Deploying Tetragon on an Amazon EKS (Elastic Kubernetes Service) cluster involves a series of steps.
Tetragon is a security observability, and runtime enforcement tool for cloud-native environments, particularly effective in Kubernetes environments. Here’s a general outline of the process:
Prerequisites:
Install Tetragon:
Tetragon can be installed as a Kubernetes DaemonSet. This ensures that it runs on each node of your cluster.
You can use a Helm chart provided by Tetragon, or apply Kubernetes manifests directly.
Helm Installation (Recommended):
Install the Tetragon Helm chart:
Configure Tetragon:
Verify Installation:
Once Tetragon is deployed, verify its operation: kubectl get pods -n kube-system | grep tetragon
Read more here - https://tetragon.io/docs/getting-started/install-k8s/
Stream.Security delivers the only cloud detection and response solution that SecOps teams can trust. Born in the cloud, Stream’s Cloud Twin solution enables real-time cloud threat and exposure modeling to accelerate response in today’s highly dynamic cloud enterprise environments. By using the Stream Security platform, SecOps teams gain unparalleled visibility and can pinpoint exposures and threats by understanding the past, present, and future of their cloud infrastructure. The AI-assisted platform helps to determine attack paths and blast radius across all elements of the cloud infrastructure to eliminate gaps accelerate MTTR by streamlining investigations, reducing knowledge gaps while maximizing team productivity and limiting burnout.