Tetragon - eBPF-based Security Observability and Runtime Enforcement
  • Documentation
  • Community
  • Getting Started
  • Enterprise
  • Features
    • Capabilities Monitoring
    • Execution Monitoring
    • File Integrity Monitoring
    • Kubernetes Identity Aware Policies
    • Network Observability
    • Operating System Integrity
    • Privileges Monitoring
  • GitHub
  • Documentation
    • Overview
    • Getting Started
      • Quick Kubernetes Install
      • Quick Local Docker Install
      • Execution Monitoring
      • File Access Monitoring
      • Network Monitoring
      • Policy Enforcement
    • Installation and Configuration
      • Kubernetes
      • Container
      • Package
      • Runtime Hooks
      • Install tetra CLI
      • Verify installation
      • Configuration
      • Metrics
      • FAQ
    • Concepts
      • Events
      • Tracing Policy
        • Example
        • Argument types
        • Hook points
        • Options
        • Selectors
        • Tags
        • Kubernetes Identity Aware Policies
        • Enforcement Mode
      • Runtime Hooks
      • Enforcement
        • Persistent enforcement
      • Event throttling
    • Policy Library
      • Tetragon Observability Policies
    • Use Cases
      • Process lifecyle
        • Process execution
        • Advanced Process execution
        • Privileged execution
      • Filename access
      • Network observability
      • Linux process credentials
        • Monitor Process Credentials changes at the System Call layer
        • Monitor Process Credentials changes at the Kernel layer
      • Host System Changes
        • Monitor Linux Kernel Modules
      • Security Profiles
        • Record Linux Capabilities Usage
    • Contribution Guide
      • Development setup
      • Making changes
      • Running tests
      • Documentation
      • Submitting a pull request
      • Developer's certificate of origin
      • Release & upgrade notes
    • Reference
      • Daemon Configuration
      • Helm chart
      • gRPC API
      • Metrics
    • Troubleshooting
      • System dump
      • Log level
      • BPF programs statistics
    • Resources
View page source Edit this page Create child page Create documentation issue Create project issue Print entire section
  1. Documentation
  2. Installation and Configuration

Installation and Configuration

Tetragon installation and configuration options

Deploy on Kubernetes

Deploy and manage Tetragon on Kubernetes

Deploy as a container

Install and manage Tetragon as a container without a Kubernetes cluster

Deploy with a package

Install and manage Tetragon via released packages.

Configure Runtime Hooks

Configure Runtime Hooks

Install tetra CLI

To interact with Tetragon, install the Tetragon client CLI tetra

Verify installation

Verify Tetragon image and software bill of materials signatures

Configure Tetragon

Metrics

Learn how to configure and access Prometheus metrics.

FAQ

List of frequently asked questions

Last modified May 3, 2024: docs: Clarify titles of Getting Started and Installation sections (c2f1ef13f)
Tetragon - eBPF-based Security Observability and Runtime Enforcement
  • Documentation
  • Community
  • Getting Started
  • Enterprise
  • GitHub
Bluesky link Slack link Github link

© 2024 The Tetragon Authors. All rights reserved

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our Trademark Usage page. Linux is a registered trademark of Linus Torvalds. Privacy Policy and Terms of Use.