Tetragon - eBPF-based Security Observability and Runtime Enforcement
  • Documentation
  • Community
  • Getting Started
  • Enterprise
  • Features
    • Capabilities Monitoring
    • Execution Monitoring
    • File Integrity Monitoring
    • Kubernetes Identity Aware Policies
    • Network Observability
    • Operating System Integrity
    • Privileges Monitoring
  • GitHub
  • Documentation
    • Overview
    • Getting Started
      • Quick Kubernetes Install
      • Quick Local Docker Install
      • Execution Monitoring
      • File Access Monitoring
      • Network Monitoring
      • Policy Enforcement
    • Installation and Configuration
      • Kubernetes
      • Container
      • Package
      • Runtime Hooks
      • Install tetra CLI
      • Verify installation
      • Configuration
      • Metrics
      • FAQ
    • Concepts
      • Events
      • Tracing Policy
        • Example
        • Argument types
        • Hook points
        • Options
        • Selectors
        • Tags
        • Kubernetes Identity Aware Policies
        • Enforcement Mode
      • Runtime Hooks
      • Enforcement
        • Persistent enforcement
      • Event throttling
    • Policy Library
      • Tetragon Observability Policies
    • Use Cases
      • Process lifecyle
        • Process execution
        • Advanced Process execution
        • Privileged execution
      • Filename access
      • Network observability
      • Linux process credentials
        • Monitor Process Credentials changes at the System Call layer
        • Monitor Process Credentials changes at the Kernel layer
      • Host System Changes
        • Monitor Linux Kernel Modules
      • Security Profiles
        • Record Linux Capabilities Usage
    • Contribution Guide
      • Development setup
      • Making changes
      • Running tests
      • Documentation
      • Submitting a pull request
      • Developer's certificate of origin
      • Release & upgrade notes
    • Reference
      • Daemon Configuration
      • Helm chart
      • gRPC API
      • Metrics
    • Troubleshooting
      • System dump
      • Log level
      • BPF programs statistics
    • Resources
View page source Edit this page Create child page Create documentation issue Create project issue Print entire section
  1. Documentation
  2. Troubleshooting

Troubleshooting

Learn how to troubleshoot Tetragon

System dump

Learn how to collect system dumps.

Log level

Learn how to configure log levels.

BPF programs statistics

Monitor BPF programs statistics

Last modified December 18, 2024: docs: split troubleshooting page into subpages (453cc76d0)
Tetragon - eBPF-based Security Observability and Runtime Enforcement
  • Documentation
  • Community
  • Getting Started
  • Enterprise
  • GitHub
Bluesky link Slack link Github link

© 2024 The Tetragon Authors. All rights reserved

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our Trademark Usage page. Linux is a registered trademark of Linus Torvalds. Privacy Policy and Terms of Use.