-
Notifications
You must be signed in to change notification settings - Fork 912
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False positives in GKE #439
Comments
mstemm
added a commit
that referenced
this issue
Nov 5, 2018
- Allow kubectl to write below /root/.kube - Allow loopback/bridge (e.g. /home/kubernetes/bin/) to setns. - Let istio pilot-agent write to /etc/istio. - Let google_accounts(_daemon) write user .ssh files. - Add /health as an allowed file below /. This fixes #439.
Thanks for the report, I've made the necessary rule changes to address these FPs. If you'd like to try them out, they're currently on the rule-updates-2018-11.v1 branch. Otherwise. We'll probably merge them in the next week or two. |
mstemm
added a commit
that referenced
this issue
Nov 5, 2018
- Allow kubectl to write below /root/.kube - Allow loopback/bridge (e.g. /home/kubernetes/bin/) to setns. - Let istio pilot-agent write to /etc/istio. - Let google_accounts(_daemon) write user .ssh files. - Add /health as an allowed file below /. This fixes #439.
mstemm
added a commit
that referenced
this issue
Nov 9, 2018
- Allow kubectl to write below /root/.kube - Allow loopback/bridge (e.g. /home/kubernetes/bin/) to setns. - Let istio pilot-agent write to /etc/istio. - Let google_accounts(_daemon) write user .ssh files. - Add /health as an allowed file below /. This fixes #439.
leogr
pushed a commit
to falcosecurity/rules
that referenced
this issue
Dec 21, 2022
* Add sensitive mount of mouting to /var/lib/kubelet* * Fix GKE/Istio false positives - Allow kubectl to write below /root/.kube - Allow loopback/bridge (e.g. /home/kubernetes/bin/) to setns. - Let istio pilot-agent write to /etc/istio. - Let google_accounts(_daemon) write user .ssh files. - Add /health as an allowed file below /. This fixes falcosecurity/falco#439. * Improve ufw/cloud-init exceptions Tie them to both the program and the file being written. Also move the cloud-init exception to monitored_directory.
leogr
pushed a commit
to falcosecurity/rules
that referenced
this issue
Dec 21, 2022
* Add sensitive mount of mouting to /var/lib/kubelet* * Fix GKE/Istio false positives - Allow kubectl to write below /root/.kube - Allow loopback/bridge (e.g. /home/kubernetes/bin/) to setns. - Let istio pilot-agent write to /etc/istio. - Let google_accounts(_daemon) write user .ssh files. - Add /health as an allowed file below /. This fixes falcosecurity/falco#439. * Improve ufw/cloud-init exceptions Tie them to both the program and the file being written. Also move the cloud-init exception to monitored_directory.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi,
I was testing Falco in a GKE cluster and it seems that with the default rules configuration some false positives are triggered, some by performing ordinary actions and others are triggered from time to time with no intervention from my side:
I periodically get a bunch of notifications(~80x) similar to this:
After patching a deployment to restart the pods, I get several notifications(~10x) with a message similar to:
If I ssh to any machine of my GCP project, it seems that the keys are also added to the GKE nodes and therefore an additional alert is triggered:
It was tested using latest version form the master branch and only change made was in
falco.yml
to send the alerts to SlackThe text was updated successfully, but these errors were encountered: