Blog
Do you have something to share? Contribute to Falco blog!
Kubernetes Response Engine, Part 2: Falcosidekick + OpenFaas
This blog post is part of a series of articles about how to create a Kubernetes response engine with Falco, Falcosidekick and a FaaS. See other posts: Kubernetes Response Engine, Part 1 : Falcosidekick + Kubeless Kubernetes Response …
Falco 0.28.0 a.k.a. Falco 2021.04
Today we announce the spring release of Falco 0.28.0 🌱 This is the second release of Falco during 2021! You can take a look at the set of changes here: 0.28.0 As usual, in case you just want to try out the stable Falco 0.28.0, you can …
Falco Security and Monitoring on RKE Bare Metal Cluster with Rancher
Foreword This article is, like my previous article about OpenEBS and NFS Server Provisioner, a hands-on guide on how to install, configure and monitor your existing cluster with Falco. Background Kubernetes is a great technology and brings …
Contribution of the drivers and the libraries
We are excited to announce the contribution from Sysdig Inc. of the kernel module, the eBPF probe, and the libraries to the Cloud Native Computing Foundation. The source code of these components has been moved into the Falco organization. …
Falco 0.27.0 a.k.a. "The happy 2021 release"
Today we announce the release of Falco 0.27.0 🥳 This is the first release of 2021! You can take a look at the set of changes here: 0.27.0 As usual, in case you just want to try out the stable Falco 0.27.0, you can install its packages …
Kubernetes Response Engine, Part 1: Falcosidekick + Kubeless
This blog post is part of a series of articles about how to create a Kubernetes response engine with Falco, Falcosidekick and a FaaS. See other posts: Kubernetes Response Engine, Part 2 : Falcosidekick + OpenFaas Kubernetes Response …
An Introduction to Kubernetes Security using Falco
Let’s talk about Kubernetes security As Kubernetes continues to grow in adoption, it is important for us to know how to secure it. In a dynamic infrastructure platform such as Kubernetes, detecting and addressing threats is important but …