<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Tetragon on Pi Stack</title>
    <link>https://www.pistack.xyz/tags/tetragon/</link>
    <description>Recent content in Tetragon on Pi Stack</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 07 May 2026 11:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.pistack.xyz/tags/tetragon/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>KubeArmor vs Falco vs Tetragon — Kubernetes Runtime Security Enforcement (2026)</title>
      <link>https://www.pistack.xyz/posts/2026-05-07-kubearmor-vs-falco-vs-tetragon-runtime-security-guide/</link>
      <pubDate>Thu, 07 May 2026 11:00:00 +0000</pubDate>
      <guid>https://www.pistack.xyz/posts/2026-05-07-kubearmor-vs-falco-vs-tetragon-runtime-security-guide/</guid>
      <description>&lt;p&gt;Runtime security is the last line of defense in Kubernetes. Even with strong image scanning and policy enforcement, a compromised container can execute arbitrary commands. Three open-source tools provide runtime security enforcement: &lt;strong&gt;KubeArmor&lt;/strong&gt; (LSM-based policy enforcement), &lt;strong&gt;Falco&lt;/strong&gt; (signature-based detection), and &lt;strong&gt;Tetragon&lt;/strong&gt; (eBPF-based enforcement).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
