https://github.com/sysdiglabs/sysdig-trial-lab
https://github.com/sysdiglabs/sysdig-trial-lab
Last synced: 4 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/sysdiglabs/sysdig-trial-lab
- Owner: sysdiglabs
- License: apache-2.0
- Created: 2022-09-22T13:56:21.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-10-20T10:07:53.000Z (over 3 years ago)
- Last Synced: 2025-07-02T14:11:18.259Z (7 months ago)
- Size: 19.5 KB
- Stars: 2
- Watchers: 7
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Sysdig Trial Lab
Sysdig Trial Lab
| :warning: **This is unofficial and unsupported procedure. See the [official documentation](https://docs.sysdig.com/en/docs/sysdig-secure/).** |
| --- |
The objective of this document is to provide instructions (automated ish) to get the most out of a Sysdig trial, including:
* Deploying a small Kubernetes cluster (minikube, kind or eksctl)
* Deploy the Sysdig Agent
* Deploy a vulnerable application
* Deploy a cryptominer application
Then:
* How to create scanning policies
* How to perform a vulnerability scanner against a container image
* How to create runtime policies and rules
* How to trigger alerts based on the policies/rules
* Enabling rapid response
* Machine Learning detection and response
* Drift detection
* Risk Spotlight
# Environment
In order to have a frictionless environment, a new Kubernetes cluster will be deployed.
# References
* [Sysdig official documentation](https://docs.sysdig.com/en/docs/sysdig-secure)
# Steps
* [0 - Prerequisites](docs/0-prerequisites.md)
* [1 - Kubernetes cluster deployment](docs/1-kubernetes-cluster-deployment.md)
* [1.1 - Minikube](docs/1.1-minikube.md)
* [1.2 - Kind](docs/1.2-kind.md)
* [1.3 - eksctl](docs/1.3-eksctl.md)
* [2 - Deploy Sysdig Agent](docs/2-deploy-sysdig-agent.md)
* [3 - Deploy a vulnerable application](docs/3-deploy-a-vulnerable-application.md)
* [4 - Deploy a cryptominer application](docs/4-deploy-a-cryptominer-application.md)
* [5 - Creating scanning policies](docs/5-creating-scanning-policies.md)
* [6 - Perform a vulnerability scan](docs/6-perform-a-vulnerability-scan.md)
* [7 - Create runtime policies and rules](docs/7-create-runtime-policies-and-rules.md)
* [8 - Trigger alerts based on policies/rules](docs/8-trigger-alerts-based-on-policies-rules.md)
* [9 - Enabling rapid response](docs/9-enabling-rapid-response.md)
* [10 - Machine Learning detection and response](docs/10-machine-learning-detection-and-response.md)
* [11 - Drift detection](docs/11-drift-detection.md)
* [12 - Risk Spotlight](docs/12-risk-spotlight.md)
* [99 - Tips and tricks](docs/99-tips-and-tricks.md)