Tetragon#
What is Tetragon?#
Cilium Tetragon is a flexible, Kubernetes-aware security tool, with real-time observability and enforcement. Leveraging the power of eBPF, Tetragon offers a low-overhead, in-kernel solution that enhances security posture by monitoring system behaviors such as process executions, system call activities, and both network and file access events.
Tetragon builds on the Kubernetes-native design of Cilium, and extends beyond traditional observability tools by understanding workload identities like namespaces and pods metadata.
Architecture Overview#
Tetragon policies enable deep, real-time observability and enforcement. Tetragon eBPF sensor sits in the kernel, observing every process execution, syscall, kubectl exec, I/O file activity, and more.
Bring together network and runtime data, with DNS/TLS/HTTP protocol support. Correlate runtime threats with the network activity around it, identifying the exact binaries and processes that spawn specific egress traffic.

Deep dive into the 1.0 Release blog!#
Tetragon exposes its insights through two primary mechanisms: JSON logs and a gRPC endpoint.
Try it out#
Find the right journey and explore the Tetragon hands-on labs at your own pace!
Use Cases#
Why Tetragon?#
Built for Kubernetes, Tetragon's identity-aware eBPF approach simplifies comprehensive K8s runtime security.