This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Resources

Additional resources to learn about Tetragon

    Conference talks

    TitleAuthorsConferenceDate
    What Agent to Trust with Your K8s: Falco, Tetragon or KubeArmor?Henrik RexedKubecon NA2024
    eBPF-based, Kubernetes-native: observability & security with TetragonAnna KapuścińskaTechSpot2024
    Past, Present, Future of Tetragon- First Production Use Cases, Lessons Learnt, Where Are We Heading?John Fastabend & Natália Réka IvánkóKubeCon EU2023
    eBPF and Kubernetes — Better Together! Observability and Security with TetragonAnna Kapuścińska & James LaverackKubernetes Community Days UK2023
    The Next Log4jshell?! Preparing for CVEs with eBPF!John Fastabend & Natália Réka IvánkóKubeCon EU2023
    Tutorial: Getting Familiar with Security Observability Using eBPF & Cilium TetragonDuffie Cooley & Raphaël PinsonKubeCon EU2023
    Securing the Superpowers: Who Loaded That eBPF Program?John Fastabend & Natália Réka IvánkóCloud Native SecurityCon NA2023
    Container Security and Runtime Enforcement with TetragonDjalal HarounieBPF Summit2022
    You and Your Security Profiles; Generating Security Policies with the Help of eBPFJohn Fastabend & Natália Réka IvánkóeBPF Day North America2022
    eBPF for Runtime SecurityLiz RiceContainerDays2022
    Real Time Security - eBPF for Preventing attacksLiz RiceCloud Native SecurityCon EU2022
    Keeping your cluster safe from attacks with eBPFJed Salazar & Natália Réka IvánkóeBPF Summit2021
    Uncovering a Sophisticated Kubernetes Attack in Real Time Part II.Jed Salazar & Natália Réka IvánkóO’Reilly Superstream Series, Infrastructure & Ops2021
    Uncovering a Sophisticated Kubernetes Attack in Real-TimeJed Salazar & Natália Réka IvánkóKubeCon EU2020

    Book

    Security Observability with eBPF - Jed Salazar & Natália Réka Ivánkó, OReilly, 2022

    Blog posts

    Tetragon 1.0: Kubernetes Security Observability & Runtime Enforcement with eBPF - Thomas Graf, 2023

    Tutorial: Setting Up a Cybersecurity Honeypot with Tetragon to Trigger Canary Tokens - Dean Lewis, 2023

    Can I use Tetragon without Cilium? - Dean Lewis, 2023

    Detecting a Container Escape with Cilium and eBPF - Natália Réka Ivánkó, 2021

    Detecting and Blocking log4shell with Isovalent Cilium Enterprise - Jed Salazar, 2021

    Hands-on lab

    Getting Started with Tetragon - Natália Réka Ivánkó, Roland Wolters, Raphaël Pinson

    Exploring Tetragon - A Security Observability Tool for Kubernetes, Docker, and Linux - Ivan Velichko

    Video Tutorials

    eBPF for Runtime Enforcement | Tetragon Introduction and Overview - Rawkode Academy

    Restrict Access to Secure Files with Tetragon | eBPF Runtime Enforcement - Rawkode Academy