Releases: giantswarm/falco-app
v0.10.0
v0.9.1
Changed
- Add feature gates for enabling/disabling individual Falco components.
v0.9.0
Added
- Add custom rule to detect access to root CA key file in control plane nodes
- Added the falco-k8s-metacollector.
- Added team label to the daemonset.
Changed
- Remove API check on PolicyException.
- Updated
Falco
chart version from3.8.1
to4.6.1
. - Updated
Falco-exporter
chart version from0.9.9
to0.11.0
- Updated
Falcosidekick
chart version from0.7.5
to0.8.2
- Updated
Falco
to upstream version0.38.1
. - Edited Kyverno Policy Exceptions to allow falco-k8s-metacollector.
- Edited the Falco Cilium Network Policy to allow traffing from the falco-k8s-metacollector.
v0.8.1
Changed
- Update Falco CiliumNetworkPolicy to allow communication with Falco Sidekick.
v0.8.0
Changed
- Enable CiliumNetworkPolicies by default.
Added
- Add CiliumNetworkPolicy for falco-exporter.
v0.7.2
v0.7.1
v0.7.0
Changed
- Updated
Falco
chart version from3.3.0
to3.8.1
. - Updated
Falco-exporter
chart version from0.9.6
to0.9.7
- Updated
Falcosidekick
chart version from0.6.1
to0.7.5
- Updated
Falco
to upstream version0.36.1
.
Added
- Added the use of
Falcoctl
.
Notes
Falco made some big changes in the way rules are distributed, categorized, and updated.
For more information, check the Falco release notes.
This means that we will ship Falco with fewer rules by default, as aligned with upstream.
They have done this to give endusers a quieter default set of rules. They will now follow a standard, incubating, sandbox system.
Before this update, all these rules were shipped by default. This means, that if CustomRules or macros were based on some rules which are now considered incubating or sandbox rules, they are now broken.
This can be fixed by altering the configuration of falcoctl to also download and use the incubating and sandbox rules, or by rewriting your CustomRules.
For more information, please check the falco rules page.