- Lab
- A Cloud Guru
Threat Detection in Kubernetes with Falco
Runtime threat detection can be an important component of a secure Kubernetes environment. Falco is a powerful tool in detecting anomalous activity as it occurs. In this lab, you will practice your skills with behavioral analysis in Kubernetes by checking for threats in a real cluster using Falco.
Path Info
Table of Contents
-
Challenge
Create a Falco Rules File Configured to Scan the Container
The container in question is running inside a Pod called
nginx
in thedefault
namespace. The container is also callednginx
. For this exercise, you can assume that the container name is unique in the cluster.Create a Falco rules file at
/home/cloud_user/nginx-rules.yml
with a rule to report any newly-spawned processes in this container.The rule's output should include the following:
- timestamp
- process name
- UID
- container ID
- container name
- container image name
-
Challenge
Run Falco to Obtain a Report of the Activity and Save It to a File
Falco is already installed on the worker node. Using your rules file, run Falco for 45 seconds or so to obtain a report of the container's activity.
Save the report to
/home/cloud_user/falco-report.log
.
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.