Deploying Tetragon on an Amazon EKS (Elastic Kubernetes Service) cluster involves a series of steps.
Tetragon is a security observability, and runtime enforcement tool for cloud-native environments, particularly effective in Kubernetes environments. Here’s a general outline of the process:
Prerequisites:
Install Tetragon:
Tetragon can be installed as a Kubernetes DaemonSet. This ensures that it runs on each node of your cluster.
You can use a Helm chart provided by Tetragon, or apply Kubernetes manifests directly.
Helm Installation (Recommended):
Install the Tetragon Helm chart:
Configure Tetragon:
Verify Installation:
Once Tetragon is deployed, verify its operation: kubectl get pods -n kube-system | grep tetragon
Read more here - https://tetragon.io/docs/getting-started/install-k8s/
Stream Security leads in Cloud Detection and Response, modeling all cloud activities and configurations in real-time to uncover adversary intent. The platform correlates activities by principles, helping security teams connect the dots and understand correlations among cloud operations. It reveals each alert's exploitability and blast radius to predict the adversary's next move, enabling security teams to detect, investigate, and respond with confidence, outpacing the adversary.