life:
23 Days
Average container life:
2.5 Days
Alert on service performance,
not container performance.
Alert on service performance,
not container performance.
● Containers don’t last long.
● Orchestration systems should monitor individual containers and take action.
○ Resource limits are important!
● Operators and Developers should worry about:
“Is the thing doing the thing it’s supposed
to be doing, and in a timely manner”
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Monitor your APIs
Monitor your APIs
● APIs are the primary communication path for your Microservices
● Monitoring API health is important to:
○ Catch bottlenecks in certain methods/functions/endpoints
○ See frequently used methods/functions/endpoints
○ Trace behavior of your application through multiple systems
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Secure the Runtime Environment
Current container security paradigms:
● Image Based
○ Image Scanning
○ Trusted Images
● Orchestrator Security
○ RBAC
● Service Based
○ SPIFFE, Cilium, Service Mesh
● Runtime Security
○ Sysdig Secure, Sysdig Falco
Image Based Security
Image Scanning:
● Scan image for known vulnerabilities
● Still requires process for bringing in upstream security releases
● “Point in Time Compliance”
● Integrate into container build process
● Clair & Anchore
Trusted Images/Registries:
● Cryptographically Sign Images
○ Still “Point in Time”
● Only trust particular container registries.
○ Only as good as your container build process
Orchestrator Security
Kubernetes RBAC:
● Stable as of Kubernetes 1.8
● Rich ability to limit users access to Kubernetes resources
Securing APIs, Dashboards, etc:
● Common exploitation point
● Open API ports to internet
● Exposed dashboards
Service Based
Service Mesh
● Ingress, Egress, Service Discovery, Failure Handling, Service Identity
Admittance Control
● Service Mesh, SPIFFE
Kernel Level Access Control
● API Level Access Control
● Cilium
Runtime Security
● What happens when a container starts/runs?
● Container Images are Immutable
● Runtime environments often aren’t
Runtime Security
● Watches Containers for “Abnormal Behavior”
○ Rules defined by policy
■ CIS, PCI, Organizational Best Practice, etc
○ Rules defined by container baselining
● Action taken based on severity
○ Stop/Kill container
● Should be part of your CD pipeline
○ Ensure developers haven’t added anything new that voilates
runtime policy.
5 Principles
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Incident & Forensics Analysis
Incident & Forensics traditionally difficult:
● Bare Metal - Save the Drives
● VM - Snapshot VM state, Keep VM
Containers make Incident & Forensics easier:
● Smaller footprint
● Limited objects in the container
Orchestrators make Incident & Forensics difficult:
● Ephemeral nature of containers
● Rapid deploy cycles
Incident & Forensics Analysis
Container Incident & Forensics Analysis requires:
● Capturing the container before it’s gone
● Capturing the system activity for analysis
● Correlation between abnormal behavior and system activity
To recap.
Containers change how we monitor applications.
Microservices change how we monitor services.
1. Monitor containers and what’s inside them.
2. Alert on service performance, not container performance.
3. Monitor APIs.
4. Secure the container runtime environment.
5. Provide incident and forensic analysis for containers.
Thank You!
Twitter:
- @sysdig - @mfdii
Sysdig Blog:
- https://sysdig.com/blog/
Sysdig Container Intelligence Platform:
- https://sysdig.com/
Sysdig Trial:
- https://sysdig.com/sign-up
Thank You

More Related Content

PDF
Principles of Monitoring Microservices
PDF
Securing your Container Environment with Open Source
PPTX
Open source security tools for Kubernetes.
PDF
Automating Security Response with Serverless
PDF
Container Runtime Security with Falco
PDF
DevOps in a Cloud Native World
PPTX
Evaluating container security with ATT&CK Framework
PPT
Container security
Principles of Monitoring Microservices
Securing your Container Environment with Open Source
Open source security tools for Kubernetes.
Automating Security Response with Serverless
Container Runtime Security with Falco
DevOps in a Cloud Native World
Evaluating container security with ATT&CK Framework
Container security

What's hot (20)

PPTX
An In-depth look at application containers
PPT
Securing the Cloud
PDF
The Future of Security and Productivity in Our Newly Remote World
PDF
Kubernetes security
PDF
Practical Approaches to Container Security
PPTX
360° Kubernetes Security: From Source Code to K8s Configuration Security
PDF
Serverless Security: What's Left To Protect
PDF
Securing Serverless - By Breaking In
PPTX
Secure Application Development in the Age of Continuous Delivery
PDF
Microservices: A Security Nightmare?
PDF
Barbican 1.0 - Open Source Key Management for OpenStack
PDF
Container Security Mmanagement
PDF
What's New in Kubernetes 1.18 Webinar Slides
PDF
All Your Containers Are Belong To Us
PDF
penetration test using Kali linux seminar report
PDF
Securing Your Containers is Not Enough: How to Encrypt Container Data
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PDF
Anatomy of a Cloud Hack
PDF
Cisco Cloud Networking Workshop
PPTX
Kube Apps in action
An In-depth look at application containers
Securing the Cloud
The Future of Security and Productivity in Our Newly Remote World
Kubernetes security
Practical Approaches to Container Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
Serverless Security: What's Left To Protect
Securing Serverless - By Breaking In
Secure Application Development in the Age of Continuous Delivery
Microservices: A Security Nightmare?
Barbican 1.0 - Open Source Key Management for OpenStack
Container Security Mmanagement
What's New in Kubernetes 1.18 Webinar Slides
All Your Containers Are Belong To Us
penetration test using Kali linux seminar report
Securing Your Containers is Not Enough: How to Encrypt Container Data
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
Anatomy of a Cloud Hack
Cisco Cloud Networking Workshop
Kube Apps in action
Ad

Similar to Monitoring & Securing Microservices in Kubernetes (20)

PDF
Integration in the Cloud, by Rob Davies
PDF
Azure meetup cloud native concepts - may 28th 2018
PPTX
Webinar : Microservices and Containerization
PPTX
Regulated Reactive - Security Considerations for Building Reactive Systems in...
PDF
Node.js Service - Best practices in 2019
PDF
How to Monitor Microservices
PPTX
Simplify Your Way To Expert Kubernetes Management
PPTX
CloudHealth: A Model-Driven Approach to Watch the Health of Cloud Services
PPTX
Cloud native microservices for systems and applications ieee rev2
PPT
Open Source KMIP Implementation
PDF
Microservice Architecture
PPTX
Micro Front-End & Microservices - Plansoft
PPTX
AWS Well-Architected Framework
PPTX
Do You Need A Service Mesh?
PDF
MuleSoft Manchester Meetup #4 slides 11th February 2021
PDF
Best Practices To Secure Kubernetes Cluster
PDF
stackconf 2023 | Infrastructure-From-Code and the end of Microservices by Ala...
PPTX
CI/CD Pipeline with Kubernetes
PPTX
Monitoring Containerized Micro-Services In Azure
PDF
Meetup Openshift Geneva 03/10
Integration in the Cloud, by Rob Davies
Azure meetup cloud native concepts - may 28th 2018
Webinar : Microservices and Containerization
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Node.js Service - Best practices in 2019
How to Monitor Microservices
Simplify Your Way To Expert Kubernetes Management
CloudHealth: A Model-Driven Approach to Watch the Health of Cloud Services
Cloud native microservices for systems and applications ieee rev2
Open Source KMIP Implementation
Microservice Architecture
Micro Front-End & Microservices - Plansoft
AWS Well-Architected Framework
Do You Need A Service Mesh?
MuleSoft Manchester Meetup #4 slides 11th February 2021
Best Practices To Secure Kubernetes Cluster
stackconf 2023 | Infrastructure-From-Code and the end of Microservices by Ala...
CI/CD Pipeline with Kubernetes
Monitoring Containerized Micro-Services In Azure
Meetup Openshift Geneva 03/10
Ad

More from Michael Ducy (20)

PDF
Rethinking Open Source in the Age of Cloud
PDF
Sysdig Open Source Intro
PDF
Sysdig Tokyo Meetup 2018 02-27
PDF
Survey of Container Build Tools
PDF
Monoliths, Myths, and Microservices - CfgMgmtCamp
PDF
Monoliths, Myths, and Microservices
PPTX
Why Pipelines Matter
PPTX
The Future of Everything
PPTX
Improving Goat Production
PDF
Changing the Way Development and Operations Works
PDF
CloudStack Day 14 - Automation: The Key to Hybrid Cloud
PPTX
The Road to Hybrid Cloud is Paved with Automation
PPTX
The Velocity of Bureaucracy
PPTX
The Goat and the Silo
PPTX
Little Tech, Big Impact - Monktoberfest 2013
PPT
Object, measure thyself
PPTX
DevOps Columbus Meetup Kickoff - Infrastructure as Code
PPTX
DevOpsDays Amsterdam - DudeOps: Why The Big Lebowski is About Your IT Project
PPTX
I've Got 99 Problems But DevOps Ain't One
PPT
DudeOps - Why The Big Lebowski is About Building a Cloud
Rethinking Open Source in the Age of Cloud
Sysdig Open Source Intro
Sysdig Tokyo Meetup 2018 02-27
Survey of Container Build Tools
Monoliths, Myths, and Microservices - CfgMgmtCamp
Monoliths, Myths, and Microservices
Why Pipelines Matter
The Future of Everything
Improving Goat Production
Changing the Way Development and Operations Works
CloudStack Day 14 - Automation: The Key to Hybrid Cloud
The Road to Hybrid Cloud is Paved with Automation
The Velocity of Bureaucracy
The Goat and the Silo
Little Tech, Big Impact - Monktoberfest 2013
Object, measure thyself
DevOps Columbus Meetup Kickoff - Infrastructure as Code
DevOpsDays Amsterdam - DudeOps: Why The Big Lebowski is About Your IT Project
I've Got 99 Problems But DevOps Ain't One
DudeOps - Why The Big Lebowski is About Building a Cloud

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Monitoring & Securing Microservices in Kubernetes

  • 1. Monitoring & Securing Microservices in Kubernetes Michael Ducy - @mfdii - Sysdig
  • 2. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 3. Let’s talk about Microservices
  • 4. A quick refresher • Let’s define microservices: The term "Microservice Architecture" has sprung up over the last few years to describe a particular way of designing software applications as suites of independently deployable services. While there is no precise definition of this architectural style, there are certain common characteristics around organization around business capability, automated deployment, intelligence in the endpoints, and decentralized control of languages and data. http://www.martinfowler.com/articles/microservices.html
  • 5. Stop, It’s not SOA • Services tend to have smaller concerns than SOA Services • Architectural Concepts incorporates Innovations: – In Infrastructure – In Automation – In Continuous Delivery – In Development – In Monitoring http://www.martinfowler.com/articles/microservices.html
  • 6. What you think it looks like http://microservices.io/i/Microservice_Architecture.png
  • 7. What it really looks like. https://www.appcentrica.com/wp-content/uploads/2016/11/Microservices-Architecture-1.png
  • 8. But it’s probably more like https://i.stack.imgur.com/y27IV.png
  • 9. Let’s talk about Containers
  • 10. What’s a Container? Containers ARE NOT lightweight VMs.
  • 11. What’s a Container? A combination of: ● An image ● Cgroups ● Namespaces ● Linux Security Modules: ○ SELinux, App armor, seccomp
  • 12. Containers vs. Zones vs. Jails vs. VMs Thanks to Jessie Frazelle (@jessfraz) for this slide https://goo.gl/7fVKFa Containers Cgroups Namespaces LSMs Zones First class concept Jails First class concept VMs First class concept Read more about this here: https://blog.jessfraz.com/post/containers-zones-jails-vms/
  • 13. What’s a Container The Old Way The New Way Heavy, Non Portable Light, Easily Portable
  • 14. What’s a Container The Old Way The New Way Heavy, Non Portable Light, Easily Portable Application Artifact Virtual Machine Artifact Container Artifact
  • 15. cgroups Control Groups Limits the quantity of a resource that can be consumed. Memory, CPU, Net, etc
  • 16. namespaces namespaces Limits what resources can be accessed Cgroup CLONE_NEWCGROUP Cgroup root directory IPC CLONE_NEWIPC System V IPC, POSIX message queues Network CLONE_NEWNET Network devices, stacks, ports, etc. Mount CLONE_NEWNS Mount points PID CLONE_NEWPID Process IDs User CLONE_NEWUSER User and group IDs UTS CLONE_NEWUTS Hostname and NIS domain name
  • 17. Linux Security Modules SELinux System wide execution policy AppArmor System wide execution policy, focused on processes Seccomp Per process system call isolation
  • 18. Why is it magic? Container Image Container Runtime cgroup namespace LSM
  • 20. Containers + Microservices Containers Limited scope Easily deployable Immutable Versionable Microservices Limited Scope CD used for deployment Service Guarantees Versionable API
  • 25. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 26. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 27. A Paradigm Shift Traditional management focuses on apps running on VMs and Hosts. Containers shift the management focus to apps running as isolated process. vs.
  • 28. Monitor Containers & What’s Inside Monitoring needs to focus on: ● Isolated processes in the context of the container ○ Resource limits ● Isolated processes in the context of the orchestrator ○ Resource limits ○ Scaling limits
  • 29. Monitor Containers & What’s Inside Monitoring needs to focus on: ● Monitoring the application itself. ● Discovery of metrics for your language runtime, application services, database, etc ● Discovery of metrics exposed by developers ○ Prometheus, JMX, etc
  • 30. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 31. Average VM life: 23 Days Average container life: 2.5 Days Alert on service performance, not container performance.
  • 32. Alert on service performance, not container performance. ● Containers don’t last long. ● Orchestration systems should monitor individual containers and take action. ○ Resource limits are important! ● Operators and Developers should worry about: “Is the thing doing the thing it’s supposed to be doing, and in a timely manner”
  • 33. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 35. Monitor your APIs ● APIs are the primary communication path for your Microservices ● Monitoring API health is important to: ○ Catch bottlenecks in certain methods/functions/endpoints ○ See frequently used methods/functions/endpoints ○ Trace behavior of your application through multiple systems
  • 36. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 37. Secure the Runtime Environment Current container security paradigms: ● Image Based ○ Image Scanning ○ Trusted Images ● Orchestrator Security ○ RBAC ● Service Based ○ SPIFFE, Cilium, Service Mesh ● Runtime Security ○ Sysdig Secure, Sysdig Falco
  • 38. Image Based Security Image Scanning: ● Scan image for known vulnerabilities ● Still requires process for bringing in upstream security releases ● “Point in Time Compliance” ● Integrate into container build process ● Clair & Anchore Trusted Images/Registries: ● Cryptographically Sign Images ○ Still “Point in Time” ● Only trust particular container registries. ○ Only as good as your container build process
  • 39. Orchestrator Security Kubernetes RBAC: ● Stable as of Kubernetes 1.8 ● Rich ability to limit users access to Kubernetes resources Securing APIs, Dashboards, etc: ● Common exploitation point ● Open API ports to internet ● Exposed dashboards
  • 40. Service Based Service Mesh ● Ingress, Egress, Service Discovery, Failure Handling, Service Identity Admittance Control ● Service Mesh, SPIFFE Kernel Level Access Control ● API Level Access Control ● Cilium
  • 41. Runtime Security ● What happens when a container starts/runs? ● Container Images are Immutable ● Runtime environments often aren’t
  • 42. Runtime Security ● Watches Containers for “Abnormal Behavior” ○ Rules defined by policy ■ CIS, PCI, Organizational Best Practice, etc ○ Rules defined by container baselining ● Action taken based on severity ○ Stop/Kill container ● Should be part of your CD pipeline ○ Ensure developers haven’t added anything new that voilates runtime policy.
  • 43. 5 Principles 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 44. Incident & Forensics Analysis Incident & Forensics traditionally difficult: ● Bare Metal - Save the Drives ● VM - Snapshot VM state, Keep VM Containers make Incident & Forensics easier: ● Smaller footprint ● Limited objects in the container Orchestrators make Incident & Forensics difficult: ● Ephemeral nature of containers ● Rapid deploy cycles
  • 45. Incident & Forensics Analysis Container Incident & Forensics Analysis requires: ● Capturing the container before it’s gone ● Capturing the system activity for analysis ● Correlation between abnormal behavior and system activity
  • 46. To recap. Containers change how we monitor applications. Microservices change how we monitor services. 1. Monitor containers and what’s inside them. 2. Alert on service performance, not container performance. 3. Monitor APIs. 4. Secure the container runtime environment. 5. Provide incident and forensic analysis for containers.
  • 47. Thank You! Twitter: - @sysdig - @mfdii Sysdig Blog: - https://sysdig.com/blog/ Sysdig Container Intelligence Platform: - https://sysdig.com/ Sysdig Trial: - https://sysdig.com/sign-up