Shipping Tetragon Logs to AWS CloudWatch
Introduction So, you've deployed Tetragon and you're seeing the kernel-level security events it produces. You can see every process execution, every network connection, every file access. This is a goldmine of security data. But it immediately leads to the next big question: where do you put...
