Tetragon#
What is Tetragon?#
Cilium Tetragon is a flexible, Kubernetes-aware security tool, with real-time observability and enforcement. Leveraging the power of eBPF, Tetragon offers a low-overhead, in-kernel solution that enhances security posture by monitoring system behaviors such as process executions, system call activities, and both network and file access events.
Tetragon builds on the Kubernetes-native design of Cilium, and extends beyond traditional observability tools by understanding workload identities like namespaces and pods metadata.
Architecture Overview#
Tetragon policies enable deep, real-time observability and enforcement. Tetragon eBPF sensor sits in the kernel, observing every process execution, syscall, kubectl exec, I/O file activity, and more.
Bring together network and runtime data, with DNS/TLS/HTTP protocol support. Correlate runtime threats with the network activity around it, identifying the exact binaries and processes that spawn specific egress traffic.
Tetragon exposes its insights through two primary mechanisms: JSON logs and a gRPC endpoint.
Try it out#
Find the right journey and explore the Tetragon hands-on labs at your own pace!
Use Cases#
Why Tetragon?#
Built for Kubernetes, Tetragon's identity-aware eBPF approach simplifies comprehensive K8s runtime security.