HackDig : Dig high-quality web security articles for hackers

How to monitor etcd

Learning how to monitor etcd is of vital importance when running Kubernetes in production. Monitoring etcd will let you validate that the service performs as expected, while detecting and troubleshooting issues that could take your entire infrastructure down. Keep reading to learn how you can collect the most important metrics from etcd and use them to monit
Publish At:2020-08-06 13:18 | Read:104 | Comments:0 | Tags:Kubernetes Prometheus Monitoring Sysdig Monitor

Exporters and Target Labels

When monitoring third-party applications with Prometheus, you’ll need an exporter if the application doesn’t already expose metrics in the appropriate format. How do you find an appropriate exporter, and once you have your exporters, how should you organize your label taxonomies to reflect your infrastructure? Many applications in the syst
Publish At:2020-08-05 18:00 | Read:100 | Comments:0 | Tags:Prometheus Monitoring PromQL

From Instrumentation to PromQL

As a developer, getting metrics from your application onto a Prometheus graph can seem daunting. We’ll look at analyzing your service to find the most useful places to add metrics, how to add that instrumentation, getting it exposed and scraped, and then basic queries to use those metrics on graphs. Check out another article of mine for general
Publish At:2020-07-23 13:20 | Read:93 | Comments:0 | Tags:Prometheus Monitoring PromQL Sysdig Monitor

New and improved dashboards: PromQL, Teams sharing, and more!

To accompany Sysdig’s announcement of the first cloud-scale Prometheus monitoring offering, we had to re-architect our dashboarding experience from the ground up to support the Prometheus query language, PromQL. The query language is the standard method to query metrics within the ecosystem, and it’s an entirely new way to slice and dice metrics within Sys
Publish At:2020-06-17 12:37 | Read:188 | Comments:0 | Tags:Prometheus Sysdig Monitor Monitoring PromQL

Improving the Prometheus exporter for Amazon CloudWatch

A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a Prometheus server allows leveraging of the power of PromQL queries, integrating AWS metrics with those from other applications or cloud providers, and creating advanced dashboards for digging down into problems. But, who wa
Publish At:2020-05-24 09:25 | Read:269 | Comments:0 | Tags:AWS Falco falco Monitoring PromCat Prometheus Sysdig Monitor

OpenMetrics: Is Prometheus unbound?

This article will introduce OpenMetrics, compare it to the Prometheus exposition format and review the current status of its implementation. This is the written evolution of a lightning talk I gave on May, 19th (2019) at Cloud_Native Rejekts in Barcelona
Publish At:2020-04-07 11:47 | Read:439 | Comments:0 | Tags:Prometheus Monitoring OpenMetrics

Challenges using Prometheus at scale

This article will cover the most common challenges you might find when trying to use Prometheus at scale. Prometheus is one of the foundations of the cloud-native environment. It has become the de-facto standard for visibility in Kubernetes environments, creating a new category called Prometheus monitoring. The Prometheus journey is usually tied to th
Publish At:2020-03-26 14:09 | Read:527 | Comments:0 | Tags:Prometheus Kubernetes Monitoring Sysdig Monitor

PromCat: A resource catalog for enterprise-class Prometheus monitoring

PromCat, short for Prometheus Catalog, is a resource catalog for enterprise-class Prometheus monitoring. Prometheus has been revolutionary in the way we monitor our cloud-native environments, attracting immense attention from the open-source community and making the amount of Prometheus monitoring resources explode. Now, there are so many resour
Publish At:2020-03-24 12:51 | Read:280 | Comments:0 | Tags:Prometheus Monitoring PromCat

How to protect against stalkerware, a murky but dangerous mobile threat

Last week, we pledged that—in honor of National Cybersecurity Awareness and Domestic Violence Awareness months—we would continue the fight against the online scourge known as stalkerware, or applications used to track and spy on victims without their knowing consent. We told readers that, despite working to protect against stalkerware programs for more th
Publish At:2019-10-09 11:20 | Read:1245 | Comments:0 | Tags:Stalkerware domestic abuse domestic violence monitoring moni

Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Register now for the upcoming webinar on April 27 to learn more about what’s in the new release of Bromium Secure Platform. Virtualizat
Publish At:2017-04-16 13:05 | Read:3787 | Comments:0 | Tags:Company News 4.0 attacks blacklisting blocking Bromium Secur

Iran orders media companies to store data in the country

Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related to the Iranian citizens. The Iranian Government spends a significant effort for the Internet monitoring and control, its activities often lead to a concrete censorship. Last year the Government of Teheran has blocked Telegram and many othe
Publish At:2016-06-01 09:20 | Read:4288 | Comments:0 | Tags:Breaking News Laws and regulations Security Social Networks

Audio fingerprinting being used to track Internet users

A study of online trackers carried out by researchers at Princeton University allowed the identification of the Audio fingerprinting tracking technique. Privacy is probably one of the most debated arguments when dealing with the Internet, we discussed several times the way to protect anonymity online and which are the attacks law enforcement and intelligen
Publish At:2016-05-21 17:50 | Read:4056 | Comments:0 | Tags:Breaking News Digital ID Audio fingerprinting monitoring Ope

FISA Court approved each and every request made by the government in 2015

According to a Justice Department memo, the FISA ACT Court approved each and every request made by the government in 2015. According to a Justice Department memo, the United States Foreign Intelligence Surveillance Act (FISA) Court approved each and every request made by the government in 2015. All of the 1,457 requests made last year by the NSA and FBI were
Publish At:2016-05-02 17:35 | Read:4405 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations DoJ Facebook F

The FBI requests $38 Million to counter the threat of Going Dark

The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget fo
Publish At:2016-02-12 20:10 | Read:3403 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Intelligence Laws and regu

Italian intelligence plans to monitor also communications through the Playstation

Italian intelligence is planning to invest in solutions that could allow its counter-terrorism agents to monitor Sony’s PlayStation Network. The Italian intelligence is planning to invest in solutions that could allow the agents of the Italian counter-terrorism to monitor Sony’s PlayStation Network in order to prev
Publish At:2015-12-01 00:00 | Read:3702 | Comments:0 | Tags:Breaking News Hacking Intelligence Laws and regulations Secu

Tools

Tag Cloud