This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Resources

Additional resources to learn about Tetragon

    Conference talks

    TitleAuthorsConferenceDate
    eBPF-based, Kubernetes-native: observability & security with TetragonAnna KapuścińskaTechSpot2024
    Past, Present, Future of Tetragon- First Production Use Cases, Lessons Learnt, Where Are We Heading?John Fastabend & Natália Réka IvánkóKubeCon EU2023
    eBPF and Kubernetes — Better Together! Observability and Security with TetragonAnna Kapuścińska & James LaverackKubernetes Community Days UK2023
    The Next Log4jshell?! Preparing for CVEs with eBPF!John Fastabend & Natália Réka IvánkóKubeCon EU2023
    Tutorial: Getting Familiar with Security Observability Using eBPF & Cilium TetragonDuffie Cooley & Raphaël PinsonKubeCon EU2023
    Securing the Superpowers: Who Loaded That eBPF Program?John Fastabend & Natália Réka IvánkóCloud Native SecurityCon NA2023
    Container Security and Runtime Enforcement with TetragonDjalal HarounieBPF Summit2022
    You and Your Security Profiles; Generating Security Policies with the Help of eBPFJohn Fastabend & Natália Réka IvánkóeBPF Day North America2022
    eBPF for Runtime SecurityLiz RiceContainerDays2022
    Real Time Security - eBPF for Preventing attacksLiz RiceCloud Native SecurityCon EU2022
    Keeping your cluster safe from attacks with eBPFJed Salazar & Natália Réka IvánkóeBPF Summit2021
    Uncovering a Sophisticated Kubernetes Attack in Real Time Part II.Jed Salazar & Natália Réka IvánkóO’Reilly Superstream Series, Infrastructure & Ops2021
    Uncovering a Sophisticated Kubernetes Attack in Real-TimeJed Salazar & Natália Réka IvánkóKubeCon EU2020

    Book

    Security Observability with eBPF - Jed Salazar & Natália Réka Ivánkó, OReilly, 2022

    Blog posts

    Tetragon 1.0: Kubernetes Security Observability & Runtime Enforcement with eBPF - Thomas Graf, 2023

    Tutorial: Setting Up a Cybersecurity Honeypot with Tetragon to Trigger Canary Tokens - Dean Lewis, 2023

    Can I use Tetragon without Cilium? - Dean Lewis, 2023

    Detecting a Container Escape with Cilium and eBPF - Natália Réka Ivánkó, 2021

    Detecting and Blocking log4shell with Isovalent Cilium Enterprise - Jed Salazar, 2021

    Hands-on lab

    Getting Started with Tetragon - Natália Réka Ivánkó, Roland Wolters, Raphaël Pinson

    Exploring Tetragon - A Security Observability Tool for Kubernetes, Docker, and Linux - Ivan Velichko

    Video Tutorials

    eBPF for Runtime Enforcement | Tetragon Introduction and Overview - Rawkode Academy

    Restrict Access to Secure Files with Tetragon | eBPF Runtime Enforcement - Rawkode Academy