Akto can automatically detect and analyze your API traffic—even if it's encrypted using TLS. This is achieved using Akto Traffic Collector, which leverages eBPF to passively observe kernel-level network activity.
You can deploy this collector on any Linux-based system (VM, bare metal, or cloud instance) to forward traffic insights to Akto. Here's how:
Step 1: Set Up Akto Traffic Processor (Mini-Runtime)
First, set up and configure the Akto Traffic Processor (Mini-Runtime).
You’ll get a runtime service URL or Kafka IP once setup is complete.
If you're using on-prem Akto, this will be your internal runtime URL.
Step 2: Deploy Traffic Collector (Supports TLS via eBPF)
This Docker container uses eBPF to mirror all API traffic at the kernel level—including TLS-encrypted traffic—without needing to decrypt it manually or modify applications.
⚠ Prerequisites:
Linux VM or system with kernel headers installed (required for eBPF)
Docker daemon installed and running
Access to your Akto runtime (Kafka IP)
Run the Traffic Collector
The kafka_ip here is the mini-runtime/runtime service URL we saved in the previous step.