- 1:
- 2:
- 3:
- 3.1:
- 3.1.1:
- 3.1.2:
- 3.1.3:
- 3.1.4:
- 3.1.5:
- 3.1.6:
- 3.1.7:
- 3.1.8:
- 3.1.9:
- 3.1.10:
- 3.1.11:
- 3.2:
- 4:
- 5:
- 6:
- 7:
- 8:
- 9:
- 9.1:
- 9.2:
- 9.2.1:
- 9.2.2:
- 9.2.3:
- 9.2.4:
- 9.3:
- 9.3.1:
- 9.3.2:
- 9.3.3:
- 9.3.4:
- 9.4:
- 9.5:
- 10:
- 11:
- 12:
Administration Settings
The Settings panel can be accessed from both Sysdig Monitor and Sysdig
Secure UIs, and by both administrator and non-admin users.
Access Settings Panel
Log in to Sysdig Monitor or Sysdig Secure.
Hover the mouse over the User menu in the lower left corner of the navigation bar.
The two ways to access the Settings links are displayed:
- Quick links in the User menu, organized into their usage groups
- The Settings gear symbol in the right corner of the User menu, which takes you to the Settings landing page.

The links displayed depend on whether you logged in with Admin or User priviledges. Administrators have rights to manage Users, Teams and Licenses which non-admin users do not see.
1 -
User Profile and Password
Access the User Profile page to review and perform necessary actions:
Access the User Profile Page
Log in to Sysdig Monitor or Sysdig Secure and select Settings
from the user menu.
Select User Profile
.

Review settings and perform actions below.
Review User Email, Role, and Current Team
The current user’s login email address, current team, and role on that
team are listed in the User Profile section.
Change Admin Settings
This option is visible to admins only.
If logged on as Administrator, you can access Admin Settings on this
page which apply globally.
Hide Agent Install: Toggle this slider to hide the Agent Installation link in the Settings menu from non-admin users.
See Navigate the Settings Panel: Admin vs User and Agent Installation: Overview and Key for more information.
Retrieve the Sysdig API Token
When using the Sysdig API with custom scripts or applications, an API
security token (specific to each team) must be supplied.
Log in to Sysdig Monitor or Sysdig Secure and select Settings
from the user menu.
Select User Profile
.
The Sysdig Monitor or Sysdig Secure API token
is displayed (depending on which interface and team you logged in
to).

You can Copy
the token for use, or click the Reset Token
button
to generate a new one.
When reset, the previous token issued will immediately become
invalid and you will need to make appropriate changes to your
programs or scripts.
Change Your Password
Use the Password Management fields to change this user’s password.
Required: Minimum 8 characters, not the last password used.
Recommended: We advise following
NIST’s most up-to-date
recommendations, with an emphasis on length and uniqueness.
Enable Beta Functions from Sysdig Labs
Toggle the feature settings listed under Sysdig Labs to enable/disable
specific beta functionalities to your installation. Data that has
already been stored will not be affected by beta toggles.
(If there are no beta features, Sysdig Labs will not be displayed.)
1.1 -
Retrieve the Sysdig API Token
When using the Sysdig API with custom scripts or applications, an API
security token (specific to each user+team) must be supplied.
Log in to Sysdig Monitor or Sysdig Secure and select Settings
from the user menu.
Select User Profile
.
The Sysdig Monitor or Sysdig Secure API token
is displayed (depending on which interface and team you logged in
to).

You can Copy
the token for use, or click the Reset Token
button
to generate a new one.
When reset, the previous token issued will immediately become
invalid and you will need to make appropriate changes to your
programs or scripts.
2 -
User and Team Administration
This page describes the concepts behind Sysdig’s users, teams, and role
permissions.
Understanding Sysdig Users
Users in Sysdig are identified by user name, email address, and password
or third-party authentication option.
Users are either:
Invited manually by an Administrator via the Sysdig UI
Authenticated through a third-party system
Entered directly in the Sysdig database through the Admin API, which
can bypass the invitation process if needed.
When invited, the new user is created in the Sysdig database upon the
user’s first successful login to the Sysdig UI. Before the user accepts
the invitation, enters a password, and logs in, they have a “pending”
status.
System-Based Privileges
From the outset, users in the Sysdig environment have one of three types
of system privileges
(Super) Admin: This is the administrator whose email address is
associated with the Sysdig billing account. This user has
administrator access to everything. Most relevant in on-prem
installations.
Administrator: Any administrator can grant Admin system
privileges to any user. Administrators are automatically members of
all teams.
Administrators can create/delete users; create/configure/delete
teams; create/delete notification channels; manage licenses; and
configure Agents from links in the Settings menu that are hidden
from non-admins.
User (non-admin): By default, new users have read/write
privileges to create, delete, and edit content in the Sysdig
interface. They do not see options in the Settings menu that are
restricted to Administrators.
User rights are further refined based on team and team role
assignments, as described below.
When a user is created, it is automatically assigned to a default
team (described below).
Notice that this default workflow grants all new users Edit access.
Understanding Sysdig Teams
Teams can be thought of as service-based access control. Teams are
created and assigned separately in Sysdig Monitor and Sysdig Secure.
Purpose of Teams
Organizing users into teams enables enforcing data-access security
policies while improving users’ workflows. There are different team
roles, each of which has read/write access to different aspects of the
app.
This limits the exposure of data to those who actually need it, and also
makes users more productive by focusing them on data that is relevant to
them.

The following are some potential use cases for Teams.
“Dev” vs “Prod”: Many organizations prefer to limit access to
production data. Permits isolating physical infrastructure and the
applications on top.
Microservices: Scoping data for individual dev teams to see
their own dashboards and field their own alerts. Permits team
creation based on logical isolation using orchestration or config
management metadata in Sysdig Monitor.
Platform as a Service: Where Ops teams need to see the entire
platform. Enabling certain people to see all data for all services
as well as the underlying hardware. This is perfect for managed
service providers who are managing a multi-tenant environment, or
devops teams using a similar model within their own organization.
Restricted environments: Limiting data access for security and
compliance. Certain services, such as authentication and billing,
may have a very specific set of individuals authorized to access
them.
Organizations that need to segment monitoring for efficiency:
Wide-ranging use case from very large organizations forming teams to
simplify access, to smaller orgs creating ephemeral troubleshooting
teams, to teams formed to optimize QA and Support access to system
data.
Operations Teams and Default Teams
Out of the box, the Sysdig Platform has one immutable team for each
product. Depending on licensing, an organization may use one or both:
Monitor Operations team
Secure Operations team
Key traits of the immutable Operations teams:
The teams cannot be deleted
Users in Operations teams have full visibility to all resources in
that product
Administrators must switch to the Operations team before changing
configuration settings for any team
Administrators create additional teams and can designate any team to
become the default team for that product. The number of teams
allowed in an environment is determined by
licensing.
Users entered in the Sysdig Monitor UI are auto-assigned to the Monitor
default team; users entered in the Sysdig Secure UI are auto-assigned to
the Secure default team.
If the Essentials tier is licensed, only the default teams and roles are
enabled. See Subscription
for more details.
If upgrading from Essentials to Enterprise,
Capture functionality will
become available. Users must go to Settings>Teams><Your Team>
and
check the Enable Captures
box. They must then log out and log in
again.
Team-Based Roles and Privileges
Users can be assigned roles that expand or limit their basic system
privileges on a per-team basis.
Admin | Member of every team, with full permissions regardless of team assignment. Can create/delete/configure all users. Can create/delete/configure all teams. | | | |
| Team Manager (Monitor) | Advanced User (Monitor) | | Standard User (Monitor) |
Non-Admin (Sysdig Monitor) | Can create/edit/delete dashboards, alerts, or other content + ability to add/delete team members or change team member permissions. NOTE: Team Managers only have user administration rights within the specific team(s) for which they are designated Managers. | Can create/edit/delete dashboards, alerts, or other content. | | Equivalent to an Advanced User with no access to the Explore page (e.g. for developers who are not interested in Monitoring information). |
| Team Manager (Secure) | Advanced User (Secure) | Service Manager (Secure) | Standard User (Secure) |
Non-Admin (Sysdig Secure) | Same permissions as the Advanced User + ability to add/delete team members or change team member permissions. NOTE: Team Managers only have user administration rights within the specific team(s) for which they are designated Managers. | Can access every Secure feature within the team scope in read and write mode. Advanced Users can create, delete, or update runtime policies, image scanning policies or any other content. The Advanced User cannot manage users. Free Tier users are automatically assigned to Advanced User role. | Same as Standard User, plus ability to invite existing users to the team and manage the notifications channels assigned to the team. | Can push container images to the scanning queue, view image scanning results, and display the runtime security events within the team scope. Standard Users cannot access Benchmarks, Activity Audit, Policy definitions, or certain write functions within other Secure features. |
| See How Team Membership Affects Users' Experience of the UI for more detail. | | | |
How Team Membership Affects Users’ Experience of the UI
Team membership affects user experience of the Sysdig Monitor or Sysdig
Secure UIs in various ways.
At the highest level, the dashboards, alerts, and policy events you
see are limited by the settings of the team you are switched to.
In more detail, team settings affect the following:
Default landing page: The UI entry point is set on a per-team
basis.
Explore tab and dashboards: These are set per-team,
per-user and can be shared with the team.
On first login, all team members see the same Dashboards Assigned
to Me view. If a user changes those dashboards, only that user will
see the changes.
Dashboards created while part of a team are only visible to the user
when logged in to that team, and if shared, are only visible to
other team members.
Visible data: A team’s scope settings limit the data visible
to team members while they are switched to that team, even if a user
belongs to other teams with different settings that reveal
additional data. In Sysdig Secure, for example, only the policy
events that fired within your scope will be visible.
Alert and Event: These settings are team-wide. Any
member of a team can change the team’s alert settings, and any
additions or edits are visible to all members of the team.
Captures: Can only be taken on hosts/containers visible to team
members, and members see only the list of captures initiated by
other members who were switched to the current team.
API Token: Note that the Sysdig Monitor API Token found under
Settings > User Profile is unique per-user, per-team. (See
User Profile and Password. This is
necessary to enable the generation of Custom Events via the API to
target a specific team.
Switching Teams in the UI
Users can switch between all teams to which they’ve been assigned, and
Administrators can switch between all teams that have been created.
To do so:
Click the user menu in the lower-left corner of the
navigation bar.
The assigned teams for this user are listed under Switch Teams.

NOTE: With version 3.6.0, you can also search for the teams in the
user menu.
Click another team name.
A popup window gives an overview of the new team-based view of the
environment. The UI changes according to the team settings.
Onboarding Best Practices
Plan teams and roles strategically to isolate access to data, customize
interfaces, and streamline workflows.
In general, administrators should:
Create teams, invite
users, and set roles in
a planned manner
Start with some dashboards and alerts for given teams to get started
with
When a user logs in to a team for first time, they will see a
wizard introducing dashboards, alerts, etc. specific to that team.
Restricting New User Rights by Default
By default, new users (added manually or through a third-party
authenticator) are assigned Advanced User rights. If a administrator
wants to limit new users’ rights further, there are several ways to do
so.
Between sending the invitation and the user’s first log in, change
the user’s Role in the default Monitor team to Read User.
Note that there could theoretically be a lag in which the user would
briefly have had Edit status.
Integrate users into Sysdig via the Admin API and define read-only
permissions upon import.
Create a default team, in either Sysdig Monitor or Sysdig Secure,
with very limited scope and visibility. Manually assign users to
additional teams with broader permissions as needed.
Custom Roles
If Team-Based Roles and Privileges don’t meet the specific needs of your organization, you can create your own custom roles. See .
Integrating Users and Teams via API
If you are working with Sysdig Support Engineers to provision users and
teams via the Sysdig API, note how the user and team role names within
the UI map to the API ROLE
names.
User roles
Regular (non-admin) = ROLE_USER
Admin = ROLE_CUSTOMER
Team roles
Advanced user = ROLE_TEAM_EDIT
Standard user = ROLE_TEAM_STANDARD
View-only user = ROLE_TEAM_READ
Team manager = ROLE_TEAM_MANAGER
Service manager (Sysdig Secure only) = ROLE_TEAM_SERVICE_MANAGER
2.1 -
Manage Users
This page describes how to add, delete, and configure user information
from within the Sysdig Monitor or Sysdig Secure UI.
Users added in Sysdig Monitor will appear in the full list of users for
both Sysdig Monitor and Sysdig Secure, if both products are in use.
However, users will not have log in access to Sysdig Secure until they
are added to a Sysdig Secure team.
Create a User
Only Admin users can configure user account information.
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Users.
Click the Add User link.
Enter the user’s email address, first name and last name:

Click Save to send the user invite, or click Cancel to discard
the user.
For on-premises environments, you may need to have pre-configured
your SMTP parameters in your
Replicated or
Kubernetes
installation configmap.
The new user will be added to the User Management
table. Their status
will be listed as Pending
until the invitation is accepted.
Admin privileges cannot be assigned until the invitation has been
accepted, and the user has logged into the interface for the first time.
They can, however, be added to additional teams or have team-based roles
assigned. For more information on configuring teams roles, refer to the
Manage Teams and Roles
documentation.
To edit an existing user:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Users.
Select the user from the User Management table.
Optional: Edit the first name / last name.
Optional: Toggle the Admin switch to enable/disable
administrator privileges.
Click Save to save the changes, or Cancel to revert the unsaved
changes.
User emails are read-only, and cannot be changed.
Delete a User
To delete an existing user:
Deleting a user cannot be undone. Any dashboards or explore groupings
that the user created for any team will be permanently deleted.
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu. `
Select Users.
Select the user from the User Management table.
Click Delete User.
Click Yes, delete to confirm the change.
You can optionally delete the dashboards and artifacts that the user have created.
2.2 -
Manage Custom Roles
A custom role is a admin-defined role which allows Sysdig administrators to bundle a set of permissions and allocate it to one or more users or teams. This page describes how to create and use custom roles.
Custom Roles is supported only on SaaS regions. The feature is not currently available for on-prem environments.
Understand Custom Roles
Custom roles gives you the ability to provide granular access to users according to a selected list of permissions. If the Sysdig Roles don’t meet the specific needs of your organization, you can create your own custom roles. Select the permissions you want them to have based on the resource they should have the access to and bundle it together. Just like built-in Sysdig roles, you can assign custom roles to users and teams. Custom roles ensures that the users have only the permission they need and help prevent unwanted access to other resources.
Custom roles operate on concepts similar to roles-based access control system (RBAC).
Benefits of Using Custom Roles
Allow you to give access to a specific set of predefined dashboards to a group of users, who should not be able to view any additional data, nor change or share these dashboards.
Allow you to create a service account for Sysdig Secure that is not tied to a particular user but can be used to automate your CI/CD pipeline.
- Give custom set of permissions to the CI/CD account
- Give permission to create these accounts to a certain set of users
Allow you to identify the owner of a particular image so the security issue can be assigned to the actual team who owns the issue.
Create a team role that can only invite users but not actually manage the team.
Create a Custom Role
Log in to Sysdig Monitor or Sysdig Secure as administrator and select Settings.
Select Roles.
Click New Role.
The New Role page is displayed.

Specify the following:
- Role Name: A unique name to identify the role you create.
- Role Description: A short explanation of the role that you have created.
- Product: A filter that gives a fine-grained view of the product-specific features.
Select the features and do one of the following:
- From the drop-down, select one of the following: No Access, Read Only, Full Access, Custom.
- Click Customize to provide grant granular permissions to a sub-set of features. This is an alternative to clicking Custom from the drop-down.
Click Save New Role.
Assign a Custom Role to Teams
You can set up a custom role as the default user role for teams. To do so:
Log in to Sysdig Monitor or Sysdig Secure as administrator and select Settings.
Select Teams.
Do one of the following:
- Select the relevant team from the list of teams.
- Click Add Team.
From the Default User Role drop-down, select one of the custom role you have created.

Complete creating or editing the team as given in Manage Teams and Role.
Click Save.
Custom Roles and Privileges
Click Customize to view and select granular permissions for each product features. Alternatively, use the drop-down to grant read access or full access to all the privileges simultaneously.
Sysdig Monitor
Features | Privileges |
Overview/Insights | |
Dashboards | Dashboard Dashboard Metrics Data |
Explore/Metrics | Agent Console Agent Console - Agent Status Agent Console - Configuration Agent Console - Diagnostics Agent Console - Network Calls Agent Console - Sensitive Configuration Explore Shared Groupings with Team |
Alerts | Alert Events Alerts |
Events | Custom Events |
Captures/Investigate | Captures |
Settings | API Access Token AWS Settings Agent Installation Alert Downtimes Global Notification Channels Notification Channels Subscriptions Sysdig Storage Team Agent Console Access Toggle Team Captures Access Toggle Team Membership Teams Users Users List |
Integrations | Custom Integrations Infrastructure Integrations PromCat Integrations Providers Spotlight |
Data Access Settings | Datastream Groupings Metadata Metrics Data Metrics Descriptors PromQL Metadata |
Sysdig Secure
Features | Privileges | Description |
Scanning | Image Import Scanning Scanning Alerts Scanning Image Results Scanning Policies Scanning Policy Assignments Scanning Registry Credentials Scanning Runtime Scanning Scheduled Reports Scanning Trusted Images Scanning Trusted Images Scanning Untrusted Images Scanning Vulnerability Exceptions |
Posture | Benchmark Tasks Benchmarks Compliance |
Policies | Image Profiling Policies Policiy Advisor |
Network Security | Network Security |
Integrations | Providers |
Settings | API Access Token AWS Settings Agent Installation Cloud Accounts Events Forwarder Global Notification Channels Notification Channels Subscriptions Sysdig Secure Settings Sysdig Storage Team Agent Console Access Toggle Team Captures Access Toggle Team Membership Teams Users Users List |
Captures / Investigate | Activity Audit Commands Captures Rapid Response |
Data Access Settings | Groupings Metrics Data Metrics Descriptors |
Events | Policy Events |
2.3 -
Manage Teams and Roles
The use of teams provides a strategic way to organize groups, streamline
workflows, or protect data, as needed by an organization. Administrators
who design and implement teams should have in-depth knowledge of
organizational infrastructure and goals.
Only Advanced users can configure team permissions. Teams and roles must
be assigned separately in Sysdig Monitor and Sysdig Secure.
For more information, including foundational concepts, see User and
Team Administration.
Create a Team
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Teams.
Click Add Team.
Configure the team options and click Save.
For more information on each configuration option, refer to Team Settings.
Ensure that the team names are unique in both Monitor and Secure
products. For example, if you attempt at creating a team in Secure with
the same name as one created in Monitor, you will see an error message
stating that a team with the same name already exists and you will be
prevented from creating the team.
Team Settings
Setting | Req'd | Description |
Color | Yes | Assigns a color to the team to make them easier to identify quickly in a list. |
Name | Yes | The name of the team as it will appear in the "Switch to" drop-down selector and other menus. |
Description | No | Longer description for the team. |
Default Team | No | If users are not assigned to any team, they will automatically be a part of this team if it's turned on. |
Default User Role | No | You can choose either [Custom Roles]((en/docs/administration/administration-settings/user-and-team-administration/manage-custom-role/#manage-custom-role) or [Sysig Team-Based Roles](en/docs/administration/administration-settings/user-and-team-administration/#team-based-roles-and-privileges). If no specific choice is made, Advanced User will be automatically selected. Choose a different role from the drop-down menu to set a different default user role for this team. . |
Default Entry Point | Yes | Defaults to the Explore page; choose an alternate entry if needed. |
Team Scope | Yes | Determines the highest level the data to which team members will have visibility. Agent Metrics: If set to Host, Team members can see all Host-level and Container-level information. If set for Container, Team members can see only Container-level information. Prometheus Remote Write Metrics: Visible if Prometheus Remote Write is enabled for your account. Use this option to determine what level of Prometheus Remote Write data that your Team members can view. You can further limit what data team members can see by specifying tag/value expressions for metrics for each data source. The drop-down menu defaults to "is", but can be changed to "is not", "in", "contains", and etc. Complex policies can be created by clicking Add another to create AND chains of several expressions. Note that making changes to the Team Scope settings can have a dramatic impact on what's visualized in the Team's Dashboards that are already configured, so you may want to carefully review these before/after your change. |
Additional Permissions | | Sysdig Capture: Enable this option to allow this team to take Sysdig Captures. Captures will only be visible to members of this team. WARNING: Captures will include detailed information from every container on a host, regardless of the team's Scope. Infrastructure Events: Enable this option to allow this team to view ALL Infrastructure and Custom Events from every user and agent. Otherwise, this team will only see infrastructure events sent specifically to this team. AWS Data: Enable this option to give this team access to AWS metrics and tags. All AWS data is made available, regardless of the team's Scope. Agent CLI: Enable this option to give this team access to Agent Console. Infrastructure Event: Enable this option to give this team access to infrastructure events. |
Team Users | No | Click to select any non-Admin users to be immediately added to this Team. Admins are filtered out by default, since they are members of every team automatically. |
Configure an Entry Page or Dashboard for a Team
Some Sysdig Monitor teams benefit from using a default entry point other
than the usual Explore page, as users who don’t need in-depth monitoring
information can onboard and navigate Sysdig Monitor more efficiently.
Use the Default Entry Point setting on the Team page, as shown in
Create a Team.
Note: If selecting a dashboard, open the secondary Dashboard drop-down
menu, or type the name of the dashboard to select it.
The dropdown is only populated with shared dashboards accessible by
anyone on the team.
Users can be assigned to multiple teams. Team assignment is made from
the Team page (not the User page), and must be done by an Administrator
or Team Manager.
Users added in Sysdig Monitor will appear in the full list of users for
both Sysdig Monitor and Sysdig Secure, if both products are in use.
However, users will not have log in access to Sysdig Secure until they
are added to a Sysdig Secure team.
Assign a User to a Team
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Teams.
Select the relevant team from the list, or search for it with the
search box, and then select the relevant team.
In the Team Users section, click the Assign User button.
Select the user from the drop-down list, or search for it and then
select it.
Click the Role drop-down menu to select the user
role:

Optional: Repeat steps 3 to 5 for each additional user.
Click Save.
Assign a Team-Based Role to Users
Review Team-Based Roles and Privileges for an overview.
Note that the Advanced User permission can be further refined into
either a View-only user or a Team Manager.
Managers can add or delete members from a team, or toggle members'
rights between Edit, Read, or Manager.
Note that Admins have universal rights and are not designated as
Team Managers, Advanced Users, View-Only users, or Standard users.
Manager or Advanced User permissions can be assigned even to Pending
users; administrators do not have to wait for the user’s first login to
set these roles.
To assign a role to a user on a team:
Log in to Sysdig Monitor or Sysdig Secure as Administrator and
either create a team or select a team to edit.
Add a user or select a user from the list of team members.
Select the appropriate role from the
drop-down menu.

Reminder of the role privileges:
Admin: Member of every team with full permissions. Can
create/delete/configure all users and teams.
Team Manager: Advanced User privileges + ability to
add/delete team members or change team member permissions.
Advanced User:
In Sysdig Monitor: Read/write access to the components of the
application available to the team. Can create/edit/delete
dashboards, alerts, or other content.
In Sysdig Secure: Read/write access to the components of the
application available to the team. Can create, delete, or update
runtime policies, image scanning policies or any other content.
View-Only:
In Sysdig Monitor: Read access to the environment within team scope,
but cannot create, edit, or delete dashboards, alerts, or other
content.
In Sysdig Secure: Read access to every Secure feature in the team
scope, but cannot modify runtime policies, image scanning policies
or any other content.
Standard User:
In Sysdig Monitor: An Advanced User with no access to the Explore
page (e.g. for developers who are not interested in Monitoring
information).
In Sysdig Secure: Can send container images to the scanning queue,
view image scanning results, and display the runtime security events
within the team scope. Standard Users cannot access Benchmarks,
Activity Audit, Policy definitions, or certain write functions
within other Secure features.
Service Manager: Sysdig Secure only. Same as Standard User, plus
ability to invite existing users to the team and manage the
notifications channels assigned to the team.
Save edits.
Edit Team Configuration
To configure an existing team:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Teams.
Select the relevant team from the list, or search for it with the
search box, and then select the relevant team.
Edit as needed, and click Save.
For more information regarding the configuration options, see Table 1: Team Settings.
Delete a Team
When a team is deleted, some users may become “orphans”, as they are no
longer a part of any team. These users will be moved to the default
team.
The default team cannot be deleted. A new default team must be selected
before the old default team can be deleted.
To delete a created team:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Teams.
Select the relevant team from the list, or search for it with the
search box, and then select the relevant team.
Click Delete Team, then Yes, delete to confirm the change.
3 -
Notifications Management
Alerts are used in Sysdig
Monitor when Event thresholds have been crossed, and in Sysdig Secure
when Policy violations have occurred. Alerts can be sent over a variety
of supported notification channels.
Notification Management describes how to add, edit, or delete a variety
of notification channel types, and how to disable or delete
notifications when they are not needed, for example, during scheduled
downtime.
3.1 -
Set Up Notification Channels
Alerts are used in Sysdig
Monitor when Event thresholds have been crossed, and in Sysdig Secure
when Policy violations have occurred. Alerts can be sent over a variety
of supported notification channels.
In the Settings panel of either Sysdig Monitor or Sysdig Secure, set
up the notification channels to be used for alerting.
Notification channel management can be finessed by role-based
access
as follows:
Notification channels can now be “global” or limited to a particular
team
Global channels can be managed by admins and can be viewed/used by
other roles, while team-limited channels are available only to team
members
Team Manager , Advanced User, and Service Manager (Secure)
roles can create/update/delete team-scoped notification channels,
they can also read and use the global ones
Standard and View Only roles can read team-limited and global
notification channels
Admins will be able to create global notification channels and
migrate channels from “global” to “team-limited”, and also from one
team to another.
Add a Notification Channel
To add a new notification channel:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Select Notification Channels.
The Notifications main page is displayed:

Click Add Notification Channel +, and select the desired
notification channel.

Follow the channel-specific steps to complete the configuration
process:
After you have set up a notification channel, it will appear as an
available option to be assigned when you Add an
Alert
.
Edit a Notification Channel
To edit a notification channel:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Notification Channels
.
Locate the target channel and click the Edit
button.
Make the edits and click Done Editing
to save the changes.
Test a Notification Channel
To test a notification channel:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Notification Channels
.
Select the three dots next to a created Notification Channel and
click Test Channel
.

If a notification is not received within 10 minutes, the notification
channel is not working, and the configuration should be reviewed.
3.1.1 -
Amazon SNS Notifications
Sysdig Monitor integrates easily with AWS Simple Notification Service
(SNS).
On the AWS side:
To automatically push Sysdig Monitor alerts to the SNS topic of your
choice:
From the AWS
console, open the
SNS management console
In the Create topic section, Create a new topic (if needed).
The topic’s Name, ARN, (optional) Display name, and Topic owner’s
AWS account ID are displayed in the Details section.
Select the topic on the list.
Expand Access policy - optional.
Select Basic (By default).
Under Define who can publish messages to the topic, select
Only the specified AWS accounts and enter the Sysdig Monitor
account ID: 273107874544 (US-East Only).

For account IDs corresponding to other regions, see SaaS Regions
and IP Ranges.
Click Create topic.
Ensure that you subscribe to the created topic.
On the navigation panel, choose Subscriptions.
On the Create subscription page, enter the Topic ARN of the
topic you created earlier.
Specify other details and click Create subscription.
For further information about AWS SNS, refer to the AWS
documentation.
For SNS notification, you can click the ‘help’ button for tips on
setting up your SNS topic.
You will need to allow publishing rights to the Sysdig Monitor account
ID corresponding to your region.
This can be done by creating a new policy on your SNS topic in AWS
Console as shown in the below images:
Select “Edit topic policy” as shown below from “Other topic
actions.”

In the “Basic view” tab of the “Edit topic policy” dialog, select
“Only these AWS users” from the publisher’s list and enter the
Sysdig ID.

In the Sysdig Monitor UI:
Complete steps 1-3 in Set Up a Notification
Channel to log in to
the Sysdig UI and select Amazon SNS Topic
.

Enter the Topic created on the AWS side, along with a Channel
Name, Enablement, and Notification toggles as appropriate.
From Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Click Save
.
3.1.2 -
Email Notifications
To send an alert notification via email, you must first set up the email
notification channel.
To do so, complete steps 1-3 in Set Up a Notification
Channel, then:
Select Email
.
Enter the relevant details for the email notification:

From Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Click Save
.
If you enabled Test notification, a test email will be sent.
You can now configure an
alert
to use email notifications.
For on-premises environments, you may need to have pre-configured your
SMTP parameters in your
Replicated or
Kubernetes
installation configmap.
3.1.3 -
Team Email Notifications
You can notify all the users of a team when an alert is triggered. Sysdig allows you to create a new notification channel where you can select a team from a list of existing ones as the target of the channel.
To send an alert notification via email to a team, you must first set up the team email notification channel. To do so, complete steps 1-3 in Set Up a Notification Channel, then:
Select Team Email.
Enter the relevant details for the email notification:

Select the Team Name and specify a Channel Name to identify the channel you are creating.
From Shared With drop-down, choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Click Save.
If you enabled Test notification, a test email will be sent.
You can now configure an alert to use email notifications.
3.1.4 -
To send an alert notification via PagerDuty, you must first set up the
PagerDuty notification channel.
Prerequisites
Have an account configured at
PagerDuty.com.
Have your PagerDuty credentials available (account, password, and
service).
Have the base user role of Manager. With a PagerDuty base user role of Manager, you can auto-fetch
the service information during the Sysdig/PagerDuty integration
process.
Check your team and base user permissions. If your PagerDuty team permissions are Manager but base user
permissions are Responder or lower, you can enter the necessary
data in the Sysdig UI manually.

Base user roles in the PagerDuty UI.
To launch the process from the Sysdig UI, complete steps 1-3 in Set
Up Notification
Channels and select
PagerDuty
.
Do one of the following:
Once you complete the pre-configuration, the PagerDuty Integration screen is displayed.

Do one of the following:
Enter the email
and password
associated with your PagerDuty
account, and click Sign In.
Enter the appropriate PagerDuty subdomain for single sign-on and click
Sign In Using Your Identity Provider.
A PagerDuty service selection screen is displayed.
Option 1: If you have never integrated before, you are prompted
to choose a PagerDuty Servicename
.
Option 2: If at least one service has already been integrated,
you can select that one.

Click Connect
.
Once integration is authorized, the Sysdig page for a new PagerDuty
notification channel is displayed, with the information auto-filled.

From Shared With, choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Do one of the following:
Confirm the auto-populated information and click Save
.
If you chose Manual entry in Step 2, then type the information and
click Save
.
You can now Add an
Alert
to use PagerDuty notifications.
Known Issues
There is a known issue whereby changing a notification from
“Acknowledged” to “Unacknowledged” does not update correctly in
PagerDuty.
What occurs:
Event has triggered Notification, Notification is sent to PagerDuty.
Open Event and click on “Acknowledge” button in Sysdig.
Notification is sent to PagerDuty, and status is changed to
“Acknowledged.”
Open Event and click on “UnAcknowledge” button in Sysdig.

Status is not changed in PagerDuty. It remains “Acknowledged” rather
than changing to “Triggered” in PagerDuty.
Unknown issues & support
Sysdig support section.
3.1.5 -
Slack Notifications
To send an alert notification via Slack you must first set up the Slack
notification channel.
To do so:
Prerequisite:
Have a Slack account configured at Slack.com and
know which notification channel to use for notifications.
To launch the process from the Sysdig UI, complete steps 1-3 in Set
Up Notification
Channels and select
Slack.
You will be prompted to log in to your Slack account.
Select a Slack channel from the drop-down list to be used for
notifications and click Authorize.
From Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Complete configuration as desired and click Done.

Click Test to check the new functionality.
You can now configure an
alert
to use Slack notifications.
3.1.6 -
VictorOps Notifications
To integrate with your VictorOps
Log in to VictorOps.
Go to Settings > Alert Behavior > Integrations in the
VictorOps interface.
Select REST from the list of Featured Integrations.

Complete steps 1-3 in Set Up a Notification
Channel to log in to
the Sysdig UI and select VictorOps
.

Enter the VictorOps parameters in the Sysdig Notification Channel
fields, as follows:
API Key: everything between "/alert/" and “/$routing_key”
in the REST URL
Routing Key: A VictoOps way of routing alerts to appropriate
teams. See their Routing
Keys
documentation for details, if needed.
Channel Name: Choose a meaningful name like “VictorOps”.
Enable the channel and desired notification types.
From Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Click Save
.
3.1.7 -
OpsGenie Notifications
Go directly to the OpsGenie Integrations
Page to configure the
integration on the OpsGenie side.
OpsGenie maintains documentation on how to integrate with Sysdig
products (formerly called Sysdig Cloud)
here.
Complete steps 1-3 in Set Up a Notification
Channel to log in to
the Sysdig UI and select OpsGenie.

Copy/paste your OpsGenie integration API key and add a Channel Name,
Enablement, and Notification toggles as appropriate.
From Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Click Save
.
3.1.8 -
Sysdig Monitor supports sending an alert
notification
to Microsoft teams. Microsoft Teams has different types of integrations
for third-party applications, of which Sysdig supports Incoming
Webhooks.
About Incoming Webhooks
Incoming Webhooks are a type of Connector in Teams that provide
a simple way for an external app to share content in team channels. They
are often used as tracking and notification tools. Microsoft Teams
provides a unique URL to which you can send a JSON payload with the
message that you want to POST, typically in a card format. Cards are UI
containers that contain content and actions related to a single topic
and are a way to present message data in a consistent way.
You will need to enter the URL that you copied from the Connector.
Sysdig will format a message by using a custom card template and send it
to the channel. The message will show up as a new notification in the
Microsoft application.

Prerequisites
Have the destination URL handy. You can copy it from the
Connectors > Incoming Webhook window on the Microsoft
Teams UI. For more information, see Add an incoming webhook to a
Teams
channel.

Webhooks via HTTPS work only if a signed or valid certificate is in
use.
Enable Microsoft Teams
Complete steps 1-3 in Set Up a Notification
Channel and choose
Microsoft Teams.

Enter the configuration options:
URL: The destination URL you have copied from Microsoft
Teams UI.
Channel Name: Add a meaningful name for your Microsoft Teams
channel.
Enabled: Toggle on or off.
Notification options: Toggle for notifications when alerts
are resolved or acknowledged.
Test notification: Toggle to be notified that the configured
URL is working.
Shared With: Choose whether to apply this channel globally.
All Teams or to a specific team from the drop-down.
Click Save.
3.1.9 -
Sysdig Monitor and Sysdig Secure support sending an alert
notification
to a destination, such as a website, custom application, and so on for
which Sysdig does not have a native integration. Do this using a custom
Webhook channel.
Prerequisites
Enable Webhook
Complete steps 1-3 in Set Up a Notification
Channel and choose
Webhook
.

Enter the webhook channel configuration options:
URL: The destination URL to which notifications will be
sent.
Channel Name: Add a meaningful name, such as Ansible,
PagerDuty, OpsGenie, and so on.
Enabled: Toggle on and off notifications.
Notification options: Toggle for notifications when alerts
are resolved or acknowledged.
Test notification: Toggle to be notified that the configured
URL is working.
Shared With: Choose whether to apply this channel globally
(All Teams) or to a specific team from the drop-down.
Allow insecure connections: Enable if you want to skip the
TLS verification.
Custom headers: Add custom headers to your alert
notification.
If your webhook integrations require additional headers you
specify them by using a custom header.
For example, Ansible uses token-based authentication, which
requires an entry for the bearer token. This entry is not
included in the default header, but you can add it using a
custom header.
Alternatively, you can choose to add custom headers
programmatically as described in Configure Custom Headers and
Custom Data
Programmatically.
Custom Data: Specify the custom data you want to attach to
the alert notification. The data must be a valid JSON document.
This information will be included in the request body of the
HTTP call. Systems that receive these webhook alerts can parse
the data and take action based on the contents.
Click Save
.
When the channel is created, you can use it on any
alerts
you create.
Then, when the alert fires, the notification will be sent as a POST in
JSON format to your webhook endpoint. (See Alert Output, below.)
For testing purposes, you can use a third-party site to create a
temporary endpoint to see exactly what a Sysdig alert will send in any
specific notification.
By default, alert notifications follow a standard format (see
Description of POST Data, below).
However, some integrations require additional headers and/or data, which
you can append to the alert format using a custom header or custom data
entry.
For example, Ansible uses token-based authentication, which requires an
entry for the bearer token. This entry is not included in the default
alert template built into Sysdig, but you can add it using a custom
header.
In addition to the Webhook UI
option,
you can do this from the command line, as described below.
After it has been created via the API, any manipulation will mangle the
notification channel. Use with care.
Sample Use Case
This example adds two custom headers and defines additional custom data,
as well as the format for that data.
Use the curl command to retrieve all configured notification
channels:
curl -X GET https://app.sysdigcloud.com/api/notificationChannels -H 'Authorization: Bearer API-KEY'
Add the custom headers and execute the request:
curl -X PUT https://app.sysdigcloud.com/api/notificationChannels/1 -H 'Authorization: Bearer API-KEY' -H 'Content-Type: application/json' -d '{
"notificationChannel": {
"id": 1,
"version": 1,
"type": "WEBHOOK",
"enabled": true,
"name": "Test-Sysdig",
"options": {
"notifyOnOk": true,
"url": "https://hookb.in/v95r78No",
"notifyOnResolve": true,
"customData": {
"String-key": "String-value",
"Double-key": 2.3,
"Int-key": 23,
"Null-key": null,
"Boolean-key": true
},
"additionalHeaders": {
"Header-1": "Header-Value-1",
"Header-2": "Header-Value-2"
}
}
}
}'
Standard Alert Output
Alerts that use a custom webhook for notification send a JSON-format
with the following data.
Description of POST Data
{
"timestamp": 1620222000000000, // Time when the alert triggered in microseconds
"timespan": 60000000, // duration of the alert in microseconds (how long the value should be true before triggering)
"alert": {
"severity": 2, // severity from 0 to 7, use severityLabel for a human readable version
"editUrl": "https://app-staging.sysdigcloud.com/#/alerts/21998727", // alert edit URL
"severityLabel": "Medium", // human readable version of severity
"subject": "CPU temp is High on homebridge:9100 is Triggered", // Alert subject
"scope": null, // scope of the alert if set from the UI
"name": "CPU temp is High", // name of the alert
"description": null, // description, not used ATM
"id": 21998727, // alert id
"body": "CPU temp is High on homebridge:9100 is Triggered\n\n\nEvent Generated:\n\nSeverity: Medium\n Metric:\n node_hwmon_temp_celsius = 65.8121\nSegment:\n instance = 'homebridge:9100'\nScope:\n Everywhere\n\nTime: 05/05/2021 01:40 PM UTC\nState: Triggered\nNotification URL: https://app-staging.sysdigcloud.com/#/events/notifications/l:2419200/14918845/details\n\n------\n\nTriggered by Alert:\n\nName: CPU temp is High\nTeam: Monitor Operations\nScope:\n Everywhere\nSegment by: instance\nWhen: avg(avg(node_hwmon_temp_celsius)) > 40\nFor at least: 1 m\nAlert URL: https://app-staging.sysdigcloud.com/#/alerts/21998727\n\n\n"
},
"event": {
"id": 14918845, // id of the generated event
"url": "https://app-staging.sysdigcloud.com/#/events/notifications/l:604800/14918845/details" // url of the event in the feed
},
"state": "ACTIVE", // status of the alert, can be ACTIVE or OK
"resolved": true,
"entities": [ // list of entities that triggered the alert, at the moment we send a notification per entity, so this array will always contain a single object
{
"entity": "instance = 'homebridge:9100'", // segment that triggered
"metricValues": [ // value of the metric at the time of triggering
{
"metric": "node_hwmon_temp_celsius",
"aggregation": "avg",
"groupAggregation": "avg",
"value": 65.812167
}
]
}
],
"endEntities": [ // list of entities when the alert was resolved (same as "entities")
{
"entity": "instance = 'homebridge:9100'",
"metricValues": [
{
"metric": "node_hwmon_temp_celsius",
"aggregation": "avg",
"groupAggregation": "avg",
"value": 39.812167
}
]
}
],
"condition": "avg(avg(node_hwmon_temp_celsius)) > 40", // alert condition in string form
"source": "Sysdig Cloud", // source of the event
"labels": { // list of labels associated to this event (they strongly depend on the segmentation and scope of the alert)
"instance": "homebridge:9100"
}
}
Example of Failure
$ curl -X GET https://app.sysdigcloud.com/api/notificationChannels -H 'authorization: Bearer dc1a42cc-2a5a-4661-b4d9-4ba835fxxxxx'
{"timestamp":1543419336542,"status":401,"error":"Unauthorized","message":"Bad credentials","path":"/api/notificationChannels"}
Example of Success
$ curl -X GET https://app.sysdigcloud.com/api/notificationChannels -H 'Authorization: Bearer dc1a42cc-2a5a-4661-b4d9-4ba835fxxxxx'
{"notificationChannels":[{"id":18968,"version":2,"createdOn":1543418691000,"modifiedOn":1543419020000,"type":"WEBHOOK","enabled":true,"sendTestNotification":false,"name":"robin-webhook-test","options":{"notifyOnOk":true,"url":"https://postb.in/6dtwzz7l","notifyOnResolve":true}}]}
$
The webhook feature is used to integrate the following channels:
3.1.10 -
Sysdig can be integrated with ServiceNow using a custom webhook.
ServiceNowSetup
Prerequisites
Have a ServiceNow account set up and working.
If necessary, refer to ServiceNow developer documentation
here.
Create Scripted Rest API Details in ServiceNow GUI
Login to
ServiceNow
(developer entry) and create a Scripted REST API:

Click New
and submit the form with the following:
Name: SysdigAlert API ID: sysdigalert
Return to the Scripted REST APIs
and open the resource just
created.
Scroll down to the related list area, select Resources
, and
click New
. This will create a new Scripted REST API resource.
Fill in the Name
field e.g. Demo.

Scroll down to Security
and clear the checkbox that requires
authentication.

Change the HTTP method
from GET to POST.
The resource is created.
Add Code to the New Scripted API
Now give the resource the code to execute.
The default objects to work with in a Scripted REST API Resource are
response
and request
.
For more details on request and response see
Scripted_REST_Request_API
and
Scripted_REST_Response_API
The created resource will already have some example code:
(function process(/*RESTAPIRequest*/ request, /*RESTAPIResponse*/ response) {
// implement resource here
})(request, response);
Change this default code to:
(function process(/*RESTAPIRequest*/ request, /*RESTAPIResponse*/ response) {
gs.info(request.body.dataString);
})(request, response);
Note the following resource path to this newly created resource is
now visible: /api/snc/sysdigalert.
The url to this resource would be
https://yourInstance.service-now.com/<resource_Path or
https://yourInstance.service-now.com/api/snc/sysdigalert ``

Click Submit/Update on this resource.
Sysdig Webhook Setup
Now that the custom API endpoint in ServiceNow is created, you can
configure Sysdig alerts to use a custom webhook to trigger the
ServiceNow integration.
API URL: your instance name URL
Name: ServiceNow (or whatever name you’d like for this Sysdig alert
webhook)
Notify when OK: Optional
Notify when Resolved: Optional
Test Notification: Use this toggle and/or set up a test alert as
described in the following section.

Test Integration
To test if this ServiceNow integration is set up and working correctly,
you can set up a test alert to trigger.
For example, you could create an alert for CPU usage:

In ServiceNow, navigate to System Log >
All
to see a sample
triggered webhook.

3.1.11 -
Sysdig supports automatically sending alert notifications to an IBM
Cloud
Functions
Channel. You generally use it for the following use cases.
The following notification channel types are supported:
To configure IBM Cloud Functions Channel:
Log in to the Sysdig UI and select IBM Cloud Functions Channel
by completing steps 1-3 as described in Set Up a Notification
Channel.

Specify the channel URL.
You can specify one of the following channel types.
Continue with one of the following:
Specify the following:
IAM API Key:
Channel Name: A unique name to identify the channel.
Enable the channel and desired notification types:
Enabled: The toggle button to enable or disable the IBM
channel.
Notify when Resolved: Send a new notification when the alert
condition is no longer triggered. Enable or disable the
notification toggle as appropriate.
Notify when Acknowledged: Send a new notification when the
alert is manually acknowledged by a user. Enable or disable the
notification toggle as appropriate.
Test notification: Send a notification when the changes are
saved. Enable or disable the notification toggle as appropriate.
Shared With: Choose whether to apply this channel globally (All
Teams) or to a specific team from the drop-down.
Additional Parameters: Specify optional parameters to pass to
the function. For example, name: jane
is passed to the action as
{name: "Jane"}
.
Specify the following:
Whisk Auth Token (optional): Optionally provide the Whisk
authentication token. If you specify one, the public channel (web
action) can only be invoked by requests that provide appropriate
authentication credentials. See Securing web
actions
for more details.
Channel Name: A unique name to identify the channel.
Enable the channel and desired notification types:
Enabled: The toggle button to enable or disable the IBM
channel.
Notify when Resolved: Send a new notification when the alert
condition is no longer triggered. Enable or disable the
notification toggle as appropriate.
Notify when Acknowledged: Send a new notification when the
alert is manually acknowledged by a user. Enable or disable the
notification toggle as appropriate.
Test notification: Send a notification when the changes are
saved. Enable or disable the notification toggle as appropriate.
Shared With: Choose whether to apply this channel globally (All
Teams) or to a specific team from the drop-down.
Additional Parameters: Specify optional parameters to pass to
the function. For example, hostname: BLR
is passed to the action
as {hostname: "BLR"}
. The URL would be
/demo/hello.http?hostname=BLR
.
3.2 -
Disable or Delete a Notification Channel
Temporarily Disable a Notification Channel
To temporarily disable a notification channel:
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Notification Channels.
Toggle the Enabled
slider to off.
Mute Notifications During Downtime
Administrators can choose to turn off all alert events and notifications
if desired, for example, during a scheduled system downtime.
Muting notifications affects all channels globally. When muting is
switched on, no notifications will be sent through any configured
channel. You can choose whether to notify specific channels that
notifications are temporarily disabled. Muting and re-enabling
notifications is a MANUAL process.
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.

Select Notification Channels.
Select the Downtime
toggle.
Optional: check the Yes
box to Notify Channels
when
prompted, and select the desired channels.
At this time, only Email and Slack channels can be notified when
downtime is started/stopped.

Delete a Notification Channel
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Notification Channels
.
Select the three dots next to a created channel and click
Delete Channel
.

Sysdig alert jobs begin immediately at start-up. However, in instances
where Sysdig goes down unexpectedly, or without proper shutdown/startup
procedures implemented, data can be missing, triggering alert
notifications.
A start-up delay in alert jobs can be configured in on-premises
environments, by setting the draios.alerts.startupDelay
parameter. The
parameter requires a duration value; the example below shows a duration
of 10 minutes:
draios.alerts.startupDelay=10m
This parameter can be configured for either Replicated or Kubernetes
environments:
For Replicated environments, add the parameter to the Sysdig
application JVM options list. For more information, refer to the
Sysdig Install with
Replicated
documentation.
For Kubernetes environments, add the parameter to the
**sysdigcloud.jvm.worker.options
**parameter in the configmap
.
For more information on editing the configmap
refer to the
On-Premises
Installation
documentation.
4 -
AWS: Integrate AWS Account and CloudWatch Metrics (Optional)
When the Sysdig agent is installed in an AWS environment, the Sysdig
Platform can collect both general metadata and various types of
CloudWatch metrics.
There are three ways to integrate an AWS account into Sysdig:
By manually entering an AWS access key and secret key, and manually
managing/rotating them as needed
By passing a parameter that allows Sysdig to autodetect an AWS ECS
role and its permissions, passing an “implicit key” (On-Prem only).
The implicit option requires no manual key rotation as AWS handles
those permissions behind the scenes.
Using AWS Role
delegation. Role
delegation is an alternative to the existing integration methods
using the access keys. This method is considered secure as sharing
developer access keys with third-parties is not recommended by
Amazon.
The Sysdig Monitor UI includes links to help easily integrate CloudWatch
metrics into Sysdig Monitor, as described below.
After integrating with an AWS account, data will become visible in the
Sysdig UI after a 10-15 minute delay.
Entry Point in the Sysdig UI
The Sysdig interface prompts you to perform this integration from the
administrator’s Settings menu.
Once an agent has been installed, log in to Sysdig Monitor or Sysdig
Secure as administrator to perform integration steps or review/modify
existing AWS settings.
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings from the user menu.
Choose AWS Accounts.

A page showing manual key integration, with access key and secret
key fields displayed.
NOTE: If there is no AWS integration yet then click on ADD and
provide the access key and secret key.
Integrate AWS Account Manually
Have your AWS EC2 account details available. Integration begins on the
AWS side and is completed in the Sysdig Monitor UI.
In AWS
Create an IAM Policy for Sysdig Access
You could use the existing IAMReadOnly policy instead, but creating a
Sysdig-specific policy provides more granular access control, the
activity can be easily distinguished in CloudTrail, and it is considered
best practice.
In AWS, select IAM and create a policy to be used for Sysdig.
(Sample policy name: SysdigMonitorPolicy.)
Using the JSON editor view, copy/paste the Sysdig-specific policy
code into the new
policy and save it.
You can review the policy in the Visual Editor.
When reviewing the completed policy in the Visual editor, you should see
something like:

Create an IAM User and Grant Programmatic Access
Use an existing IAM user, or (best practice) create a specific IAM user
for the Sysdig Backend to programmatically access CloudWatch and use its
data.
In the IAM Console, add a
User.
Select AWS Access Type: Programmatic Access.
Select ‘Attach existing policies directly’, search for and then
select the newly created policy (Sample policy name:
SysdigMonitorPolicy.)
Select ‘Create User’ option.
Copy and save the resulting access key and secret key (Note: the
Secret is only displayed once, so make sure to download the
credentials file or store the key securely that you can reference
again.)
In the Sysdig Monitor UI
Enter the Access and Secret Key
Log in to Sysdig Monitor or Sysdig Secure as the administrator and
select Settings from the user menu.
Select AWS.

Add an account by entering the User Access Key and
Secret Key, then clicking Save.
The credentials will be listed with a Status of OK checked.
Should an Error occur, double-check the credentials entered.
Mis-typing is the most common cause of errors.
Enable CloudWatch Integration
Navigate to the AWS page in the Sysdig Monitor UI, if you are
not already there.
Toggle the CloudWatch Integration Status to Enabled.
Sysdig Monitor will poll the CloudWatch API every five minutes. Note
that this incurs additional charges from AWS.
After integrating with an AWS account, data will become visible in the
Sysdig UI after a 10-15 minute delay.
Refetch Credentials
If the integrated AWS account changes on the AWS side, an Error will
be listed in the Credentials Status on the Settings > AWS page.
Use the Refetch Now
button to re-establish the integration.
Integrate AWS Account Using the Implicit Key (On-Prem Only)
If Sysdig is installed in an EC2 instance, you can take advantage of the
existing EC2 IAM role of that instance. This can simplify
administration, as you do not have to manually rotate public and private
keys provided to the Sysdig backend.
Use Implicit Key
Prerequisites
Have your on-premises Sysdig platform installed in an AWS EC2 instance
that has a proper IAM role.
For this option, you cannot use the AWS Integration step in the Welcome
Wizard.
To enable implicit key, you must set the following parameter:
-Ddraios.providers.aws.implicitProvider=true
Use the parameter either during initial installation, or, if you already
entered keys manually, to switch to an implicit key.
If switching, you must then restart the api, worker, and collector
components in the backend.
In the Settings > AWS page, the former credentials will be overwritten
it will show implicit key.
Enablement steps depend on whether you are using Kubernetes or
Replicated as your orchestrator.
Kubernetes
Edit the config.yaml
to add to the following entries (in the
Data
section of config.yaml
):
sysdigcloud.jvm.api.options:
sysdigcloud.jvm.worker.options:
sysdigcloud.jvm.collector.options:

If you are switching from manual to implicit keys, you must also
restart the API, worker, and collector components.
See To Make Configuration
Changes
for details.
Enable Cloudwatch integration in the Sysdig UI.
Changing the AWS Services that are Polled
Sysdig is designed to collect metadata for particular AWS services,
which are reflected in the IAM policy
code.
The services are:
DynamoDB
EC2 hosts
ECS
Elasticache
RDS
SQS
When you implement the code and integration steps as described above, it
will trigger two types of collection: first the metadata for each
service is collected, and then Sysdig will poll for the metrics about
the metadata returned. So, if the service is not enabled in your
environment, no metadata (and no metrics) are collected about it. If it
is enabled, but you do not want to poll metrics, then delete the lines
of code related to that service from the IAM policy. This will avoid
potential unwanted AWS API requests and potential AWS charges.
See also AWSin the Metrics
Dictionary.
Security Groups
If you have an on-premises Sysdig Backend, and have restricted outbound
security groups, you may need to allow HTTPS & DNS access in order for
the Sysdig Backend components to make connection to the Amazon APIs. As
Amazon API endpoints are referenced by name and have a large number of
IP’s, this may need to be full 0.0.0.0/0 outbound access for HTTPS &
DNS.
If you need to filter just to Amazon IP ranges, you can use the
following as a guide:
https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html
Retrieving CloudWatch Data for Particular AWS Regions
To enable metrics collection from only certain AWS regions in your
environment, it is necessary to open a ticket with Sysdig Support. See
Contact Support for
details.
For information on the resulting AWS services visible in Sysdig Monitor,
see the AWS-related information in the Metrics Dictionary
(also available from within the Sysdig Monitor UI).
For information on how licensing affects AWS service views, see About
AWS Cloudwatch Licensing.
4.1 -
IAM Policy Code to Use
Best Practice: Create a Sysdig-specific IAM policy to be used for
granting programmatic access to Sysdig. Copy/paste the code snippet
below into this policy. It enables Sysdig to collect metadata and
CloudWatch metrics from the following services, as applicable to your
environment:
Dynamodb
EC2 hosts
ECS
Elasticache
RDS
SQS
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"autoscaling:Describe*",
"cloudwatch:Describe*",
"cloudwatch:Get*",
"cloudwatch:List*",
"dynamodb:ListTables",
"dynamodb:Describe*",
"ec2:Describe*",
"ecs:Describe*",
"ecs:List*",
"elasticache:DescribeCacheClusters",
"elasticache:ListTagsForResource",
"elasticloadbalancing:Describe*",
"rds:Describe*",
"rds:ListTagsForResource",
"sqs:ListQueues",
"sqs:GetQueueAttributes",
"sqs:ReceiveMessage"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
See Changing the AWS Services that are
Polled for more detail.
4.2 -
Integrate with AWS Role Delegation
This section describes how to configure Sysdig Monitor to utilize the
Amazon Web Service (AWS) AssumeRole functionality and authorize Sysdig
Monitor to discover cloud assets, grab CloudWatch metrics from your AWS
account, and utilize custom S3 bucket for storing captures. Upon
integrating with an AWS role, you can delegate access to AWS resources
that are not associated with your Sysdig AWS account.
Setting up cross-account access through roles eliminates the need to
create individual IAM users in each account. In addition, users don’t
have to sign out of one account and sign in to another in order to
access resources in different AWS accounts.
Role delegation is an alternative to the existing integration method
using the access keys. This method is considered secure as sharing
developer access keys with third-parties is not recommended by Amazon.
Prerequisites and Guidelines
This topic assumes that you have the following ready and you are
familiar with AWS.
Sysdig Monitor API Token
External
ID
API endpoint. In this topic, it is referred to as {{host}}
SaaS: See SaaS Regions and IP
Ranges and identify
the correct domain URL associated with your Sysdig application
and region. For example, in US East, the endpoints are:
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor in the
EU, you use
https://eu1.app.sysdig.com.
On-Prem: Depends on the on-prem deployment.
Administrator privileges to configure AWS integration
API client. Examples in this topic use curl
AWS account ID
SaaS: The default AWS account ID is 273107874544
(US East
region). For other regions, check AWS account
IDs .
On-Prem: Customer-specific.
Enable AWS Role Delegation with API
This section describes how to enable AWS role delegation using an API.
Instructions for SaaS
Get Your External
ID.
Configure Role
Delegation.
Get Role
ARN.
Add the AWS
Account.
Instructions for On-Prem
Get Your External
ID.
Configure Role
Delegation.
Get Role
ARN.
Add the AWS
Account.
Follow Additional Configuration for
On-Prem.
Get Your External ID
Retrieve your external ID as follows:
curl -k --request GET \
--url host/api/users/me \
--header 'authorization: Bearer e71d7c0f-501e-47d4-a159-39da8b716f44' | jq '.[] | .customer | .externalId'
An example of External ID from the response will be
04acdd59-4c98-4d11-8ee5-424326248161
.
Integrating the Sysdig Platform with Amazon Web Services requires
configuring role delegation using AWS IAM.
Create a new role in the AWS IAM Console:

For the role type, select Another AWS account.
(SaaS) Enter the Sysdig account ID for Account ID.
This means that you are granting read-only access to your AWS
data.
Select Require external ID and enter the one you retrieved
in the previous step. Leave MFA disabled.
Click Next: Permissions.
Create the following policies:
sysdig_cloudwatch
: Gives access to the list and describe
supported AWS resources and get CloudWatch metrics for them.
sysdig_s3
: Defines the bucket name where we wish to store the
captures
For more information on policies, see IAM Policy Code to
Use.
For detailed instructions on how to create a policy, see Integrate
AWS Account
Manually.
If a policy has already been created, search for it on this page
and select it, then skip to step. Otherwise, click Create
Policy, which opens in a new window.
Click Review policy.
Name the policy and provide an apt description. For example,
sysdig_cloudwatch
.
Click Create Policy.
You can now close this window.
In the Create role window, refresh the list of policies and
select the policies you just created.
Click Next: Review.
Give the role a name and an apt description. For example,
sysdig_role
.
Click Create Role.
Get Role ARN
Select Roles > sysdig-role.

Copy Role ARN.
Add the AWS Account
Using the role that you have created, add an AWS account on the Sysdig
Monitor side. Use the following API call:
curl --request POST \
--url {{host}}/api/providers \
--header 'authorization: Bearer e71d7c0f-501e-47d4-a159-39da8b716f44' \
--header 'content-type: application/json' \
--data '{"name": "aws","credentials": {"role": "<Role_ARN>"},"alias": "role_delegation"}'
Replace <Role_ARN>
with the one that you have copied in the previous
section.
The response lists all the providers. An example response is given
below:
{
"provider": {
"id": 7,
"name": "aws",
"credentials": {
"id": "role_delegation",
"role": "arn:aws:iam::485365068658:role/sysdig-access3"
},
"tags": [],
"status": {
"status": "configured",
"lastUpdate": null,
"percentage": 0,
"lastProviderMessages": []
},
"alias": "role_delegation"
}
}
Verify the role delegation has been created.
Log in to Sysdig Monitor or Sysdig Secure as an administrator.
Do one of the following:
The role that you have been created will be added to the list of AWS
Accounts.
Proceed to enable CloudWatch and AWS S3 bucket.
See AWS: Integrate AWS Account and CloudWatch Metrics (Optional) for more information.
Additional Configuration for On-Prem
Create an AWS user that will be used to fetch temporary credentials.
Assign a policy to the user to allow AssumeRole. For example:
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::{ACCOUNT-ID}:role/{ROLE_NAME}*"
}
}
Make the access keys available to users from one of the sources:
Example: Set Environment Variables on a Kubernetes Installation
Create Secret:
apiVersion: v1
kind: Secret
metadata:
name: aws-credentials
type: Opaque
data:
aws.accessKey: {{BASE64_ENCODED_ACCESS_KEY_ID}}
aws.secretKey: {{BASE64_ENCODED_ACCESS_KEY_SECRET}}
Expose variables in deployment descriptors (sysdigcloud-collector
,
sysdigcloud-worker
, sysdigcloud-api
) and reference values in the
newly created secret:
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
key: aws.accessKey
name: aws-credentials
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
key: aws.secretKey
name: aws-credentials
Add variables to descriptors on each platform update until new
variables are part of the installer.
Set Up Resource Discovery
The supported AWS are EC2, RDS, Elastic Load Balancer (ELB),
ElastiCache, SQS, DynamoDB, and Application Load Balancer (ALB).
By default, all the resources are fetched for all regions supported by
AWS. You can avoid this by whitelisting regions when creating a provider
key via the API. Example body of the provider key request when
whitelisting regions:
{
"name": "aws",
"credentials": {
"role": "arn:aws:iam::676966947806:role/test-assume-role"
},
"additionalOptions": "{\"regions\":[\"US_EAST_1\",\"US_EAST_2\"]}"
}
Enable AWS Role Delegation with UI
Use the AWS option in the Settings menu to configure AWS role
delegation.
Log in to the Sysdig Monitor as an administrator
Do one of the following:
Select Integrations > AWS CloudWatch.
From the user menu, select Settings > AWS.
The AWS Account page is displayed.

Click Add Accounts.
The Identity Authentication page opens to the Role Delegation
tab.
Specify the following:

Role ARN: The Role ARN associated with the role you have
created for role delegation. The ID is available on the summary
page of the role on the AWS console. For more information, see
Integrate with AWS Role
Delegation.
AWS External ID: Ensure that AWS External ID is displayed on
the page.
Click Save.
5 -
The Sysdig Capture feature
allows you to record detailed system trace data via remote connection
from any of your agent-installed hosts. In SaaS installations, by
default, this data will be stored on Sysdig’s secure Amazon S3 storage
location. This location will have a separate partition for your account.
In on-premises installations, by default, the data will be stored in the
Cassandra database.
This page describes two custom alternatives: using an AWS S3 bucket
(available for SaaS and on-prem) and using custom S3 storage.
if Google Cloud Storage is used as the S3 compatible storage, you will
not be able to bulk delete captures due to compatibility issues with
Google’s S3 API implementation. You can delete captures one by one or
delete them directly from the Google console.
To configure this option, use the fields provided by Sysdig Settings UI
and then append some code to the IAM Policy you created in AWS for
Sysdig integration.
Prerequisites
Your AWS account must be integrated with Sysdig, but the CloudWatch
feature is not required to be enabled.
See AWS: Integrate AWS Account and CloudWatch Metrics
(Optional)
Ensure that your S3 bucket name is available.
To use your own AWS S3 bucket to store Sysdig capture files, append
the following code snippets to the **AWS Identity and Access
Management (IAM) **page.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"s3:Put*",
"s3:List*",
"s3:Delete*",
"s3:Get*"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::BUCKET_NAME",
"arn:aws:s3:::BUCKET_NAME/*"
]
}
]
}
If you are using AWS KMS for AWS S3 encryption, ensure that
necessary privileges are given to the Sysdig Account or Role to use
the custom key.

Use the Key users option to do so:

In the Sysdig UI
Log in as an Administrator to Sysdig Monitor or Sysdig Secure.
From the user menu in the lower-left navigation, do one of the following:
- Select Integrations > Capture Storage.
- Select Settings > Capture Storage.

Enable the **Use a custom S3 bucket
**toggle and enter your AWS
S3 bucket name.
To Test: Capture a Trace File in Sysdig Monitor UI
When enabled, you will have the option to select between “Sysdig Monitor
Storage” or your own storage bucket when configuring a file capture. See
Create a Sysdig Capture
File.
You can set up a custom Amazon-S3-compatible storage, such
as Minio or IBM Cloud Object Storage, for storing Captures in a Sysdig
SaaS deployment. The capture storage location can be used for both
Sysdig Monitor and Sysdig Secure. This is an API-only functionality and
currently, no UI support is available.
The following APIs are supported for this functionality:
List existing AWS integrations
Create a new AWS integration
Update an existing AWS integration
Configure storage configuration
Prerequisites
Ensure that the feature is enabled for your account.
Use the access key and secret as the credentials.
Configure a new AWS integration. Set the skipFetch
field to
true. This will cause the AWS integration to ignore fetching data
from this account. Therefore, both the AWS metadata and AWS
CloudWatch will not be fetched and you can use this storage
exclusively for Sysdig Capture.
Configure the storage interface with the new account, by specifying
the AWS integration ID to use to authenticate the endpoint, bucket
name, and the path specified in the bucket.
Limitation
The AWS account ID is currently shown as null on the UI.
List Existing AWS Integration
The API returns the list of configured AWS integrations.
REST Resource: Providers
GET {{host}}/api/providers
Authorization: Bearer {{API_Token}}
Response Parameters
id
| String The unique identifier of the integration. |
name
| String The name of the integration and by default is set to aws . |
credentials
| String The dictionary containing the information about how Sysdig authenticates to AWS: |
skipFetch
| Boolean true : The account will be used only for configuring storage. In this case, it will not fetch AWS metadata and CloudWatch metrics.
false : The account will be used only for fetching AWS metadata and CloudWatch metrics.
|
status
| String Status denotes the status of the integration. |
accountId
| String The unique identifier of the AWS account. The value will be null if you are using AWS-compatible storage. |
tags
| Ignore this deprecated field. |
Sample Response
{
"providers": [
{
"id": 2398,
"name": "aws",
"credentials": {
"id": "AKIA4JRXW5ZVZU6MHNPE",
"role": null
},
"skipFetch" : false,
"status": {
"status": "done",
"lastUpdate": 1617274193293,
"percentage": 100,
"lastProviderMessages": []
},
"alias": null,
"accountId": "845151661675"
}
]
}
Create a New AWS Integration
REST Resource: Providers
POST {{host}}/api/providers
content-type: application/json
Authorization: Bearer {{API_Token}}
{
"name":"aws",
"skipFetch": false,
"credentials": {
"id":"<AWS_Access_Key_ID>",
"role":null,
"key":"<AWS_SecretKey>"
}
}
Request Parameters
name
| String The name of the integration and by default is set to aws . |
skipFetch
| Boolean false : The account will be used only for fetching AWS metadata and CloudWatch metrics.
true : The account will be used only for configuring storage. In this case, it will not fetch AWS metadata and CloudWatch metrics.
|
credentials
| The dictionary containing the information about how Sysdig authenticates to AWS: id : The AWS access key ID.
role : The AWS Role if role-based authentication is used.
key : The secret associated with the account.
|
Update Custom Storage Settings
To update existing storage settings, perform a PUT HTTP call to the
endpoint as follows:
REST Resource: Settings
PUT {{host}}/api/sysdig/settings
content-type: application/json
Authorization: Bearer {{API_Token}}
{
"enabled":true,
"buckets":[
{
"folder":"/folder1/folder2",
"name":"bucketName",
"providerKeyId": 3,
"endpoint": "http://127.0.0.1:9009"
}
]
}
Request Parameters
enabled
| Boolean Indicates whether the custom storage is configured. If the value is false , Sysdig-provided storage is used. |
buckets
| Returns the list of buckets that you can set. Currently, only one bucket is supported. folder : The bucket path where the captures will be stored.
name : The unique bucket name.
providerKeyId : The unique ID of the AWS or compatible provider to be used to configure storage. Currently, only one bucket can be configured at a time.
endpoint : The endpoint of the provider. It is configured only if you wish to set AWS compatible and is automatically set for AWS.
For example, https://storage.googleapis.com/ for Google Cloud https://s3.us-south.cloud-object-storage.appdomain.cloud for IBM. For a full list of endpoints, please refer to the relevant provider documentation.
|
You can set up a custom Amazon-S3-compatible storage, such as
Minio or IBM Cloud Object
Storage, for storing Captures
in a Sysdig on-premises deployment. The capture storage location can be
used for both Sysdig Monitor and Sysdig Secure. This is an API-only
functionality and currently, no UI support is available.
You must configure values.yaml
corresponding to your Sysdig
installation in order for this configuration to work.
Prerequisites
Your on-premise installation is
Installer-based. If
you have installed Sysdig Platform manually and you want to
configure custom S3 buckets to store your capture files, contact
your Sysdig representative.
Ensure that AWS-client compatible credentials used for
authentication are present in the environment.
Ensure that the list, get, and put operations are functional on the
S3 bucket that you wish to use. Confirm this by using the S3 native
tools, for example, as described in AWS
CLI
for IBM Cloud.
Configure the following parameters in the values.yaml
file so that
collectors, workers, and the API server are aware of the custom endpoint
configuration.
sysdig.s3.enabled
Required: true
Description: Specifies if storing Sysdig Captures in S3 or S3-compatible storage is enabled or not.
Options:true|false
Default:false
For example:
sysdig:
s3:
enabled: true
sysdig.s3.endpoint
Required: true
Description: The S3 or S3-compatible endpoint for the bucket. This option is ignored if sysdig.s3.enabled is not configured.
For example:
sysdig:
s3:
endpoint: <your S3-Compatible custom bucket>
sysdig.s3.capturesFolder
Required: false
Description: Name of the folder in S3 bucket to be used for storing captures, this option is ignored if sysdig.s3.enabled is not configured.
For example:
sysdig:
s3:
capturesFolder: my_captures_folder
The path to the capture folder in the S3 bucket will be {customerId}/{my_captures_folder}
. For on-prem deployments, the customerID is 1. If finance is your capture folder, the path to the folder in the S3 bucket will be 1/finance
.
sysdig.s3.bucketName
Required: true
Description: The name of the S3 or S3-compatible bucket to be used for captures. This option is ignored if sysdig.s3.enabled is not configured
For example:
sysdig:
s3:
bucketName: <Name of the S3-compatible bucket to be used for captures>
sysdig.accessKey
Required: true
Description: The AWS or AWS-compatible access key to be used by Sysdig components to write captures in the S3 bucket.
For example:
sysdig:
accessKey: <AWS-compatible access key>
sysdig.secretKey
Required: true
Description: The AWS or AWS-compatible secret key to be used by Sysdig components to write captures in the s3 bucket.
For example:
sysdig:
secretKey: <AWS-compatible secret key>
For example, the following AWS CLI command uploads a Sysdig Capture file
to a Minio bucket:
aws --profile minio --endpoint http://10.101.140.1:9000 s3 cp <Sysdig Capture filename> s3://test/
In this example, the endpoint is http://10.101.140.1:9000/
and the
name of the bucket is test
.
When you finish the S3 configuration, continue with the instructions on
on-premise installation by using the
Installer.
6 -
Find Your Customer ID and Name
SaaS customers of Sysdig can be identified by a unique customer number
and name, provided by email when the Sysdig environment is first
provisioned. While it is generally unnecessary to know the customer
number and it is not prominently displayed in the user interface, some
configuration settings may require it.
For on-premises environments, the customer ID will typically be 1
.
On the UI
To retrieve the customer ID:
Log into the Sysdig interface.
Select one of the following from the user menu:
- Authentication (SSO)
- Settings > Authentication.

The Authentication section lists the Customer ID and Customer
Name associated with your account.
Using the API
To retrieve the customer ID:
Log into the Sysdig interface.
Navigate to the URL endpoint /api/user/me?_product=SDC
.
E.g. https://app.sysdigcloud.com/api/user/me?_product=SDC
The JSON file contents are displayed in the browser.
Find the customer:id
portion of the JSON to determine the customer
ID and name:

7 -
Agent Installation: Overview and Key
The Agent Installation page provides a shortcut for copy/pasting the
necessary code lines for different flavors of agent installation.
You can also retrieve the agent access key (copy/paste).
This page can be hidden from non-admins if administrators choose. See
also Change Admin Settings in the User
Profile page.
Retrieve the Agent Access Key
To retrieve the key or use the agent install code snippets:
Log in to Sysdig Monitor or Sysdig Secure as an administrator.
Select one of the following:
- Integrations > Agent Installation.
- Settings > Agent Installation.
Choose Agent Installation
.
Optional: Use the Copy button to copy the access key at the top
of the page.
Optional: Review and use the sample code to install an agent, as
listed.

8 -
Subscription
Try all of Sysdig’s features for free; when you are ready to upgrade,
contact Sysdig sales.
See also: Getting Started with Sysdig
Monitor
and Getting Started with Sysdig
Secure.Getting
Started with Sysdig Monitor
Subscription Types
Free Tier
With Free Tier, use *Sysdig Secure for cloud
*functions free forever:
For one single account in one cloud region (AWS for v1)
Manage cloud posture with a daily run of CIS Benchmarks
Detect threats with out-of-the-box CloudTrail detection rules based
on Falco
Scan containers (ECR/Fargate) automatically and within your cloud
environment for up to 250 images a month
30-Day Trial
Test all the features of Sysdig Monitor and/or Sysdig Secure with the
free 30-day trial.
After 30 days, your account will be disabled and you can contact Sysdig
sales to upgrade to an Enterprise license.
Enterprise Tier
You can license Sysdig Secure, Sysdig Monitor, or both (Sysdig
Platform). For details, see https://sysdig.com/pricing/.
Review Current Subscription
Log on as Administrator to Sysdig Monitor or Sysdig Secure.
From the Selector button in the left-hand navigation, choose
Settings > Subscription
.
Your current plan details are displayed.

You can license each of these elements independently:
Sysdig agents (host agents)
Cloud accounts (Secure only, see also: Data
Sources)
Fargate tasks/serverless agents (Secure only, see also
Serverless Agents)
The number of licenses purchased has the following effects on how Sysdig
is used:
The agent count defines the maximum number of connected host
agents you can deploy. E.g if you purchase 100 licenses, you can
install 100 agents.
- In AWS Service Monitoring powered by Cloudwatch, it also
determines the number of AWS objects that can be viewed in the
Sysdig Monitor Dashboards (unrelated to the number of agents
actually installed). In other words, if you have 100 licenses
purchased, you can only see 100 AWS objects per region, per
service type.
**Fargate Tasks using Sysdig Serverless Agents: ** Defines the
number of serverless agents connected to Sysdig backend.
Cloud accounts- licensed number: Number of cloud accounts you
can connect to Sysdig backend.
About Host Agent Licenses
Reserved vs On-Demand Agents
The distinction between reserved and on-demand agents is financial, not
technical; when on-demand agents are used they perform exactly like
reserved agents.
Reserved Agents
Reserved agents are dedicated agents that are provisioned for a user
regardless of usage. You can purchase reserved agents on a monthly or
annual basis. As a Sysdig SaaS account administrator, you can increase
your reserved agents at any time from within the Sysdig application.
On-Demand Agents
On-demand agents are for short-term use and you pay only for what you
use at an hourly rate. You have the ability to add and control on-demand
agents. For example, an organization might schedule scale testing for
two days and license an extra 500 on-demand agents for that time frame.
In the Sysdig application, use the Customize Your Plan >
Enable On-demand Agents option on the
Subscription page to add
or remove agents. There is a hard limit of 500 agents for any account.
If the total of reserved and on-demand exceeds this limit, you will not
be able to purchase additional agents. On-demand agents are available
only in Sysdig SaaS applications.
Connect Agents to the Backend
The Sysdig platform uses a concurrent licensing model in determining
when to allow an installed agent to connect to the back-end servers and
report on host metrics. This means you can install Sysdig agents onto
any number of instances. However, only the licensed number of agents
will be allowed to connect and send metrics for recording and reporting.
Agents connect on a “first-come, first-served” basis and in the event of
an over-subscription (more agents wanting to communicate than are
licensed) they will attempt to reconnect on a periodic basis. Once an
existing communicating instance goes down and disconnects, the next
agent attempting to connect will be allowed in.
To avoid having agents refused connection due to over-subscription,
monitor the number of established and allowed connections. To see how
many licenses are in use, see the Settings > Subscription page.
Use this information to either purchase additional license capacity from
the UI, or to shut down lower-priority agents via normal orchestration
and system administration means.
Technical Details
Multiple Installs: An agent is essentially an “install” of the
software. If your system changes external IP addresses, or if you shut
down a VM image and bring it back up elsewhere, this will remain the
same agent connection. However, identical installs that are
simultaneously sending data (usually an accident) will be considered two
connections. A MAC address is used to identify a host for licensing
purposes.
Time Lag for License Release: When shutting down a host for any
reason, the agent’s license will not be immediately released. This
permits the agent to retain its licensing slot for short outages or a
reboot. The time-out interval can take up to 20 minutes, and if the
connection has not been re-established within the interval the license
will be released for use by the next host waiting to connect.
8.1 -
Time Series Billing
Sysdig Monitor allows you to consume custom metrics through a flexible
and cost-effective Time Series Billing model aligned with your usage.
With the enhanced billing experience, you can view your time-series
consumption at a glance, analyze trends, and change subscription plans
if need be.
Use the Sysdig Subscription page to control your licensing, and
thereby usage and spending. Based on your current subscription tier,
time-series usage, and the number of active agents, you can estimate the
bill and take further actions.
Time Series Billing works only in SaaS environments and is not currently
available in on-prem environments.
Benefits of Time Series Billing
You consume more than the per-agent limit because Time Series
Billing accounts for the following:
See Use
Cases
for more details.
Previously, the technical limit was 10K, no PAYG and metrics packs
mechanisms, no system in place to bill metrics collected outside
agents.
Validate what you are being charged on, understand and control
metric usage, and drop the data that is not required, either by
metric or by the scope of the metric. See Control Time Series
Ingestion.
Pay as you go and metric pack.
Consume Time Series
Time series consumption is calculated by using the reserved time
series
included in the subscription. The basic plan includes 2000 time series
per agent, and you can purchase more by adding on-demand
agents
or metric
packs.
Sysdig meters and bills only custom metrics.
Prometheus
JMX
StatsD
App checks
Reserved Time Series
The number of time series included with the subscription. The value is
calculated as
(the number of reserved agents + the number of connected on-demand agents) * the number of time series per agent
.
Time series consumed beyond your subscription limit will be charged and
is aggregated across all agents running in your environment. What it
means is that you can consume 3000 metrics on an agent and 1000 on
another without incurring additional charges.
Contact Sales to purchase beyond your subscription limit.
Time Series Billing limit of 2000 is applicable only to custom metrics,
while Sysdig and Sysdig KSM are included at no additional charges.
Metric Pack
A metric pack includes 1000 time series and is charged per month.
View Your Subscription
Time Series Visualization
To help you so, Sysdig provides an at-a-glance visualization of the
following:

Time Series Usage
Reserved: See Reserved Time
Series.
Overage: Time series ingested beyond Reserved time series is
Overage.
Ingested: The time series that are collected, analyzed,
processed for storage.
Time Series Usage Dashboard
Reserved and On-Demand Agents
Agent Usage Dashboard
Usage history in CSV format
Edit Subscription
On the Subscription page, under Subscription Details , click
the three dots.
Click Edit Subscription.
The Subscription Plan page gives you the directions to change the
subscription plan.
Monitor Time Series Usage
Time Series Metrics
To help you identify the usage trends that are important to you, Sysdig
provides the following metrics:
sysdig_ts_usage
: The metric reports the number of time series
ingested for a user in a 20-minutes interval. The dashboard reports
the 1-hour usage, which is the sum of the maximum of three
20-minute sysdig_ts_usage
measurements taken in an hour. This
metric can be segmented on metric categories as well.
sysdig_ts_usage_10s
: The metric reports the number of time series
ingested for a user in every 10-seconds window, per host (agent),
and per metric category.
Download Usage
You can download the usage report in a CSV file. On the Subscription
page, under Subscription Details, click Download Usage to
download a copy of the usage report. You can view the following:
User ID
Time
Number of Reserved Agents
Number of Connected On-Demand Agents
Time Series included per agent
Total used time series
The ratio of used and reserved time series
Time Series Usage Dashboard

Sysdig provides a Time Series Usage Dashboard with insight into the
usage data. You can view time series ingestion at a glance and discover
and analyze trends. The dashboard shows the average number of active
time series per host; current ingestion rate; churn percentage; and so
on.
Access the Time Series Dashboard
On the Subscription page, under Usage, click Time Series
Dashboard. You can view the following:
Current 1 Hour Ingestion
Current Ingestion from Agents
Churn Percentage
The average number of time series per host
The number of time series ingested per category
Host-level ingestion
Calculate Time Series Usage
Time series usage is calculated by using the sysdig_ts_usage
metric.
The metric reports the number of time series ingested for a user in an
hour (sum of the maximum of three 20-minutes). For each hour, the number
of time series ingested is calculated, and then the value is deducted
from the number of reserved time series. This value is stored as the
usage record.
An hour period is considered in order to take the
churn
into account. Sysdig uses the sysdig_ts_usage_10s
metric to calculate
the spikes caused by
churns
and provides you the churn percentage in the dashboard.
Sysdig uses the 95th percentile to calculate the exceeding cost of
usage. At the end of the month, the 95th percentile of the total number
of active series ingested per hour is calculated. Calculating the 95th
percentile reduces the chances of billing you for unexpected spikes
causes by churns.
Churn Rate
When a time series stops receiving new data points, it becomes inactive.
This event is called time series churn. It occurs more often during an
upgrade in a Kubernetes cluster or when containers are replaced by new
ones. Restarts, redeploys, dynamic workloads also cause churn and
generate additional time series.
In such cases, the container_id
label in a container metric changes,
and subsequently, all the existing time series are replaced by new time
series (with the new container_id
value).
The churn rate is the number of time series that churn over time. Sysdig
uses the sysdig_ts_usage_10s
metric to analyze these scenarios.
The Time Series Usage Dashboard provides a ratio of time series detected
at 1-hour period and 10-seconds period. This ratio is known as the churn
percentage and it is expressed as this PromQL query:
(sum(sysdig_ts_usage{metric_category!='PROMETHEUS_REMOTE_WRITE'}) - sum(sysdig_ts_usage_10s)) / sum(sysdig_ts_usage{metric_category!='PROMETHEUS_REMOTE_WRITE'}) * 100
The time series collected by Prometheus Remote Write are excluded from
this ratio because they are not collected by the Sysdig agent.
Example
The billing is calculated per month. A basic subscription will provide
you 2000 time series per agent. This limit is applicable only to custom
metrics, while you can continue consuming Sysdig and KSM metrics without
incurring additional costs. Time series consumed beyond your
subscription limit will be charged and is aggregated across all agents
running in your environment.
For example, if you have three agents running with the following
consumption:
Agent 1 collecting 2000 time series per hour
Agent 2 collecting 1000 time series per hour
Agent 3 collecting 4000 time series per hour
Time series billing is calculated as follows:
Total consumption = 7000
Allowed number of time series per hour: 3 * 2000 = 6000
Effectively, you are paying only for (7000 - 6000) = 1000
because the
cost is calculated on the aggregated time series consumed across all the
agents running in your environment.
Control Time Series Ingestion
For more information on controlling metric usage, see the following:
Use Cases
Agent and Remote Write Plan
See the following example with the following configuration:
The billing for the month is calculated as follows:
Time series usage: Total usage - Subscription capacity
(50,000 + 150,00 + 1000) - 2000 = 199,000
If the base price is $7.5 for up to a unit of 1K time series per
month, the total base cost is calculated as follows:
The number of units consumed = (199,000 / 1000) = 199
The total cost = $7.5 * 199 = $1592.50
Agents, Remote Write, and Metric Pack Plan
See the following example with the following configuration:
Two Prometheus Servers
Prometheus Server 1 generates 50,000
time series
Prometheus Server 2 generates 150,000
time series
A Sysdig agent that collects 1000
time series
100
metric pack, which is equivalent to 100000
time series
The billing for the month is calculated as follows:
Total subscription capacity: Total usage - (subscription capacity + time
series from metric pack)
201,000 - (100,000 + 2000) = 99,000
If the base price is $7.5 for up to a unit of 1K time series per
month and $5 for a metric pack of 1K time series, the total base
cost is calculated as follows:
The number of units consumed = (199,000 / 1000) = 199
The total cost = Cost of metric pack + cost of total usage
($7.5 * 199) + (100 * $5) = $2092.50
8.2 -
About AWS Cloudwatch Licensing
In the Explore
tab or Dashboards
of Sysdig Monitor, the number of
metrics displayed for each AWS service is limited by the number of agent
licenses purchased and/or used, by region.
The license count:
Includes Reserved agents plus On-Demand agents (even if not in use).
Is used to determine how many AWS resources are displayed for each
service in each region.
Is not transferable between different AWS services.
AWS Service Type Priorities and Limits
For each AWS service type, services are displayed in the following
priority:
EC2: Pick instances with agents installed, then instances
belonging to ECS, instance is launched before another,
alphabetically by instance ID, up to license count.
RDS: Pick by creation time, oldest instances first, up to
license count.
ELB: Pick by number of balanced instances (larger ELBs 1st),
then by creation time, oldest first, up to license count.
ElastiCache: Sort by name and display up to license count items.
SQS: Sort queues by name and pick up to license count number of
queues to fetch. Data is shown only for queues that are reporting
metrics.
DynamoDB: Sort by name and display up to license count items.
ALB: Sort by name and display up to license count items.
For more information on AWS metrics, see
AWS in the Metrics
Dictionary.
Sample Use Case
Suppose you have 200 AWS instances, have purchased 100 Sysdig agent
licenses, and have actually installed 50 agents.
The following limits would apply to your views of AWS services, per
region:
EC2: The 50 instances with agents installed would be shown
first, then 50 more instances, first from EC2, then from ECS, then
per uptime.
RDS: 100 RDS listings would be shown, oldest first.
ELB: 100 ELBs would be shown (largest first), then by creation
time, oldest first.
ElastiCache: 100 ElastiCache objects would be shown,
alphabetically by name.
SQS: 100 SQS queues that are reporting metrics would be shown.
DynamoDB: 100 DynamoDBs would be shown, alphabetically by name.
ALB: 100 ALBs would be shown, alphabetically by name.
To increase the limit of items in the AWS Services views, contact
Sysdig Sales to enable additional
resources depending on your license agreement.
9 -
Authentication and Authorization (SaaS)
Sysdig Monitor and Sysdig Secure are designed to work with several user
authentication/authorization methods:
Type | Enabled by Default | Integration Steps Required |
---|
User email/password | Yes | No |
Google OAuth | No | No |
SAML | No | Yes |
OpenID Connect | No | Yes |
The user’s view:

The pages in this section describe the integration and enablement steps
required for SAML or OpenID Connect, and the Identity Provider (IdP)
services
that support these protocols, such as Okta, OneLogin, Keycloak.
In the SaaS environment,
Google login can be
enabled with a simple drop-down selection; the integration has already
been performed.
See SaaS Regions and IP
Ranges before proceeding to
configure authentication.
To integrate SAML or OpenID Connect with both Sysdig Monitor and Sysdig
Secure, you must go through the integration steps twice, once for each
Sysdig product.
Workflow
With the new Authorization UI, the basic process of enabling a Single
Sign-On (SSO) option is:
Determine which SSO option (GoogleOAuth, SAML, OpenID) your
enterprise uses, and which IdP service (Okta, OneLogin, etc.) is
used, if any.
Enter the required connection settings for the chosen SSO on the
appropriate Authentication
tab. (Note: for Google, the settings
are already entered.)
Configure any associated IdP settings on the IdP side.
Select the SSO option from the Enabled Single Sign-On
drop-down
and click Save
Authentication.
If enabling for both Sysdig Monitor and Sysdig Secure, repeat the
process on the second application.

View of the Authentication page for Google OAuth in the SaaS
environment.
9.1 -
Google OAuth (SaaS)
This guide is specific to cloud-based (SaaS) Sysdig environments. If you
are configuring an On-Premises Sysdig environment, refer to Google
OAuth (On-Prem) instead.
In the SaaS environment, Google users have the option to log in via
Google OAuth.
As the SaaS platform is preconfigured to permit such logins,
environments that already use Google services (such as G Suite) may find
this the most convenient approach for simplified login.
Enable Google OAuth
Since Google OAuth is pre-configured by Sysdig, the administrator needs
only select it as the chosen Authentication option to enable it.
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Authentication
.
(Select the Google OAuth
tab if you want to see the preconfigured
(un-editable) settings. )

Select Google OAuth
from the Enabled Single Sign-On
dropdown
and click Save Authentication
.
Repeat for Sysdig Monitor or Sysdig Secure, if you want to enable on
both applications.
User Experience
Note the following requirements for successful Google OAuth login:
The user must have already logged in successfully at least once to
your environment (such as via email-based Invitation and having set
an initial password)
The user’s login username in the Sysdig platform must precisely
match the user’s Google email address (that is, it cannot be a
shortened/altered Google email alias)
For such a user to log in via Google OAuth, click the
Log in with Google
button.

If the user’s browser has not already successfully authenticated via
Google and/or has multiple Google profiles known by their browser, they
will be presented a Google page to select a profile and enter a password
(if necessary) before being redirected back to your Sysdig environment.
See also User and Team
Administration for
information on creating users.
9.2 -
SAML (SaaS)
This guide is specific to cloud-based (SaaS) Sysdig environments. If you
are configuring an On-Premises Sysdig environment, refer to SAML
(On-Prem) instead.
SAML
support in the Sysdig platform allows authentication via your choice of
Identity Provider
(IdP).
The Sysdig platform ordinarily maintains its own user database to hold a
username and password hash. SAML instead allows for redirection to your
organization’s IdP to validate username/password and other policies
necessary to grant access to Sysdig application(s). Upon successful
authentication via SAML, a corresponding user record in the Sysdig
platform’s user database is automatically created, though the password
that was sent to the IdP is never seen nor stored by the Sysdig
platform.
This section describes how to integrate and enable SAML with both Sysdig
Monitor and Sysdig Secure.
For specific IdP integration information, refer to:
See also
Caveats
Basic Enablement Workflow
Administrator Steps
Select the appropriate IdP from the list below, and follow the
instructions:
Enable SAML in Settings
To enable baseline SAML functionality:
Enter SAML Connection Settings
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings
from the User Profile button in the left
navigation.
Select Authentication
.
Select the SAML
tab.
Enter the relevant parameters (see table below) and click Save
.
It is strongly recommended that “Signed Assertion” and “Validate
Signature” are enabled to ensure that the SAML SSO process is as
secure as possible.
Connection Setting | Options | Description | Sample Entry |
---|
Metadata | URL | The URL provided at the end of the IdP configuration steps. | |
| XML | An option that can be used for an IdP that doesn’t support extracting metadata XML via URL. | |
Signed Assertion | off/on | Should Sysdig check for assertions signed in responses (to assist in validating correct IdP). | ON |
Email Parameter | email | Name of parameter in the SAML response for user email ID. Sysdig uses this to extract the user’s email from the response. | email |
Validate Signature | off/on | Sysdig backend should verify that the response is signed. | ON |
Verify Destination | off/on | Flag to control whether Sysdig should check the “destination” field in the SAMLResponse. Recommend ON, as a security measure. May be OFF in special cases, such as a proxy in front of the Sysdig back end. | ON |
Create user on login | off/on | Flag to control whether a user record should be created in the Sysdig database after first successful SAML log in. | |
Disable username and password login | off/on | Switch “on” to disallow user name and password log in. (Useful with SAML OpenID.) | |
Select SAML for SSO
Select SAML
from the Enabled Single Sign-On
dropdown
Click Save Authentication
.
Repeat entire enablement process for Sysdig Monitor or Sysdig
Secure, if you want to enable on both applications.
Sysdig supports SAML Single Logout (SLO).
SLO is a feature in federated authentication where Sysdig users can sign
out of both their Sysdig session (Service Provider) and associated IdP
(Identity Provider) simultaneously. SLO allows you to terminate all
sessions established via SAML SSO by initiating a single logout process.
Closing all user sessions prevents unauthorized users from gaining
access to Sysdig resources.
SLO Process
When a user initiates a logout, Sysdig sends a digitally-signed logout
request to the IdP. The IdP validates the request and terminates the
current login session, then redirects the user back to the Sysdig login
page.
Caveats
SLO is currently supported only in US-West and EU-Central regions.
Sysdig does not support HTTP Post binding for single logout, and
therefore, SLO with Okta is not functional at this point.
Configure logout URLs:
Choose HTTP Redirect as the binding method.
This option is an alternative to the HTTP POST method, which Sysdig
does not support currently.
If your IdP mandates, upload the public key for Sysdig.
Contact Sysdig Support to retrieve the public key associated with
your deployment.
Certain IDPs, such as Azure, don’t require uploading the public key.
Log in to Sysdig Monitor or Sysdig Secure as an administrator and
select Settings.
For on-prem deployments, log in as the super admin.
Navigate to Settings > Authentication, and
select SAML under Connection Settings.
Enter the SAML configuration.
Ensure that Enable SAML single logout is toggled on.

Click Save.
Ensure that you select SAML from the Enable Single Sign
On drop-down.
User Experience
As noted in the Basic Enablement Workflow above, you can offer users
three ways to log in with a SAML configuration:
They can begin at the Sysdig SaaS URL and click the SAML button.
See SaaS Regions and IP
Ranges and identify the
correct Sysdig SaaS URL associated with your Sysdig application and
region. For example, URLs of Monitor and Secure for US East are:
Monitor: app.sysdigcloud.com
Secure: secure.sysdig.com
They will be prompted to enter a Company Name, so the Sysdig
platform can redirect the browser to your IdP for authentication.
Contact Sysdig Support to set your company name on the account.

You can provide an alternative URL to avoid the user having to enter
a company name, in the format:
Sysdig Monitor: https://app.sysdigcloud.com/api/saml/
COMPANY_NAME
Sysdig Secure: https://secure.sysdig.com/api/saml/
COMPANY_NAME
?product=SDS
For other regions, the format is
https://<region>.app.sysdig.com/api/saml/auth.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Secure in the EU, you
use
https://eu1.app.sysdig.com/api/saml/secureAuth.
You can configure an IdP-initiated login flow when configuring your
IdP. The users then select the Sysdig application from your IDP’s
app directory and do not browse directly to a Sysdig application URL
at all.
Users that complete their first successful SAML login to Sysdig Secure
may receive the error message “User doesn’t have permission to login in
Sysdig Secure”. This is because only members of the Secure
Operations team are permitted access to Sysdig Secure, and
newly-created logins are not in this team by default. Such a user should
contact an Administrator for the Sysdig environment to be added to the
Secure Operations team.
Environments that wish to have all users access Secure by default
could use this sample Python
script
to frequently “sync” the team memberships.
See Developer Documentation for tips on using the sample Python
scripts provided by Sysdig.
See also User and Team
Administration for
information on creating users.
Caveats
- SAML Assertion Encryption/Decryption is not currently supported.
9.2.1 -
Okta (SAML)
Review SAML (SaaS) before
you begin.
Configure Sysdig Monitor and/or Sysdig Secure as a SAML application
using Okta’s documentation for Setting Up a SAML Application in
Okta.
The notes below call out specific steps that require additional action.
Sysdig-Specific Steps for Okta Configuration
IDP-initiated Login Flow
If you don’t intend to configure IDP-initiated login flow, check the
boxes for “Do not display application icon to users” and “Do not display
application icon in the Okta Mobile app”.
URL, URI and RelayState Values
Enter the values shown in the table below. If you wish to configure
IDP-initiated login flow, replace CUSTOMER-ID-NUMBER
with the
number retrieved as described in Find Your Customer
Number.
See SaaS Regions and IP
Ranges and identify the
correct URLs associated with your Sysdig application and region. For
example, in US East, the endpoints are:
Single sign on URL | https://app.sysdigcloud.com/api/saml/auth
| https://secure.sysdig.com/api/saml/secureAuth
|
Audience URI (SP Entity ID) | https://app.sysdigcloud.com/api/saml/metadata
| https://app.sysdigcloud.com/api/saml/metadata
|
Default RelayState (optional - only configure if you intend to use IDP-initiated login flow) | #/&customer=CUSTOMER-ID-NUMBER | #/&customer=CUSTOMER-ID-NUMBER |
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig application
is hosted. For example, for Sysdig Monitor in the EU, you use
https://eu1.app.sysdig.com/api/saml/auth.
Email and Name Values
Instead of the values shown in the Okta example, add the values:
Name | Value |
---|
email | user.email |
first name | user.firstName |
last name | user.lastName |
Note that the attributes are case sensitive, so use caution when
entering them.
Only email
is required. However, including first/last name is
recommended, since these values will now be included in the records
created in the Sysdig platform’s database when new users successfully
login via SAML for the first time.
SAML Configuration Metadata Value
Copy the URL and paste in the Metadata entry on the SAML
Configuration page in the SAML connection settings.
To ensure the metadata URL you copy at the end of the IDP configuration
procedure is correct, you can test it by directly accessing it via your
browser.
When accessing the URL, your browser should immediately download an XML
file that begins similarly to the example shown below. No entry of
credentials or other security measures should be required to
successfully download it. If this is not the case, revisit the IDP
configuration steps.
|
---|
<?xml version= "1.0" ?> <EntityDescriptor xmlns= "urn:oasis:names:tc:SAML:2.0:metadata" entityID= "https://app.onelogin.com/saml/metadata/680358" > `<IDPSSODescriptor xmlns:ds=` `"http://www.w3.org/2000/09/xmldsig#" ` `protocolSupportEnumeration=` `"urn:oasis:names:tc:SAML:2.0:protocol"` `>names:tc:SAML:` `2.0` `:metadata` `" entityID="` ` https://app.onelogin.com/saml/metadata/ ` `680358` `">` ... |
9.2.2 -
OneLogin (SAML)
Review SAML (SaaS) before
you begin.
Configure Sysdig Monitor and/or Sysdig Secure as a SAML application
using OneLogin’s article titled Use the OneLogin SAML Test
Connector.
The notes below call out specific steps that require additional action.
Sysdig-Specific Steps for OneLogin Configuration
Adding the SAML Test Connector
At the step for “Adding the SAML Test Connector”, select SAML Test
Connector (IdP w/ attr w/ sign response). If you don’t intend to
configure IDP-initiated login flow, uncheck the slider so it will no
longer be “Visible in portal”.
Test Connector Configuration Page Settings
At the “Test Connector Configuration Page”, enter the values shown in
the table below. If you wish to configure IDP-initiated login flow,
replace CUSTOMER-ID-NUMBER
with the number retrieved as described
in the Find Your Customer
Number article.
See SaaS Regions and IP
Ranges and identify the
correct URLs associated with your Sysdig application and region. For
example, given below are the URLs for the US East region.
RelayState (optional - only configure if you intend to use IDP-initiated login flow) | #/&customer=CUSTOMER-ID-NUMBER | #/&customer=CUSTOMER-ID-NUMBER |
Recipient | https://app.sysdigcloud.com/api/saml/auth
| https://secure.sysdig.com/api/saml/secureAuth
|
ACS (Consumer) URL Validator | https://app.sysdigcloud.com
| https://secure.sysdig.com
|
ACS (Consumer) URL | https://app.sysdigcloud.com/api/saml/auth
| https://secure.sysdig.com/api/saml/secureAuth
|
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig application
is hosted. For example, for Sysdig Monitor in the EU, you use
https://eu1.app.sysdig.com/api/saml/auth.
(Optional) If you want the user’s First Name and Last Name to be
included in the records created in the Sysdig platform’s database when
new users successfully login via SAML for the first time, click to the
Parameters tab. Click Add parameter and create each of two New
Fields, checking the box each time to Include in SAML assertion.
Then click to Edit each field and select the Value shown from
the drop-down menu before clicking Save.
Field Name | Value |
---|
first name | First Name |
last name | Last Name |
Note that the Field Names are case sensitive, so be careful to
enter them as all lowercase.
The following shows an example of a correctly-configured field for First
Name:

Issuer URL
Click to the SSO tab, copy the Issuer URL, and paste in the
Metadata entry on the SAML Configuration page in the SAML
connection settings.
To ensure the metadata URL you copy at the end of the IDP configuration
procedure is correct, you can test it by directly accessing it via your
browser.
When accessing the URL, your browser should immediately download an XML
file that begins similarly to the example shown below. No entry of
credentials or other security measures should be required to
successfully download it. If this is not the case, revisit the IDP
configuration steps.
|
---|
<?xml version= "1.0" ?> <EntityDescriptor xmlns= "urn:oasis:names:tc:SAML:2.0:metadata" entityID= "https://app.onelogin.com/saml/metadata/680358" > `<IDPSSODescriptor xmlns:ds=` `"http://www.w3.org/2000/09/xmldsig#" ` `protocolSupportEnumeration=` `"urn:oasis:names:tc:SAML:2.0:protocol"` `>names:tc:SAML:` `2.0` `:metadata` `" entityID="` ` https://app.onelogin.com/saml/metadata/ ` `680358` `">` ... |
9.2.3 -
ADFS (SAML)
Review SAML (SaaS) before
you begin.
These instructions assume you already have a working,
Internet-accessible ADFS ( Active Directory Federation Service) server.
Interoperability testing has been performed specifically with ADFS on
Windows Server 2012 R2.
Follow the instructions below to configure ADFS with the ADFS
Management tool in the Windows Server Manager.
For Service-Provider-Initiated Login Flow
Right-click to Service > Edit Federation Service Properties.
Note the hostname in the Federation Service Identifier, as this will
be used in the metadata URL that you paste in the Metadata entry on
the SAML Configuration page in the Sysdig authentication settings.
Specifically, the metadata URL will be of the format
https://HOSTNAME/FederationMetadata/2007-06/FederationMetadata.xml
.
Also, so that the Sysdig platform can access this URL directly, this
host must resolve in DNS and have a valid (not self-signed)
SSL/TLS certificate.

Add a Relying Party Trust configuration for the Sysdig application.
Right-click to Relying Party Trusts > Add Relying Party
Trust and click Start to begin the wizard.

In the Select Data Source step, click the button to Enter
data about the relying party manually, then click Next

Enter a Display name of your choosing (e.g. “Sysdig Monitor”
or “Sysdig Secure”), then click Next

Click Next to accept the default option to use AD FS
profile

Click Next to skip the selection of an optional token
encryption certificate (Sysdig does not support this option)

Check the box to Enable support for the SAML 2.0 Web SSO
protocol, then enter one of the following values for Relying
party SAML 2.0 SSO service URL:
If configuring Sysdig Monitor, enter:
https://app.sysdigcloud.com/api/saml/auth
If configuring Sysdig Secure, enter:
https://secure.sysdig.com/api/saml/secureAuth
Then click Next.

For the Relying party trust identifier, enter one of the
following values:
If configuring Sysdig Monitor, enter:
https://app.sysdigcloud.com
If configuring Sysdig Secure, enter:
https://secure.sysdig.com
Then click Add, then click Next

Click Next to skip configuration of multi-factor
authentication

Choose a policy for whether users will be permitted to login to
the Sysdig application. The default to Permit all users to
access the relying party will typically be acceptable. Click
Next.

Review the summary and click Next to complete the
configuration of the Relying Party Trust

The next step will involve adding Claim Rules, so you can leave
the box checked to Open the Edit Claim Rules dialog and
click the Close button to be brought immediately into the
Claim Rules editor

Ensure that the SamlResponseSignature
option matches the Sysdig
authentication configuration.
Use the
Set-AdfsRelyingPartyTrust/Get-AdfsRelyingPartyTrust
cmdlets
via PowerShell to configure SamlResponseSignature
.
-SamlResponseSignature
Specifies the response signatures that the relying party expects. The acceptable values for this parameter are:
AssertionOnly
MessageAndAssertion
MessageOnly
For more information, see
Set-AdfsRelyingPartyTrust.
Navigate to Settings > Authentication on the Sysdig
app and check the Sysdig authentication setting maps to the
SamlResponseSignature
:

For MessageAndAssertion
, enable both the options.
Next, use the Claim Rules to ensure that login data is sent as
needed to the Sysdig platform. A user’s login to the Sysdig platform
is based on an email address, and a default ADFS configuration would
not send the email address as required. The following configuration
ensures the correct field from Active Directory is delivered in the
claim.
If not already in the Claim Rules editor from the previous step,
navigate to it by right-clicking on the Relying Party Trust that
was just created and selecting Edit Claim Rules

Click Add Rule. At the following screen, accept the default
rule template to Send LDAP Attributes as Claims and click
Next.

Enter a name for the rule, select Active Directory as the
Attribute store, then use the pull-down selectors to pick
E-Mail Address as both the LDAP Attribute and Outgoing
Claim Type, then similarly make pull-down selections for
Given Name and Surname. Once these selections are made,
click Finish.

Now click Add Rule again, this time selecting the template
for Transform an incoming claim

Enter a name for the rule, then use the pull-downs to select an
Incoming claim type of E-Mail Address, an Outgoing
claim type of Name ID, and an Outgoing name ID format
of Email, then click Finish.

(Optional) If you want the user’s First Name and Last Name to be
included in the records created in the Sysdig platform database
when new users successfully login via SAML for the first time,
additional Transform rules must also be created. Only the
email-based username is strictly required and we already created
a rule for this, so this step is optional.
If you wish to do this, click Add Rule and once again select
the template for Transform an incoming claim. Enter a name
for the rule, then use the pull-down to select an Incoming
claim type of Given Name, and for the Outgoing claim
type, directly type first name into the field. After
clicking Finish, click Add Rule and create a similar
rule to transform the Incoming claim type of Surname to
the Outgoing claim type of last name.

Having clicked Finish after creating your last rule, you
will see all rules now in the editor. Click Ok, and your
ADFS configuration for your Sysdig application is complete.

For IdP-Initiated Login Flow (Optional)
(Optional) The steps above represent a Service-Provider-Initiated
SAML configuration. If you would prefer an IdP-initiated SAML
configuration, this is also possible with ADFS, but requires the
additional steps described below.
The Sysdig platform requires a specific setting of RelayState in
order to accept IdP-initiated login flows. On the ADFS versions
tested, we’ve found this use of RelayState is disabled by default,
and a Microsoft
article
describes the topic in detail. To enable it, as described in a
Microsoft forum
thread,
on your ADFS host, edit
%systemroot%\ADFS\Microsoft.IdentityServer.Servicehost.exe.config
and add <useRelayStateForIdpInitiatedSignOn enabled="true" />
to the <microsoft.identityserver.web>
section. Once the
modification is saved, restart ADFS services for the change to take
effect.
You will need to retrieve your Sysdig customer number as described
in the Find Your Customer
Number article.
You will then need to generate an IdP-initiated login URL.
In addition to having the correct settings, it must be properly URL
encoded. To ease this configuration, use this ADFS RelayState
Generator
tool. When launched, enter the values below, then hit the Generate
URL button.
For the IDP URL String, enter
https://YOUR_ADFS_SERVER/adfs/ls/idpinitiatedsignon.aspx
For the Relying Party Identifier, enter one of the following
values:
If configuring Sysdig Monitor, enter
https://app.sysdigcloud.com
If configuring Sysdig Secure, enter
https://secure.sysdig.com
For other regions, the format
is https://<region>.app.sysdig.com. Replace <region>
with the region where your Sysidig application is hosted. For
example, for Sysdig Monitor in the EU, you
use https://eu1.app.sysdig.com/. See SaaS Regions and IP
Ranges for more
information.
For the Relay State/Target App, enter
#/&customer=CUSTOMER-ID-NUMBER
, substituting the
CUSTOMER-ID-NUMBER
you retrieved in the previous step

This Results URL will be used in the metadata URL that you paste
in the Metadata entry in the SAML connection
settings .
Use the Results URL from the tool to test your IdP-initiated
login. Note that per this Microsoft forum
thread,
it is apparently not possible to configure ADFS to use such a URL
when your users select the application from the pull-down menu at
https://YOUR_ADFS_SERVER/adfs/ls/idpinitiatedsignon.aspx
.
However, you may embed the URL into a custom portal or bookmarks
list.
Now you can test login using an Active Directory user that has an
Email address configured.

To ensure the metadata URL you copy at the end of the IDP configuration
procedure is correct, you can test it by directly accessing it via your
browser.
When accessing the URL, your browser should immediately download an XML
file that begins similarly to the example shown below. No entry of
credentials or other security measures should be required to
successfully download it. If this is not the case, revisit the IDP
configuration steps.
|
---|
<?xml version= "1.0" ?> <EntityDescriptor xmlns= "urn:oasis:names:tc:SAML:2.0:metadata" entityID= "https://app.onelogin.com/saml/metadata/680358" > `<IDPSSODescriptor xmlns:ds=` `"http://www.w3.org/2000/09/xmldsig#" ` `protocolSupportEnumeration=` `"urn:oasis:names:tc:SAML:2.0:protocol"` `>names:tc:SAML:` `2.0` `:metadata` `" entityID="` ` https://app.onelogin.com/saml/metadata/ ` `680358` `">` ... |
9.2.4 -
Azure Active Directory (SAML)
This topic explains how to configure SAML Single Sign On (SSO) with
Azure Active Directory (AD) and helps you configure Sysdig to allow
users to access Sysdig application by using SSO.
Prerequisites
Administrator privileges on Sysdig and Azure.
Log in to the Azure AD portal.
Select Azure Active Directory, then click Enterprise
Applications.
The Enterprise applications - All application screen is displayed.
Click New Application.
On the Add an Application screen, select Non-gallery
application.
Give your application a name, and click Add at the bottom of the
page.

On the menu, select Single sign-on.

Choose SAML as the sign-on method.
Edit the Basic SAML Configuration as follows:
In the configuration page, click the edit icon.

Specify the following:

Identifier (Entity ID): Uniquely identifies the Sysdig
application. Azure AD sends the identifier to the Sysdig
application as the audience parameter of the SAML token.
Sysdig validates this as part of the SSO process.
For example, the identifier for Sysdig Monitor for the EU
region is https://eu1.app.sysdig.com.
See SaaS Regions and IP
Ranges for the
complete list of entity IDs for different regions.
Reply URL: Specifies where Sysdig expects to receive the
SAML token.
For example, the identifier for Sysdig Monitor for the EU
region is https://eu1.app.sysdig.com/api/saml/auth.
See SaaS Regions and IP
Ranges for the
complete list of reply URLs for different regions.
Relay State: Specifies to the application where to
redirect the user after authentication is completed.
Typically the value is a valid URL for Sysdig. If you are
configuring SSO for SaaS, change the relay state to reflect
the correct customer number associated with your Sysdig
application. For on-prem installations, the customer number
is always 1.
The format is:
#/&customer=1234
Sign on URL: It is the sign-in page for the Sysdig
application that will perform the service provider-initiated
SSO. Leave it blank if you want to perform
identity-provider-initiated SSO.
For more information on configuration parameters, see Configure
SAML-based single sign-on to non-gallery
applications.
Sysdig-Specific Steps for Active Directory Configuration
Under SAML Signing Certificate, copy the App Federation
Metadata URL.

Log in to your Sysdig instance as an admin.
For on-prem deployments, log in as the super admin.
Navigate to Settings > Authentication, and select SAML
under Connection Settings.
Enter the following:
Metadata: Enter the App Federation Metadata URL you
copied.
Email Parameter: Set the value to emailaddress.
Azure AD claims are:
saml = AD
givenname = user.givenname
surname = user.surname
emailaddress = user.mail
name = user.userprincipalname
Unique User Identifier = user.userprincipalname
In the Sysdig application, you need to set the email to
emailaddress
which is what Azure AD sends to Sysdig in the
SAML assertion. Alternatively, Azure AD can be modified to send
another attribute.
Click Save.
Select SAML from the Enable Single Sign On drop-down.
Create a User in Azure Active Directory Domain
Log in to the Azure AD portal.
Click Azure Active Directory, and note down the domain name.
Select Azure Active Directory, then Users.
The Users - All Users screen is displayed.
Select New Users .
You can either create a new user or invite an existing AD.
Enter name, username, and other details, then click Create.
In the Profile page, add the Email and Alternate Email
parameters. The values can match
Assign the User to the Sysdig Application
Navigate to the Sysdig application.
Click Users and Group, then click the Add user button.
Select the Users and Groups checkbox, then choose the newly
created user to add to the application.
Click Select, then Assign at the bottom of the screen.
Enable Authentication Settings in the Sysdig Instance
Ensure that Flag to enable/disable create user on login is enabled.
Typically this setting is enabled by default.

If you are using both Sysdig Monitor and Secure, ensure that the user
accounts are created on both the products. A user that is created only
on one Sysdig application will not be able to log in to another by using
SAML SSO.
if you are on Sysdig Platform versions 2.4.1 or prior, contact Sysdig
Support to help with user creation.
If Azure Active Directory does not allow you to create Sysdig as a
Non- Gallery application, perform the following:
In Azure AD, click Enterprise Applications > New
Application.
Select Application you’re developing.

You will be taken to the app registration page:
Select New Registration:
Provide a name for the application you are registering.

Enter the redirect URI.
For example, the redirect URI for Sysdig Monitor for the EU region
is https://eu1.app.sysdig.com/api/saml/auth. See SaaS Regions and
IP Ranges for the
redirect URLs for other regions.
Click Register to complete the registration.
In the Overview tab click Add an Application ID URI:

Click Add a scope.
Add the application ID URI as follows:
https://<your_sysdig_url>:443
Replace <*your_sysdig_*url> with the URL appropriate to your
application and region. See SaaS Regions and IP
Ranges for more
information.
In the Overview tab, click Endpoints, and copy the
Federation Metadata URL.
Log in to Sysdig, navigate to SAML Authentication screen, and enter
the Federation Metadata URL.
You will still need to ensure that the user creation on the login
option is enabled.
Save the settings.
9.3 -
OpenID Connect (SaaS)
This guide is specific to cloud-based (SaaS) Sysdig environments. If you
are configuring an On-Premises Sysdig environment, refer to OpenID
Connect (On-Prem) instead.
OpenID support in the Sysdig
platform allows authentication via your choice of Identity Provider
(IdP). This section
describes how to integrate and enable OpenID Connect with both Sysdig
Monitor and Sysdig Secure.
Overview
Summary of OpenID Functionality in Sysdig
The Sysdig platform ordinarily maintains its own user database to hold a
username and password hash. OpenID instead allows for redirection to
your organization’s IdP to validate username/password and other policies
necessary to grant access to Sysdig application(s). Upon successful
authentication via OpenID, a corresponding user record in the Sysdig
platform’s user database is automatically created, though the password
that was sent to the IdP is never seen nor stored by the Sysdig
platform.
Basic Enablement Workflow
1. Know which IdP your company uses and will be configuring. | | These are the OpenID Providers for which Sysdig has performed detailed interoperability testing and confirmed how to integrate using their standard docs. If your OpenID Provider is not listed (including ones that do not support OpenID Connect Discovery), it may still work with the Sysdig platform. Contact Sysdig Support for help. |
2. Decide the login flow you want users to experience: 3 options | Click OpenID button and enter a company name | From app.sysdigcloud.com or secure.sysdig.com > page to enter company name. 

|
| Type/bookmark a URL in a browser | Contact Sysdig for the Company Name associated with your account. |
| Log in from an IdP interface | The individual IdP integration pages describe how to add Sysdig to the IdP interface. You will need your Company Name on hand. |
3. Perform the configuration steps in your IdP interface and collect the resulting config attributes. | | Collect metadata URL (or XML) and test it. If you intend to configure IDP-initiated login flow, you need the following: |
4 a. Log in to Sysdig Monitor or Sysdig Secure and configure authentication. 4 b. Repeat process for the other Sysdig product, if you are using both Monitor and Secure. | | Log in to Sysdig Monitor Settings (as super admin) and enter the necessary configuration information in the UI. Save and Enable OpenID as your SSO. Log in to Sysdig Monitor Settings (as super admin) and enter the necessary configuration information in the UI. Save and Enable OpenID as your SSO.
You will enter a separate redirect URL in your IdP for each product; otherwise the integration processes are the same. |
Administrator Steps
Select the appropriate IdP link below, and follow the instructions:
Enable OpenID in Settings
To enable baseline OpenID functionality:
Enter OpenID Basic Connection Settings
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Authentication
.
Select the OpenID
tab.

Enter the relevant parameters (see table below) and click Save
.
Connection Setting | Description |
---|
Client ID | ID provided by your IdP |
Client Secret | Secret provided by your IdP |
Issuer URL | URL provided by your IdP. Example:https://YOUR-ONELOGIN-DOMAIN.onelogin.com/oidc |
Okta, OneLogin, and Keycloak support metadata auto-discovery, so these
settings should be sufficient for those IdPs.
Enter OpenID Additional Settings (if needed)
In some cases, an OpenID IdP may not support metadata auto-discovery,
and additional configuration settings must be entered manually.
In this case:
On the OpenID tab, toggle the Metadata Discovery
button to OFF
to display additional entries on the page.

Enter the relevant parameters derived from your IdP (see table
below) and click Save
.
Base Issuer | Required. Often the same Issuer URL, but can be different for providers that have a separate general domain and user-specific domain (for example, general domain: https://openid-connect.onelogin.com/oidc, user-specific domain: https://sysdig-phil-dev.onelogin.com/oidc)f |
Authorization Endpoint | Required. Authorization request endpoint |
Token Endpoint | Required. Token exchange endpoint |
JSON Web Key Set Endpoint | Required. Endpoint that contains key credentials for token signature verification |
Token Auth Method | Authentication method. Supported values: client_secret_basic ,
client_secret_post . (case insensitive)
|
Select OpenID for SSO
Select OpenID
from the Enabled Single Sign-On
dropdown.
Click Save
Authentication.
Repeat entire enablement process for Sysdig Monitor or Sysdig
Secure, if you want to enable on both applications.
User Experience
As noted in the Basic Enablement Workflow above, you can offer users
three ways to log in with an OpenID configuration:
They can begin at the Sysdig SaaS URL and click the OpenID button.
See SaaS Regions and IP
Ranges and identify the
correct SaaS URL associated with your Sysdig application and region.
For example, URLs of Monitor and Secure for US East are:
Monitor: app.sysdigcloud.com
Secure: secure.sysdig.com
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor in the EU,
you use
https://eu1.app.sysdig.com.
They will be prompted to enter a Company Name, so the Sysdig
platform can redirect the browser to your IdP for authentication.
=

You can provide an alternative URL to avoid the user having to enter
a company name, in the format:
Monitor: https://app.sysdigcloud.com/api/oauth/openid/
CompanyName
Secure:
https://secure.sysdig.com/api/oauth/openid/
CompanyName
?product=SDS
You can configure an IdP-initiated login flow when configuring your
IdP. The users then select the Sysdig application from your IDP’s
app directory and do not browse directly to a Sysdig application URL
at all.
9.3.1 -
Okta (OpenID)
OpenID Provider Configuration for Okta
Review OpenID Connect
(SaaS) before you begin.
The notes below describe minimal steps to be taken in Okta. You may need
to adjust the steps based on the specifics of your environment.
Log in to your Okta organization as a user with administrative
privileges and click to the Admin dashboard
Click on the Add Applications shortcut, then click the Create
New App button
Select Web as the Platform type, then click OpenID Connect
as the Sign-on method, then click Create
Create a new application:
Enter your choice of General Settings.
For Login redirect URIs, enter one of the following values:
See SaaS Regions and IP
Ranges and identify
the correct domain URL (redirect URL) associated with your
Sysdig application and region. For example, domain URLs of
Monitor and Secure for US East are:
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor in the
EU, you use
https://eu1.app.sysdig.com/api/oauth/openid/auth.
Click Save.
You should next be placed in a General tab. Take note of the
Client ID and Client secret that are shown.
You will enter them on the OpenID Configuration page in the Sysdig
authentication settings.
Click to the Sign On tab. Take note of the Issuer URL that
is shown, as it will need to be sent to Sysdig Support.
You will enter it in the OpenID Configuration page in the OpenID
settings.
9.3.2 -
OneLogin (OpenID)
OpenID Provider Configuration for OneLogin
Review OpenID Connect
(SaaS) before you begin.
The notes below describe minimal steps to be taken in OneLogin. You may
need to adjust the steps based on the specifics of your environment.
Log in to your OneLogin organization as a user with administrative
privileges and click to Apps > Custom Connectors, then
click the New Connector button.
Create a new Connector:
Enter your choice of connector name.
Select a Sign on Method of OpenID Connect.
For Redirect URI, enter one of the following values:
See SaaS Regions and IP
Ranges and identify
the correct domain URL (redirect URL) associated with your
Sysdig application and region. For example, domain URLs of
Monitor and Secure for US East are:
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Secure you use
https://eu1.sysdig.com/api/oauth/openid/secureAuth.
Click Save.
From the More Actions pull-down menu, select Add App to
Connector
Click Save to add the app to your catalog. Once clicked,
additional tabs will appear.
Click to the SSO tab. Change the setting in the Token
Endpoint drop-down to POST, then click Save.

While still on the SSO tab, take note of the Client ID and
Client Secret that are shown (click Show client secret to
reveal it).
You will enter them in the OpenID settings.
Note that the Issuer URL will consist of
https://YOUR-ONELOGIN-DOMAIN.onelogin.com/oidc
You will enter them in the OpenID settings.
During testing, we’ve found OneLogin sometimes does not persist changes
that are made in the OpenID Provider configuration. If you make changes
to your OneLogin configuration and experience issues such as HTTP 400
Bad Request when attempting logins to your Sysdig application, you may
need to delete your Custom Connector and App config in OneLogin and
recreate it from scratch.
9.3.3 -
Keycloak (OpenID)
Review OpenID Connect
(SaaS) before you begin.
The notes below describe minimal steps to be taken in Keycloak. You may
need to adjust the steps based on the specifics of your environment.
Log in to your Keycloak server’s Administrative Console.
Select a realm or create a new one.
Click Clients
, then click the Create
button.
Enter the Client ID
of your choosing (e.g. “SysdigMonitor”) and
take note of it.
You will enter it in the OpenID Configuration page in the Sysdig
Authentication Settings.
Make sure the Client Protocol
drop-down has openid-connect
selected. Click the Save
button.
Configure OpenID Connect client:
Click the toggle for Authorization Enabled
to ON
For Valid Redirect URI
, enter one of the following values:
See SaaS Regions and IP
Ranges and identify
the correct domain URL (Redirect URI) associated with your
Sysdig application and region. For example, domain URLs of
Monitor and Secure for US East are:
For other regions, the format is
https://<region>.app.sysdig.com.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor you use
https://eu1.app.sysdig.com/api/oauth/openid/auth.
Click Save .
Click to the Credentials
tab. Take note of the Secret
that is
shown.
You will enter it in the OpenID
settings
Note that the Issuer URL
will consist of
https://KEYCLOAK_SERVER_ADDRESS/auth/realms/REALM_NAME,
where
KEYCLOAK_SERVER_ADDRESS
and REALM_NAME
are derived from your
environment where you just created the configuration. You will enter
it in the OpenID settings.
9.3.4 -
Azure (OpenID)
OpenID Connect
is a security-token based extension of the OAuth
2.0 authorization protocol to do single sign-on. Azure Active Directory
provides an
implementation
of OpenID Connect (OIDC) protocol and Sysdig supports it for single
sign-on and API access to Sysdig application.
Enabling Azure OpenID Connect for single sign-on to Sysdig applications
include configuration on the Microsoft Active Directory as well as on
the Sysdig application.
Prerequisites
Administrator privileges on Sysdig and Azure Active Directory (AD).
Configuring Sysdig Application in Azure AD
Log in to the Azure AD portal.
Search for Azure Active Directory and do one of the following:
Click App registration > New registration.
In the Register an application page, specify the following:
Name: Display name to identify your Sysdig application. For
example, Sysdig Secure.
Supported account types: For Sysdig SaaS, choose Accounts
in this organizational directory only (Default Directory only -
Single tenant). All user and guest accounts created in your
active directory can use Sysdig application and API.
Redirect URI: Authenticated Sysdig users are redirected to
this URI.
See SaaS Regions and IP
Ranges and identify
the correct domain URL associated with your Sysdig application
and region. For example, domain URLs of Monitor and Secure for
US East are:
For other regions, the format is:
https://<region>.app.sysdig.com
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor you use
https://eu1.app.sysdig.com/api/oauth/openid/auth.
For on-prem installations, the redirect URI will be
deployment-specific.
You can add only a single redirect URI on this page. Use the
Authentication page associated with your application to add
additional redirect URIs.
Click Register.
Add additional redirect URIs.
Select your application from App registration.
Click Authentication from the left navigation.
Add the redirect URIs corresponding to Monitor and Secure.

Create a Secret for the Sysdig application.
It is a string that the Sysdig application uses to prove its
identity when requesting a token.
Click Certificates & secrets.

Under Client Secrets, click New client secret.
Enter a description that identifies the secret and choose an
expiration period.
Click Add.
Copy the client secret. You will need the client secret while
configuring OpenID Connect SSO on the Sysdig application.
Copy the Client ID and OpenID Connect endpoints corresponding to the
application that you have created.
Select your application from App registration.
Copy the Application (client) ID.
You will need the client ID while configuring OpenID Connect SSO
on the Sysdig application.
Click Endpoints.

Copy the OpenID Connect metadata document and open it in a
browser.
Copy the OpenID Connect URI (Issuer URI).
For example,
https://login.microsoftonline.com/5a4b56fc-dceb-4a64-94ff-21e08e5892f5/v2.0
To enable Azure OpenID functionality on the Sysdig application, you need
the following:
Client ID
Client Secret
Issuer URL.
See Enable OpenID in
Settings
to learn how to complete your configuration.
9.4 -
Disable Password Authentication (SaaS)
Sysdig Platform supports disabling password-based authentication on both
SaaS and on-prem deployments. As an administrator (super administrator
for on-prem), you can use an API to achieve it. This configuration is
applicable to those who use single sign-on.
SaaS Deployments
As an administrator, perform the following:
Get the Sysdig Platform settings:
See SaaS Regions and IP
Ranges and identify the
correct domain URL associated with your Sysdig application and
region. For example, for Sysdig Monitor on US East is:
GET https://app.sysdigcloud.com/api/auth/settings/
For other regions, the format is
https://<region>.app.sysdig.com/api/auth/settings.
Replace <region> with the region where your Sysidig
application is hosted. For example, for Sysdig Monitor in the EU,
you use
https://eu1.app.sysdig.com/api/auth/settings.
Find the ID of the active SSO setup:
GET https://app.sysdigcloud.com/api/auth/settings/active
Retrieve the specific settings associated with the SSO setup:
GET https://app.sysdigcloud.com/api/auth/settings/{id}
The setting is displayed in a JSON file.
In the JSON file, change the following from false to true:
settings/forbidPasswordLogin: True
Update the setting with a request to the same URL with the same
JSON, with the changed parameter. URL depends on the type of
deployment.
PUT https://app.sysdigcloud.com/api/auth/settings/{id}
9.5 -
(For SaaS) When you want inactive sessions to deactivate after a
time-out period, you can configure it on the Sysdig application. You can
determine how long a user’s browser can be idle after which they will be
automatically logged out from the session.
To do so
Log in to Sysdig Monitor or Sysdig Secure as administrator and
select Settings.
Select Authentication.
Scroll down and locate the Session Expiration settings.

Specify the Session Expiration setting:
Enable session expiration by using the Terminate session after
inactivity period (in minutes) of slider.
Specify the time-out period in minutes.
Click Save.
10 -
A theme specifies the visual appearance of the Sysdig applications.
Theme Preferences allows you to change the look and feel of the
Sysdig applications to match your visual and accessibility requirements.
The list of available themes includes Light, Dark, Match OS
Preferences.
To configure a theme:
Log in to Sysdig Secure or Sysdig Monitor.
Navigate to User Menu. Select Theme from the upper right corner of the User Menu, OR click the Settings gear and choose Users.

Select a desirable theme from the Theme Preferences drop-down.

Match OS Preferences: The theme will be aligned with that of
your operating system. For example, if your Desktop theme is
Dark, the app theme will also be set to Dark.
Your OS theme will override the application theme preferences. For
example, changing the OS theme to Dark while your application
theme preference is Light will automatically switch the
application theme to Dark.
11 -
Certificates Management
The Certificates Management module for Sysdig Secure provides a simple interface for administrators to create, upload, update, or delete the certificates that are used for content exported from the Sysdig environment.
Specifically, it:
- Optimizes the secure handling of certificates
- Supports .csr flows
- Provides a UI for certificate management
- Adds support for client-side certificates in the events forwarder
At this time, the feature is for Sysdig Secure SaaS only, and is integrated with the appropriate event forwarding options:
(Note: Kafka authentication is handled through a different mechanism.)
Access the Certificates Management Page
Log in to Sysdig Secure as admin and navigate to Settings
from your user profile.
Select Certificates Management
.

Create a Certificate
Certificate creation requires several steps, defined below.
Thereafter, you can assign the certificate to the event forwarding integrations.
Generate a CA-Signed Key and Cert
You must have a signed key and certificate from a Certificate Authority (CA), a step that your organization may already have done. If not, follow these steps:
Generate the CA key:
openssl genrsa -out ca.key 4096
Generate the CA certificate, setting the expiration to 10 years from now:
openssl req -x509 -new -nodes -key ca.key -sha256 -days 1825 -out ca.pem
You will be prompted to provide details to populate the certificate information. Be as thorough as possible. Save the resulting ca.pem
file.
Obtain the Certificate Signing Request (CSR)
The Certificates Management UI streamlines the process of obtaining a certificate-signing request (CSR).
Log in to Sysdig Secure as admin
and select Settings > Certificates Management
.
Select New CSR
and copy the text using the Copy and Next
button.

You will be prompted to leave the Sysdig UI to finish generating the certificate in an external tool.
Generate the .crt Certificate File Externally
Use a 3rd-party tool, such as OpenSSL or Digicert, to generate the .crt
file. Follow the instructions given with that tool, using the CSR you generated.
Upload the .crt in the Sysdig UI
Return to the Certificates Management
page in the Sysdig Secure Settings
and either click Next
in the popup window or select Upload Certificate
.

Assign the certificate a meaningful name.
Click Upload and Create
.
The certificate will appear in the certificates list and can be applied as needed.
Apply Certificate to Event Forwarding
Log in to Sysdig Secure as admin and select Settings > Event Forwarding
.
Choose an existing or new integration for Splunk, Syslog, or Webhook.

Select the correct uploaded certificate from the Certificate
field and Save
.
Manage Certificate Use
Check Where Certs Are Used
Remove a Certificate
Update a Certificate
12 -
Use this setting to create a customized login banner to help your organization comply with its security standards.
To create a custom banner:
Navigate to Settings > Login Message
from Sysdig Monitor or Sysdig Secure.

Enter your desired message text, using Markdown to format.
Click Preview
to review. Click Save
.
Log out and log back in to see the message displayed.
