-
Notifications
You must be signed in to change notification settings - Fork 920
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limiting the size of the lists in rule files #1736
Comments
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh with Rotten issues close after an additional 30d of inactivity. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue with Mark the issue as fresh with Provide feedback via https://github.com/falcosecurity/community. |
@poiana: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Describe the bug
Following this article - https://sysdig.com/blog/how-to-identify-malicious-ip-activity-using-falco/ I configured a rule to track malicious IPs. The rule works when an incoming file from malicious IPs less than 500 KB is used. But the rule doesn't work when too many IPs (more than 2 MB) are used.
How to reproduce it
To reproduce the error you just need to follow this article - https://sysdig.com/blog/how-to-identify-malicious-ip-activity-using-falco/. But I made some adjustments to the proposed script, so in the presented form it did not work as it should. Therefore, I will describe it step by step:
Step 1: Writing the Falco rule
To complete this step, we will write this rule to a file under/etc/falco/malicious_ips_rule.yaml.
Step 2: Generate a constantly updated malicious IP list
Step 3: Update Falco configuration (/etc/falco/falko.yml) like this:
Step 4: Testing!
Expected behaviour
I was expecting new logs in /var/log/syslog.log file related to an attempt to connect to malicious IPs. But that didn't happen.
But if I use an incoming file with malicious IPs of smaller size, e.g. using a slightly different address in a script like this https://raw.githubusercontent.com/stamparm/ipsum/master/levels/2.txt, everything will work fine and we can see the new logs in the /var/log/syslog.log.
Environment
Linux kub-node1-fl 4.15.0-137-generic Rule fixes for dragent. #141-Ubuntu SMP Fri Feb 19 13:46:27 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
APT package
Additional context
I did not find any information in the documentation about the limits for the lists used in the rules
The text was updated successfully, but these errors were encountered: