This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Resources

Additional resources to learn about Tetragon

Conference talks

Title Authors Conference Date
eBPF-based, Kubernetes-native: observability & security with Tetragon Anna Kapuścińska TechSpot 2024
Past, Present, Future of Tetragon- First Production Use Cases, Lessons Learnt, Where Are We Heading? John Fastabend & Natália Réka Ivánkó KubeCon EU 2023
eBPF and Kubernetes — Better Together! Observability and Security with Tetragon Anna Kapuścińska & James Laverack Kubernetes Community Days UK 2023
The Next Log4jshell?! Preparing for CVEs with eBPF! John Fastabend & Natália Réka Ivánkó KubeCon EU 2023
Tutorial: Getting Familiar with Security Observability Using eBPF & Cilium Tetragon Duffie Cooley & Raphaël Pinson KubeCon EU 2023
Securing the Superpowers: Who Loaded That eBPF Program? John Fastabend & Natália Réka Ivánkó Cloud Native SecurityCon NA 2023
Container Security and Runtime Enforcement with Tetragon Djalal Harouni eBPF Summit 2022
You and Your Security Profiles; Generating Security Policies with the Help of eBPF John Fastabend & Natália Réka Ivánkó eBPF Day North America 2022
eBPF for Runtime Security Liz Rice ContainerDays 2022
Real Time Security - eBPF for Preventing attacks Liz Rice Cloud Native SecurityCon EU 2022
Keeping your cluster safe from attacks with eBPF Jed Salazar & Natália Réka Ivánkó eBPF Summit 2021
Uncovering a Sophisticated Kubernetes Attack in Real Time Part II. Jed Salazar & Natália Réka Ivánkó O’Reilly Superstream Series, Infrastructure & Ops 2021
Uncovering a Sophisticated Kubernetes Attack in Real-Time Jed Salazar & Natália Réka Ivánkó KubeCon EU 2020

Book

Security Observability with eBPF - Jed Salazar & Natália Réka Ivánkó, OReilly, 2022

Blog posts

Tetragon 1.0: Kubernetes Security Observability & Runtime Enforcement with eBPF - Thomas Graf, 2023

Tutorial: Setting Up a Cybersecurity Honeypot with Tetragon to Trigger Canary Tokens - Dean Lewis, 2023

Can I use Tetragon without Cilium? - Dean Lewis, 2023

Detecting a Container Escape with Cilium and eBPF - Natália Réka Ivánkó, 2021

Detecting and Blocking log4shell with Isovalent Cilium Enterprise - Jed Salazar, 2021

Hands-on lab

Getting Started with Tetragon - Natália Réka Ivánkó, Roland Wolters, Raphaël Pinson

Exploring Tetragon - A Security Observability Tool for Kubernetes, Docker, and Linux - Ivan Velichko

Video Tutorials

eBPF for Runtime Enforcement | Tetragon Introduction and Overview - Rawkode Academy

Restrict Access to Secure Files with Tetragon | eBPF Runtime Enforcement - Rawkode Academy