-
Notifications
You must be signed in to change notification settings - Fork 909
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DISCUSSION] New base_syscalls.exclude_enter_exit_set
config
#2960
Comments
@stevenbrz let's see if the other maintainers are on board. If yes, it could be a great "warm up" contribution for you to take on 😉 |
Yes, Falco doesn't scale on these huge servers and we need to find a possible solution to mitigate this case, one idea could be:
This is just an idea but maybe it could work |
Big +1 those aren't an issue. |
I'm in support of this. |
I'm in favor of investigating this front 👍 |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Motivation
The hardware landscape is evolving towards models with 96, 128, or more CPUs. However, Falco currently faces usability challenges on such machines, particularly those dealing with heavy traffic, especially in network and file-related activities.
One potential solution could involve allowing end users to specify a subset of enter or exit syscall events they want to drop on the kernel side. This feature would be flagged as very risky to use, similar to the existing
base_syscalls
feature.For instance, users might opt to drop enter syscall events for
open*
andconnect
syscalls, even though they are aware that doing so could expose them to TOCTOU attacks (mitigated by default via this PR). Nevertheless, this trade-off might be preferable to completely disabling Falco.Feature
Introduce a new config
base_syscalls.exclude_enter_exit_set
, allowing exclusion of specific enter or exit events that are part of thecustom_set
syscalls. This exclusion is limited to scenarios where it makes sense for enter or exit events. Ensure good documentation.Additional context
falcosecurity/libs#1557
CC @falcosecurity/libs-maintainers
The text was updated successfully, but these errors were encountered: