YoVDO

Tetragon: eBPF-Based Security Observability and Runtime Enforcement Tool

Offered By: DevConf via YouTube

Tags

Tetragon Courses Linux Courses Security Policies Courses eBPF Courses Cilium Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the powerful Cilium Tetragon component for real-time, eBPF-based security observability and runtime enforcement in this 36-minute conference talk from DevConf.CZ 2024. Gain insights into Tetragon's overall design, configuration options, and practical usage examples. Learn how this highly configurable tool enables observation of various Linux operating system components and enforcement of security policies. Discover the potential of Tetragon to enhance your system's security and monitoring capabilities through this informative presentation by speaker Jiri Olsa.

Syllabus

Tetragon observability and security tool - DevConf.CZ 2024


Taught by

DevConf

Related Courses

Introduction to Cilium
Linux Foundation via edX
100Gbit/s Clusters with Cilium - Building Tomorrow's Networking Data Plane
CNCF [Cloud Native Computing Foundation] via YouTube
Adopting Network Policies in Highly Secure Environments
CNCF [Cloud Native Computing Foundation] via YouTube
All Your Queues Are Belong to Us - The Hunt for a Network Bug in the Kernel
Linux Foundation via YouTube
Observing Kubernetes Networking with Cilium, Hubble, and Grafana
CNCF [Cloud Native Computing Foundation] via YouTube