title: “Behavioral Analytics at host and container level”
date: 2020-12-15T20:51:52
slug: behavioral-analytics-at-host-and-container-level
Strace:
Summara of Calls:
strace -cw ls /
Tracing a running process:
strace -p 2659
Follow forks/subprocesses
strace -p 2659 -f
Counting syscalls from running process (quit with ctrl+c)
strace -p 2659 -f -cw
List open Files from process 2659
ls /proc/2659/fd
List binary File readable
tail -f /var/lib/etcd/member/snap/db | strings
Show Env Vars from container (processes):
cat /proc/10287/environ
Audit with Falco:
install falco
curl -s https://falco.org/repo/falcosecurity-3672BA8F.asc | apt-key add -
echo "deb https://dl.bintray.com/falcosecurity/deb stable main" | tee -a /etc/apt/sources.list.d/falcosecurity.list
apt-get update -y
apt-get -y install linux-headers-$(uname -r)
apt-get install -y falco
docs about falco
https://v1-16.docs.kubernetes.io/docs/tasks/debug-application-cluster/falco
Falco is now Auditing Stuff, check it with:
tail -f /var/log/syslog | grep falco
Find a Pod running image nginx which creates unwanted package management processes inside its container.
Find a Pod running image httpd which modifies /etc/passwd.
Save the Falco logs for case 1 under /opt/course/2/falco.log in format [time][container-id][container-name][user-name]. No other information should be in any line. Collect the logs for at least 30 seconds.
Afterwards remove the threads (both 1 and 2) by scaling the replicas of the Deployments that control the offending Pods down to 0
docker ps | grep 6cb6a5ae8c21
kubectl scale --replicas=0 -n team-purple deployment/rating-service
systemctl stop falco
falco | grep “Package management”
cat out.log | cut -d” ” -f 9 > /opt/course/2/falco.log
