Implementing a Zero Trust network and runtime security model on Kubernetes with Cilium, Tetragon, Hubble, and L7 policies, and eBPF-powered detection.
-
Updated
Dec 15, 2025 - CSS
Implementing a Zero Trust network and runtime security model on Kubernetes with Cilium, Tetragon, Hubble, and L7 policies, and eBPF-powered detection.
A Daemonset to send Tetragon Events to Crowdstrike Falcon LogScale NG-SIEM
Add a description, image, and links to the tetragon topic page so that developers can more easily learn about it.
To associate your repository with the tetragon topic, visit your repo's landing page and select "manage topics."