post image June 7, 2022 | 2 min Read

CKS behavioral analytics falco

Explore strace
root@scw-k8s:~# strace -cw ls /
bin   etc         initrd.img.old  lost+found  opt   run   srv  usr      vmlinuz.old
boot  home        lib             media       proc  sbin  sys  var
dev   initrd.img  lib64           mnt         root  snap  tmp  vmlinuz
% time     seconds  usecs/call     calls    errors syscall
------ ----------- ----------- --------- --------- ----------------
 25.62    0.001440         480         3           write
 15.62    0.000878          30        29           mmap
 11.03    0.000620         620         1           execve
 10.21    0.000574          24        24         1 openat
  8.06    0.000453         227         2           getdents
  6.19    0.000348          14        25           close
  5.57    0.000313          13        24           fstat
  4.59    0.000258          29         9           read
  4.59    0.000258          22        12           mprotect
  3.01    0.000169          21         8         8 access
  1.00    0.000056          28         2           ioctl
  0.87    0.000049          25         2         2 statfs
  0.64    0.000036          12         3           brk
  0.53    0.000030          30         1           munmap
  0.53    0.000030          30         1           prlimit64
  0.50    0.000028          14         2           rt_sigaction
  0.37    0.000021          21         1           stat
  0.23    0.000013          13         1           rt_sigprocmask
  0.23    0.000013          13         1           set_robust_list
  0.20    0.000011          11         1           arch_prctl
  0.20    0.000011          11         1           futex
  0.20    0.000011          11         1           set_tid_address
------ ----------- ----------- --------- --------- ----------------
100.00    0.005620                   154        11 total
Falco - finds malicious processes
  • cloud-native runtime security (CNFC)
  • access (deep kernel tracing built on the Linux kernel)
  • assert (describe security rules against a susyem + default ones, detects unwanted behaviour)
  • action (automated respond to a security violations)

# install falco
curl -s https://falco.org/repo/falcosecurity-3672BA8F.asc | apt-key add -
echo "deb https://dl.bintray.com/falcosecurity/deb stable main" | tee -a /etc/apt/sources.list.d/falcosecurity.list
apt-get update -y
apt-get -y install linux-headers-$(uname -r)
apt-get install -y falco

# docs about falco
https://v1-16.docs.kubernetes.io/docs/tasks/debug-application-cluster/falco

systemctl enable --now falco
journalctl -f -u falco
author image

Jan Toth

I have been in DevOps related jobs for past 6 years dealing mainly with Kubernetes in AWS and on-premise as well. I spent quite a lot …

comments powered by Disqus