Skip to content

Events

Events are the core of how Tracee works. Whether you're monitoring system calls, network activity, or security threats, Tracee treats everything as events that you can filter, combine, and act upon in your policies.

Event Categories

Tracee provides rich built-in events across six main categories:

  • syscalls - System call monitoring
  • network - Network activity and protocol analysis
  • security - Security-focused detections and signatures
  • lsm - Linux Security Module hooks
  • containers - Container lifecycle and metadata
  • misc - Additional system events and utilities

This section documents all of the different events that Tracee exposes.

Configuring Tracee Events

Events are defined in the Policy YAML manifest.

Tracing the execve events in a policy:

apiVersion: tracee.aquasec.com/v1beta1
kind: Policy
metadata:
  name: sample-policy
  annotations:
    description: traces execve events
spec:
  scope:
    - global
  rules:
    - event: execve

If no event is passed with [filters] or [policies], tracee will start with a set of default events.

Please head over to the Tracee usage documentation for more information on configuring events.

Event Sets

Event sets are predefined groups of related events. Instead of listing events individually, you can use sets like syscalls (all system calls), fs (file system operations), or net (network events).

Discover available sets:

tracee list --wide

Use in policies:

rules:
  - event: syscalls     # All system calls
  - event: fs           # File system events

Use on command line:

tracee --events syscalls,net

Tracing All System Calls

Use --events syscalls to trace all system calls without listing them individually.

Video Content

If you are curious to learn more about the Tracee Events architecture and related decision making, then have a look at the following video Q&A:

Everything is an Event in Tracee Watch the video