From ff94383ed96d48555f34977e3e5070be9f726348 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 24 Feb 2022 01:47:57 -0500 Subject: [PATCH] spelling: berkeley Signed-off-by: Josh Soref --- brand/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/brand/README.md b/brand/README.md index 392c9ed7..802f0506 100644 --- a/brand/README.md +++ b/brand/README.md @@ -56,7 +56,7 @@ If a rule has been violated, Falco triggers an alert. ### How does Falco work? Falco traces kernel events and reports information about the system calls being executed at runtime. -Falco leverages the extended berkley packet filter (eBPF) which is a kernel feature implemented for dynamic crash-resilient and secure code execution in the kernel. +Falco leverages the extended berkeley packet filter (eBPF) which is a kernel feature implemented for dynamic crash-resilient and secure code execution in the kernel. Falco enriches these kernel events with information about containers running on the system. Falco also can consume signals from other input streams such as the containerd socket, the Kubernetes API server and the Kubernetes audit log. At runtime, Falco will reason about these events and assert them against configured security rules.