Sentrilite — Detect Threats Before They Become Breaches

Quick Installation Guide

Get Sentrilite running in minutes - real-time kernel-level threat detection from the first command.

🐧 Install Sentrilite on a Single Linux Server

🎬 Installation Walkthrough

Watch the step-by-step installation video to see the full setup process in action.

Run the following command on your Linux server. Docker must be installed and running. The agent requires privileged access and host PID namespace to perform kernel-level monitoring.

sudo docker run --rm -it --name sentrilite \
  --privileged --pid=host \
  -p 8080:8080 -p 8765:8765 \
  -v /sys/fs/bpf:/sys/fs/bpf \
  -v /sys/kernel/debug:/sys/kernel/debug \
  sentrilite/local:1.0.0
🌐 Once the container is running, open a browser and navigate to:
http://<server-ip>:8080

To install on public cloud (AWS, GCP, Azure) or on-prem Kubernetes cluster, contact us at info@sentrilite.com

Schedule a Demo