Deployment
Endura Runtime Sensor is a lightweight runtime security agent that provides real-time protection and policy enforcement across diverse Linux environments. This overview covers the installation methods, distribution channels, and technical considerations for deploying the Sensor across your infrastructure.
Supported Platforms
Endura Runtime Sensor supports installation on all major Linux distributions:
RPM-Based Distributions:
- RedHat Enterprise Linux 8/9/10
- AlmaLinux 8/9/10
- Rocky Linux 8/9/10
- CentOS Stream 8/9
- Fedora 43
- Oracle Linux 8/9/10
- SUSE Linux Enterprise Server (SLES) 15/16
- OpenSUSE Leap 15/16
DEB-Based Distributions:
- Debian 11/12/13
- Ubuntu (all supported LTS and current releases)
Other Distributions:
- Alpine Linux 3
- Amazon Linux 2023
- Arch Linux
Installation Methods
Native Package Installation
The Sensor is distributed as native packages optimized for each platform:
RPM Packages - For RedHat, CentOS, Fedora, SUSE, Oracle Linux, AlmaLinux, and Rocky Linux distributions. These packages integrate with the system package manager (dnf/yum/zypper) and include systemd service files.
DEB Packages - For Debian and Ubuntu distributions, providing seamless integration with apt package management and systemd.
Tarball (TGZ) - For distributions without native package format support (Alpine, Arch, Amazon Linux), we provide pre-compiled tarballs with installation scripts.
Official Package Repositories
For distributions supporting RPM and DEB packages, we maintain official package repositories:
- RPM Repository: Provides signed packages for all RPM-based distributions with automatic dependency resolution
- DEB Repository: Offers signed packages for Debian-based systems with apt integration
Repository installation includes GPG key verification to ensure package authenticity and integrity.
Container Distribution
The Sensor is also packaged and distributed as a container image:
Registry: ghcr.io/endurasecurity/container/endura-sensor
The containerized Sensor provides:
- Consistent deployment across container orchestration platforms
- Simplified updates and rollbacks
- Isolation from host package management
- Support for Kubernetes, Docker, Podman, and other container runtimes
Versioning and Release Channels
Semantic Versioning
Endura Runtime Sensor follows semantic versioning (semver) principles:
- Major.Minor.Patch format (e.g., 1.2.3)
- Major versions for breaking changes
- Minor versions for new features
- Patch versions for bug fixes and security updates
Release Channels
Three release channels provide different stability and testing levels:
Latest Channel
- Most recent builds that passed Sensor-specific automated testing
- Equivalent to CI/CD builds
- Recommended for development and testing environments
- Fastest access to new features and fixes
Testing Channel
- Builds that passed both Sensor testing and full integration/end-to-end testing with Team Server
- Rolling release model with regular updates
- Suitable for staging environments and early adoption
- Balance between stability and feature access
Stable Channel
- Thoroughly tested releases promoted from the testing channel
- Undergoes extensive manual testing and validation
- Traditional release model with slower, more predictable updates
- Recommended for production environments requiring maximum stability
Each channel represents tagged versions of the same builds, allowing easy promotion between channels as testing confidence increases.
Security Enforcement Technology
eBPF LSM Integration
Endura Runtime Sensor leverages Extended Berkeley Packet Filter (eBPF) Linux Security Module (LSM) hooks for optimal security policy enforcement:
Primary Mode - eBPF LSM Hooks:
- Intercepts security-relevant operations at the kernel level
- Enables real-time policy decisions before operations complete
- Can reject unauthorized operations before they execute
- Provides the strongest security posture with minimal performance impact
Fallback Mode - eBPF fentry Hooks:
- Used when eBPF LSM hooks are unavailable
- Monitors operations but cannot prevent their execution
- Limited to terminating offending processes via SIGKILL after detection
- Still provides security value through rapid threat response
LSM Hook Availability
Distributions with eBPF LSM Support (out-of-the-box):
- RedHat Enterprise Linux 8/9/10
- AlmaLinux 8/9/10
- Rocky Linux 8/9/10
- CentOS Stream 8/9
- Fedora 43
- Debian 11/12/13
- SUSE Linux Enterprise Server 15/16
- OpenSUSE Leap 15/16
- Arch Linux
- Amazon Linux 2023
Distributions requiring manual eBPF LSM configuration:
- Alpine Linux 3 (all variants)
- Ubuntu (all versions)
- Oracle Linux with Unbreakable Enterprise Kernel (UEK)
For distributions without default eBPF LSM support, refer to your distribution’s documentation for kernel configuration guidance to enable these security features.
Process Termination Behavior
By default, the Sensor attempts to terminate processes that violate security policies regardless of the enforcement mode:
- eBPF LSM mode: Reject operation + optionally terminate process
- eBPF fentry mode: Monitor operation + terminate process
- Process termination can be disabled via configuration for audit-only deployments
System Requirements
Hardware Requirements
- Memory: Minimum 512MB RAM, 1GB recommended for production workloads
- Disk Space: 1GB available space for installation and logs
- CPU: Any x86_64 or ARM64 architecture supported by the target distribution
Software Requirements
- Kernel Version: Linux kernel 4.18+ (5.8+ recommended for optimal eBPF LSM support)
- systemd: Required for service management on all distributions
- Network Access: HTTPS connectivity for package repositories and Team Server communication
Team Server Integration
The Runtime Sensor can operate in two modes:
Standalone Mode: Local policy enforcement without centralized management
- Policies configured locally via configuration files
- Logs stored locally or forwarded to external systems
- Suitable for isolated environments or air-gapped deployments
Team Server Mode: Centralized management and policy distribution
- Policies managed centrally through Team Server web interface
- Real-time telemetry and alert aggregation
- Centralized logging and compliance reporting
- Sensor token authentication for secure communication
Performance Considerations
- CPU Overhead: Typically <2% CPU utilization under normal workloads
- Memory Footprint: Base memory usage of ~100-200MB depending on policy complexity
- Network Traffic: Minimal bandwidth usage for telemetry (configurable batching)
- Kernel Integration: eBPF programs provide near-zero latency security enforcement
Network Requirements
Outbound Connectivity (Team Server Mode):
- HTTPS (443/tcp) to Team Server for policy updates and telemetry
- DNS resolution for Team Server hostname
Package Installation:
- HTTPS (443/tcp) to package repositories (repo.endurasecurity.com)
- HTTPS (443/tcp) to container registry (ghcr.io) for container deployments
Next Steps
Choose your platform-specific installation guide:
- Alpine Linux
- Amazon Linux 2023
- Arch Linux
- CentOS Stream
- Debian/Ubuntu
- Fedora
- Oracle Linux
- RHEL/AlmaLinux/Rocky Linux
- SUSE Linux
Each guide provides detailed installation instructions, configuration options, and troubleshooting information specific to your distribution.