-
Notifications
You must be signed in to change notification settings - Fork 70
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A rule to view all user actions in a container (and bonus, host) - missing audit trail #224
Comments
Thanks @jonny-wg2 - I can confirm that it is one of the top desires among adopters. Given that we now have the concept of Sandbox rules, perhaps we can derive a generic rule that can serve as a template (disabled by default). Terminology:
Host: Mostly here, we would be referring to commands run over ssh, either manually or through remote ssh commands. Container: In a container, we mostly associate interactivity with execing into a container. However, References: |
Sorry to chime into the conversation here 🙇 I feel like a feature like this would be better served via a separate processing engine rather than Falco as a rule engine. So long story short it would probably easier to implement this kind of use case by further separating Falco libs (i.e., libscap libsinsp) from the Falco rule engine. By running the libs in a specialized collector process that simply feeds the event stream some where it would be possible to have the Falco rule engine and other processes subscribe to that stream. Effectively you could run Falco and then what ever extra processing you want to run off of the same Syscall feed. |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh with Rotten issues close after an additional 30d of inactivity. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue with Mark the issue as fresh with Provide feedback via https://github.com/falcosecurity/community. |
@poiana: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Motivation
We are missing logs for what a user is performing in a container. We have alerts if one does "dangerous" commands like
nc
but I want to use falco to generate a history of logs for all actions performed by a user in a container. This is similar to theTerminal shell in container
(as shown below)Feature
Create a rule that will log all user traffic in a container. It would also be nice to have a second rule to log all user traffic on the host.
The text was updated successfully, but these errors were encountered: