Install Host Shield in On-Prem Deployments
This topic helps you install Sysdig Host Shield in on-premises deployments, including air-gapped environments. Sysdig Host Shield powers both Sysdig Monitor and Sysdig Secure, but the installation process differs for each product. Install it in your environment to begin collecting system metrics and events. You can also integrate with cloud monitoring services such as AWS, Azure, and GCP. If you use both Sysdig Monitor and Sysdig Secure, follow the Sysdig Secure installation process.
For more information, see the following:
- Installing Shield for Sysdig Monitor : Sysdig Monitor provides monitoring and troubleshooting, cost-optimization, and alerting capabilities with process-level visibility into your dynamic, distributed production environments.
- Installing Shield for Sysdig Secure: Sysdig Secure provides runtime security, identity management, compliance, vulnerability management, and response. Runtime security includes workload and container drift monitoring, image profiling, activity auditing, and network security policy generation. Compliance enables you to check your workloads and cloud environments against compliance standards like CIS benchmarks. Vulnerability management includes runtime vulnerability scanning, build pipeline scanning, and registry scanning. Rapid Response allows designated advanced users to connect remotely to a host for forensic investigation.
For on-prem installation of the backend components, use the On-Premises Deployments documentation with the assistance of your Sysdig representative.
Next Steps
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.