05.11.2025

Runtime Radar: Installing and Configuring Container Security Monitoring in Kubernetes

Runtime Radar is an open-source software solution for monitoring security events at runtime and responding to incidents in containerized environments.
It is designed to bridge the gap between image scanning during the CI/CD phase and the actual behavior of containers during execution — since some threats arise only at runtime, such as mining processes, privilege escalation, unexpected network traffic, and others.
The project is licensed under Apache 2.0.

Why Use Runtime Radar

Main Advantages

When It’s Especially Useful

Architecture (Overview)

The main components of Runtime Radar:

Graphically: sensors in clusters → events → analysis engine → notifications/interface.

Prerequisites

Before installation, make sure your environment meets the following requirements:

Installation Steps

  1. Clone the repository
    git clone https://github.com/Runtime-Radar/runtime-radar.git cd runtime-radar
  2. Prepare the Helm chartThe install/helm directory contains the Helm chart for installation.
    If needed, customize the values.yaml file (integration addresses, namespace, permissions, etc.).
    Example:
    helm install runtime-radar ./install/helm -n radar --create-namespace
    --set notifier.syslog.enabled=true
    --set notifier.webhook.url=https://…
    --set clusterManager.enabled=true
  3. Deploy the sensor on nodesThe sensor should be installed on each node from which you want to collect events. Ensure kernel/container events are being captured (e.g., process launches, privilege changes, network connections).
  4. Configure Rules (Policy / Rules)In the web interface or via SDK, you can apply pre-built monitoring policies or write your own signatures in Go.
  5. Integrate with Notification/Logging SystemsSet up notifications through syslog, SMTP, or webhook. Choose message templates (uses Go template engine).
  6. Verify Operation
    • Open the web console UI;
    • Check that sensors are connected and events are being received;
    • Run a test anomaly (for example, start a container with unusual behavior) and verify that the event is detected and a notification is sent;
    • Use filters and investigation tools: process visualization, parent/child relationships, event type, etc.
  7. Multi-Cluster Deployment (if required)Connect additional clusters via the Cluster Manager following the documentation. This allows managing all environments from a single interface.

Configuration and Operation

Policies and Rules

Investigation Interface

Integration with SOC/Logs

Monitoring Performance

Known Limitations and Considerations

Conclusion

Container security is not just a set of tools - it’s a mindset. Runtime Radar helps you face the runtime stage, where real uncertainty lives: new processes, unexpected connections, and configuration errors.

Don’t treat monitoring as a formality. Listen to your infrastructure like a living system — it has “symptoms” that must be detected in time.
Configure alerts that warn about real problems without creating noise.
And most importantly - make security part of your daily development cycle, not just a reaction to incidents.

Runtime Radar can be your container “stethoscope”: quiet, unobtrusive, yet saving time and nerves when something goes wrong.

FAQ - Frequently Asked Questions