Closed jozseffarago closed 5 years ago
One more details which maybe relevant. As we are on Amazon linux, we have auditd enabled by default. Maybe it messes up Falco somehow. (we had this experience when we did some trial with commercial products, which has similar kernel modules)
This one is a bit difficult to tackle since it seems to be related to your specific environment. What I would do here is to try to use sysdig directly and see what it reports.
For example, to emulate the rule about setuid call by non-sudo
you could do:
sysdig -j evt.type=setuid
That will dump all the setuid events (both directions) in the current machine.
If in the meanwhile you have any setuid
the output should look like the following:
{"evt.cpu":3,"evt.dir":">","evt.info":"uid=1000(fntlnz) ","evt.num":52513,"evt.outputtime":1568426611382001092,"evt.type":"setuid","proc.name":"a.out","thread.tid":224713}
{"evt.cpu":3,"evt.dir":"<","evt.info":"res=0 ","evt.num":52514,"evt.outputtime":1568426611382007072,"evt.type":"setuid","proc.name":"a.out","thread.tid":224713}
/triage needs-information
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
What happened: Falco send alerts where only the alert-triggering detail is usable, most of the other fields are NAs. This only happens in some cases, but seemingly for the same events. Other events are reported correctly.
What you expected to happen: Falco can include all the event specific information to the alert.
How to reproduce it (as minimally and precisely as possible): Unfortunately do not know.
Anything else we need to know?: Falco is running with the kernel module, instead of the EBPF program. Tried to enable EBPF but it was neither able to compile the module, nor download it from s3, due to bad URL.
Environment:
falco --version
):cat /etc/os-release
):uname -a
):Others: Falco config:
Missing event details examples: