Skip to content

M6: Deploy Tetragon for kernel-level eBPF syscall tracing #50

@CodeBuildder

Description

@CodeBuildder

Goal

Replace Falco's userspace detection with Tetragon's kernel-level eBPF enforcement.

Tasks

  • Deploy Tetragon via Helm in kube-system namespace
  • Configure TracingPolicy CRDs for process execution, file access, network connect
  • Wire Tetragon JSON export to argus-agent webhook
  • Add Tetragon-specific alert parsing in webhook.py
  • Test: detect shell spawn, file read, outbound connection at kernel level

Why this matters

Tetragon can BLOCK syscalls in real-time, not just alert. Zero-day resistant. Falco alerts after the fact; Tetragon can prevent the action entirely.

Acceptance criteria

  • Tetragon running on all 3 nodes
  • Shell spawn in prod container blocked within 100ms
  • Alerts appear in Argus incident feed

Metadata

Metadata

Assignees

No one assigned

    Labels

    infrastructureCluster and infra setupmodule-6Runtime eBPF and kernel enforcement

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions