Skip to main content
Version: v2.2

The Role of ThreatStryker Sensors

Your production workloads are managed using ThreatStryker Sensors. The ThreatStryker Sensors are implemented as lightweight, privileged containers which monitor activity, discover workloads and retrieve manifests. They communicate with the ThreatStryker Management Console over TLS, using the URL and API key.

A single ThreatStryker Console can manage multiple workload types, and on-premise and cloud deployments simultaneously.

Before You Begin

Before you install the Sensors, obtain the Management Console URL and API key as described in the Initial Configuration.

You should take care to install the sensor version that matches your Management Console version, as compatibility across versions is not guaranteed.

Review the architecture for the Sensor Agent, as described in Architecture: Sensor Agent.

System Requirements

ThreatStryker performs detailed scanning of resources using sensor agents that are deployed with the target infrastructure.

Sensor containers can be deployed directly to Kubernetes or Fargate, or can be deployed on a Docker environment. If you wish to monitor a Linux-based virtual machine or bare-metal production server, you should install a docker runtime within the host Linux operating system:

CPU: No of cores0.5 units of 1 core
RAM200 MB to 1 GB
Linux kernel version>= 4.4
ConnectivityAccess to Deepfence Management Console IP address, port 443 (configurable)

For Windows Server hosts, experimental support exists, but it is not suitable for production use.

Installing the ThreatStryker Sensors

For your convenience, the ThreatStryker management console provides the default installation commands to install the agent on a docker host or in a kubernetes cluster:

Agent Setup
Default Agent Setup (URL and Key masked)

More detailed instructions are as follows: