Closed maxemontio closed 3 months ago
Your rule is pretty invasive, it basically create an alert for every k8s audit event. If you disable it, do you have the same memory profile? Like that, it's hard to tell which part is the cause, it can be the plugin or the http output of Falco.
@Issif No, without the rule everything is fine. My goal is just to output all possible events. Maybe using falco only for that is a complete overkill?
Falco itself is a rule engine, the capture of the syscalls and their enrichment are made by the libs, and in your situation, the capture of the k8s audit logs from EKS are made by a plugin.
I don't see the added value of Falco if you want to collect all the k8s audit logs from Cloudwatch Logs, the rule engine becoming useless, and the output rate an issue (the tool is designed to trigger security alerts, they are not supposed to be fired dozens times per second, or your infra is highly compromised).
You can find the logic to pull the logs from Cloudwatch Logs used by our plugin here. I think it's pretty easy to get inspiration from it and to develop a little app in charge to get these logs, format them in the Falco payload format and then push to your http endpoint.
Thank you for your help, @Issif!
I have falco with k8saudit-eks addon deployed by helm chart. Very soon after the moment when the pod starts it is getting killed by OOM killer. The only thing i need is to get events from the cluster to parse them later, so there are no complicated rules - i print almost all available fields.
Envirinment
Chart version: 4.7.0 App version: 0.38.1 Plugins: k8saudit-eks, json
Helm values
Rules: