--- title: "Falco Architecture" weight: 021 chapter: false --- Falco can detect and alert on any behavior that involves making Linux system calls. Falco alerts are triggered based on specific system calls, arguments, and properties of the calling process. Falco operates at the user space and kernel space, and the system calls are interpreted by the Falco kernel module. The syscalls are then analyzed using the libraries in the userspace, and the events are then filtered using a Falco rules engine. Suspicious events are alerted to outputs, such as Syslog, files, Standard Output, and others. ![Falco Architecture](../images/falco_architecture.png) On a linux node, Falco reads all Kernel level system calls. Since all containers in all pods running on particular host use a shared kernel, then all activity accross all containers can be monitored from this one location ![Falco Architecture](../images/falco_architecture2.png) Similarily, since all Kublet traffic on a Kubernetes cluster is handled on the master, all Kublet activity can be monitored by Falco running the Master node. ![Falco Architecture](../images/falco_architecture1.png) Before we explain more about the Falco concepts and syntax, lets get it installed on our workstation.