Why monitor Kubernetes?
- Pod-level threats in containerized workloads
- Container breakouts and privilege escalation
- Crypto miners using cluster resources
- Data exfiltration from pods
- Supply chain attacks in container images
Setup (3 minutes)
1. Get API token
2. Deploy via Helm
3. Verify deployment
Configuration
Deployment modes
- Production (Recommended)
- Development
- Monitoring Only
- Full threat detection
- Automatic blocking enabled
- Resource optimization
- High availability
Advanced configuration
What gets detected
Pod Security
- Container breakouts
- Privilege escalation
- Unauthorized file access
- Process injection
Network Threats
- C2 communications
- Data exfiltration
- Lateral movement
- DNS tunneling
Resource Abuse
- Crypto mining
- Resource exhaustion
- Fork bombs
- Compute theft
Supply Chain
- Malicious images
- Backdoored containers
- Vulnerable packages
- Runtime modifications
Verification
After deployment:- Check agent status
- View logs
- Visit dashboard - agents should appear within 2 minutes
- Test detection (optional):

Example detections
Crypto miner in pod
Container breakout attempt
Upgrading
Troubleshooting
Pods not starting
Pods not starting
Symptoms:Fix:
- Check node compatibility:
- Verify API token:
- Check privileges:
No agents in dashboard
No agents in dashboard
Wait 2-3 minutes for initial connection.If still missing:
- Check pod logs:
- Verify network connectivity:
- Test API token:
High resource usage
High resource usage
Symptoms: Nodes running out of CPU/memorySolutions:
- Reduce resource requests:
- Use lightweight mode:
- Node selector for specific nodes:
Detection overload
Detection overload
Symptoms: Too many alerts from noisy workloadsFix: Create allowlist policies: