Главная
Study mode:
on
1
Introduction
2
Tetragon
3
Setup
4
Events
5
Tracing Policy
6
Kprobes
7
Enforcement
8
Simlink
9
New Pods
10
Applying a Tracing Policy
11
Using the CNL Name
12
Logs
13
Log Visualization
14
Conclusion
15
Filtering
16
Filtering Demonstration
17
Questions
18
Indication of compromise
19
BTF
20
Selector Semantic
Description:
Explore Tetragon, an eBPF-based security observability and runtime enforcement tool, in this comprehensive introduction. Learn about its setup, event tracing capabilities, and policy enforcement features. Dive into topics such as kprobes, simlink, and new pod detection. Discover how to apply tracing policies, utilize the CNL name, and leverage log visualization for enhanced security insights. Gain practical knowledge through demonstrations on filtering techniques and addressing potential indicators of compromise. Understand the importance of BTF selectors and their semantic applications in cloud-native environments.

Introduction to Tetragon - CNCF Security Tool

CNCF [Cloud Native Computing Foundation]
Add to list