Prerequisites for running Tracee¶
Tracee is heavily dependent on Linux and does not support any other operating system.
Distributions and Linux Flavors¶
- List of supported environments:
- With BTFHUB (check BTF session below):
- Centos 8 (kernel < 4.18.0-193.el8)
- Debian 10 (buster) with v5.10 kernels
- Oracle Linux 7 and 8 with v5.4 kernels
- Red Hat 8 (kernel <= 4.18.0-147.57.1)
- SuSe 15.3 (kernel < 5.3.18-150300.59.90)
- Regular Build:
- Amazon Linux 2
- Centos 8 and newer
- Debian 11 (bullseye) and newer
- Fedora 38 and newer
- Oracle Linux 7, 8 (v5.4 kernels, some might need btfhub) and newer
- Red Hat 8 (newer v4.18 kernels) and newer
- SuSe 15.3 (newer kernels) and newer
- Possibly other distributions with recent kernels.
- Cloud Environments:
- Amazon EKS
- Azure AKS
- GKE (Google Kubernetes Engine): 5.4, 5.10, 5.15 and newer
- Minikube, Microk8s and other development environments
This list is based on capabilities those versions provide and not necessarily in tracee having all its features tested on each of them. Please provide feedback if you face any issues in one of those environments.
Kernel version¶
To run Tracee a modern longterm supported kernel is needed: 5.4, 5.10, 5.15, 6.2, 6.5
You can check kernel.org for current supported kernels. In addition to upstream kernels, most distributions long-term supported kernels are supported as well, including CentOS8 4.18 kernel.
BTF¶
Tracee needs low-level type information about the running kernel. Most modern Linux distributions ship with the BTF feature that exposes this information.
To test if this feature is enabled in your environment, check if
/sys/kernel/btf/vmlinux exists. If absent, you might need to upgrade to a
newer OS version, or contact your OS provider.
Kernel symbols¶
Certain Tracee events require access to the Kernel Symbols Table, a feature present in many Linux distributions.
To test if this feature is enabled in your environment, check if
/proc/kallsyms exists. If absent, contact your OS provider.
Alternatively, you can disable the following events which depends on kallsyms:
dirty_pipe_splice(detects dirty pipe vulnerability - CVE-2022-0847)hooked_syscall(detects system call interception technique)hidden_kernel_module(detects hidden kernel modules technique)hooked_proc_fops(detects procfs file operations interception technique)print_net_seq_ops(related hooked_seq_ops event)hooked_seq_ops(detects network packets interception technique)print_mem_dump(allows memory dumping from symbols to signatures can use)
For more information and help about kernel symbols, please see here.
OS information¶
Tracee will try to probe the running OS and kernel to detect available capabilities. For this, it needs access to some standard informative files:
- For OS information please make sure the file
/etc/os-releaseis available. - For Kernel information please make sure one of the files
/boot/config-$(uname-r)OR/proc/config.gzis available.
For more information and help about OS info files, please see here.
Process capabilities¶
Tracee needs non-trivial capabilities to instrument the kernel. The easiest way is run Tracee as "privileged" or "root".
If you want to run Tracee with "least privileges", here are the required capabilities and justifications:
- Manage eBPF maps limits (
CAP_SYS_RESOURCE) - Load and Attach eBPF programs:
CAP_BPF+CAP_PERFMONfor recent kernels (>=5.8) where the kernel perf paranoid value in/proc/sys/kernel/perf_event_paranoidis equal to 2 or less- or
CAP_SYS_ADMINotherwise
CAP_SYS_PTRACE(to collect information about processes)CAP_NET_ADMIN(to load cgroup_skb BPF programs for network packet capture)CAP_SETPCAP(if given - used to reduce bounding set capabilities)CAP_SYSLOG(to access kernel symbols through /proc/kallsyms)- On some environments (e.g. Ubuntu)
CAP_IPC_LOCKmight be required as well. - On cgroup v1 environments,
CAP_SYS_ADMINis recommended if running from a container in order to allow tracee to mount the cpuset cgroup controller.
For more information and help about process capabilities, please see here.
LSM BPF Support¶
Certain Tracee features might depend on Linux Security Module (LSM) BPF support, which allows attaching BPF programs to LSM hooks for enhanced security monitoring.
To check if LSM BPF is supported in your environment, build and use the provided check tool:
# Build the LSM check tool
make lsm-check
# Check LSM support (requires root privileges)
sudo ./dist/lsm_check
# Quiet mode (just exit code)
sudo ./dist/lsm_check --quiet
Exit codes:
- 0: LSM BPF is supported ✅
- 1: LSM BPF is not supported (expected on most systems) ⚠️
- 2: Check failed due to insufficient privileges or other errors ❌
Note: LSM BPF requires specific kernel configuration and is not available on all systems. Tracee will function normally without LSM BPF support, but some advanced security features may be limited.
Having Issues?
If you encounter problems during installation or setup, check our Troubleshooting Guide for common solutions.
Processor architecture¶
Tracee supports x86 and arm64 processors.