Events¶
Events are the core of how Tracee works. Whether you're monitoring system calls, network activity, or security threats, Tracee treats everything as events that you can filter, combine, and act upon in your policies.
Event Categories¶
Tracee provides rich built-in events across six main categories:
- syscalls - System call monitoring
- network - Network activity and protocol analysis
- security - Security-focused detections and signatures
- lsm - Linux Security Module hooks
- containers - Container lifecycle and metadata
- misc - Additional system events and utilities
This section documents all of the different events that Tracee exposes.
Configuring Tracee Events¶
Events are defined in the Policy YAML manifest.
Tracing the execve events in a policy:
apiVersion: tracee.aquasec.com/v1beta1
kind: Policy
metadata:
name: sample-policy
annotations:
description: traces execve events
spec:
scope:
- global
rules:
- event: execve
If no event is passed with [filters] or [policies], tracee will start with a set of default events.
Please head over to the Tracee usage documentation for more information on configuring events.
Event Sets¶
Event sets are predefined groups of related events. Instead of listing events individually, you can use sets like syscalls (all system calls), fs (file system operations), or net (network events).
Discover available sets:
tracee list --wide
Use in policies:
rules:
- event: syscalls # All system calls
- event: fs # File system events
Use on command line:
tracee --events syscalls,net
Tracing All System Calls
Use --events syscalls to trace all system calls without listing them individually.
Related Topics¶
- Policies Documentation - Learn how to create policies that use events
- Custom Signatures - Build your own detection logic using Go
- Troubleshooting - Solutions for event-related issues
Video Content¶
If you are curious to learn more about the Tracee Events architecture and related decision making, then have a look at the following video Q&A:
