
GitOps your Falco Rules
Falco rules management has been a discussed topic for quite a long time. When we start building and customizing rules for our environment, we need a simple way to effectively update and distribute them to our Falco fleet. Starting from Falco 0.34, we can easily do it by using OCI artifacts and leveraging any private or public container registry to store and retrieve them.
Besides what OCI artifact are, in this blog we are going to learn 2 main concepts:
- How we can create OCI artifacts containing our Falco rules in an automated way.
- How Falco can retrieve those OCI artifacts to update its local configuration:
- In a Linux server.
- In a Kubernetes cluster.
As you can see, there's a lot of content to cover, so let's start right away.
OCI artifacts
OCI stands for Open Container Initiative, which is a project focused on creating open standards for container image formats and runtime specifications. An OCI artifact refers to a container image or a bundle that conforms to the OCI specifications.
In other words, our OCI artifacts will be similar to container images. They will be stored and made available by container registries. They could also be uploaded and downloaded using familiar tools in the container ecosystem.
Does it mean we need a container runtime to use it? Not at all.
OCI artifacts for Falco are created using the falcoctl tool. This tool takes either a plain rules file or a set of them, inside a compressed file, and will, in a single step, create the OCI artifact and upload it to an OCI-complaint container registry.
In the node, where the falco
daemon runs, falcoctl
will retrieve that same OCI artifact, extract its content, and place it on the right place so falco
can detect the latest threats.
Automating GitHub to pack Falco custom rules
Rules management à la DevOps
Git has become the de-facto technology to maintain a versioned copy of our most precious bits. Besides, it allows for automation and collaboration. These features makes it the perfect place to store our rules files. But what about distribution?
Using known CI/CD techniques we can pack the latest rules in a distributable object. Maybe we prefer to stick to a stable version, or maybe we want to be flexible offering multiple versions. Combining the power of Git with the standards of OCI, Falco is able to selectively retrieve the most suitable rules for each platform.
Choose your weapons, here are mine
Time to get our hands busy. We'll need for this tutorial:
- An empty GitHub repo.
- A Falco ruleset file.
- A Falco installation. This tutorial will use both, Falco running as a systemd-service and also deployed using a Helm chart on Kubernetes.
- A container registry. We're going to use GitHub packages that comes with any public GitHub repository for free!
And here is a high-level descriptions of the steps to follow:
- Create an empty GitHub repo.
- Uploading our ruleset. A file is enough.
- Configuring GitHub Actions to generate and publish the OCI artifact.
- Testing. Not strictly required… just kidding. Always test.
Simple enterprise, right? Then, let’s go for it.
Create a new GitHub repository
That’s probably the easiest task here. We login to GitHub, go to repositories, and create that empty repo with the name of our like:
Upload your Custom Ruleset
Each person has their own liking for doing this step. Here, we'll clone the repo in a terminal, add the content, and commit it.
Don’t forget to push the commit. It wouldn’t be the first time we hit our head against the wall for having forgotten it. Have I mention not to forget to push the commit.
For our example, we'll be creating a file named custom-falco-rules.yaml
with the following content:
It's not much, and it doesn't do much, we keep it simple, since the content of the rules files is not what we want to focus on. We'll update it later to something more useful for our example.
It's time to upload it to the repository:
And that’s it. Now we have some content ready for the next step. That was probably no challenge for many of you.
Configuring GitHub Actions
Well, that’s going to be the fun part. Basically, we’ll tell GitHub what to do when a new version of the ruleset file is pushed to the repository.
Again, a high-level description of the steps to follow will surely help:
- Download the Falcoctl tool.
- Retrieve content of the rules repository (the file we want to distribute as an OCI artifact).
- Upload the OCI artifact to the container registry.
You might be wondering whether we forgot any step. We surely did, intentionally. Just some little tasks that’ll help us set up the workflow properly. What we haven’t missed is the step to convert the ruleset file into an OCI artifact. That’s falcoctl job.
Now, let’s create an outline for the workflow.
Feel free to jump to the resulting workflow file. You can always come back here to see through the process of creating it.
To add some flexibility to our example, we'll add a few environmental variables that can be easily tuned for experimentation. These will be the name of the rules file, the container registry that'll store the artifact, and the name and version of it.
Since we need to upload the OCI Artifact to the container registry, let's grant our workflow write permisions that'll allow us to use the GitHub token for that purpose.
Be aware that we are using the GitHub container registry. You wouldn't need those permissions here if you happened to use an external one.
Time to add the steps to our workflow to let falcoctl
tool create the OCI artifact with out rules.
Define the Steps in your Workflow
The next 3 tasks have one simple goal: Build the falcoctl
tool. We mentioned before we were going to download it, but at the time of writing this, the latest released version wasn't supporting registry authentication properly. That's our main reason to compile it here.
Falcoctl tool
Let's start with downloading the source code for our tool to the ./tools/falcoctl
directory. We'll need that path to access falcoctl
later.
The second task is just an auxiliary task that will enable the Go cache, which might not be necessary, but it'll save us a lot of time every time you compile the falcoctl
tool.
Feel free to ignore the following step it at your discretion, although I wouldn't recommend it.
Pay attention to the parameter (last line) passed to cache the dependencies. It'll depend on the values set in the previous task.
Finally, a simple build step and our tool will be available as ./tools/falcoctl/falcoctl
One last step before creating and uploading the OCI artifact is to have the rules we are pushing into it. This simple GitHub Action will download our repo into the rules/
directory.
Upload the OCI Artifact
Here it is where the magic happens. This example spreads across multiple lines to make it easier to understand.
The systax will look like: falcoctl registry push [--option ...] destination-url source-file
. Let's dissect the command for a better understanding.
- Line 2, uses the | symbol, which indicates that all the segments at the same indentation level will be interpreted as a single line. YAML specifics.
- Line 3, contains the cli verbs, the fresly compiled
falcoctl
tool with the subverbsregistry push
as shown above. The options will come later. - Line 4,
--config /dev/null
, is required to tellfalcoctl
not to use a configuration file. Otherwise it will try to create the directory/etc/falcoctl
and we might not have permissions for that. Using a config file is an alternative, but for simplicity and pedagogical reasons we've kept everything on the command line. - Line 5,
--type rulesfile
, indicates what time of content should this artifact have. It could be a plugin or a rulesfile - Line 6,
--version ${OCI_ARTIFACT_VERSION}
, indicates the version of the artifact. It might look a bit redundant, but it's a mandatory option for thefalcoctl
command. - Line 7 is the destination URL to push the OCI artifact into. It should contain the registry, git user and repo name, name of the artifact, and the tag, which we have called version in this blog post.
- Line 8 is just the name of the rulesfile that the OCI artifact will include.
Credentials
Our step won't need any previous authentication step thanks to the environment variable FALCOCTL_REGISTRY_AUTH_BASIC
that we'll add at the end of the last step. This variable can contain any number of credentials separated by a semi-colon, but we require only one in our example.
The 3 elements of a credential, separated by commas, are the registry url, the user that is authenticating and the token for that user.
Appended to the step where we were pushing the OCI artifact, and based on environmental information, we'll instantiate the variable as:
Final Workflow File
Once our workflow is complete, it should look like:
Once the file is ready, we'll upload it to GitHub, where it'll be processed by GitHub Actions. After that, we'll just need to wait for the workflow to finish.
Your repository will probably look like this:
And if your GitHub action executed successfully, it'll look like this:
Now it's time to test our freshly generated OCI artifact.
Testing our Rules Workflow
How do we test our new fancy rule distribution system? The best way would be using a customizable Falco installation to pull our rules.
Here we can have two scenarios: running Falco as a Linux service or deploying it as a Kubernetes Daemonset. Let's cover both of them to see the differences.
Falco and Falcoctl running as Linux services
For this scenario, I'll use the Try Falco scenario which instructions are available in the Falco website. Only the first set of instructions are required to have the scenario up and running. Once our scenario is ready, we'll proceed to configure the rules automatic update.
First of all, let's have a look into the falcoctl-artifact-follow.service
unit status:
We can see there that there is an instance of falcoctl
following an item named falco-rules:0. We'll come back to that later.
Let's have a look then into falcoctl.yaml
configuration file, the default one, since no other explicit configuration file has been passed for the service.
All right, that is lot of useful information. Let's take our time. First, we can observe it contains 2 configuration sections, artifact and indexes.
The artifact section instructs falcoctl
to update the rules files when necessary, checking for updates every 6 hours. The files to be updated are referenced under the refs:
section. That list contains a single element at the moment: falco-rules:0. That should ring a bell, right?
Now, to understand what falco-rules:0 means, we should look into the indexes section. An index is a file describing where to download an OCI artifact from, and what to do with it. At the moment, it only supports passing the file via http. However, using a local file will also be an option in the future.
In the following command, we'll extract the 14 lines that are relevant to to the falco-rules artifact:
We can see in that index the locations of the different OCI artifacts containing each one of the rules files. That in particular is the entry of the falco-rules artifact. However, we see no trace of that :0 suffix.
Let's use the command falcoctl artifact info
to see where that takes us. That command will use the index file and will share information obtained from the remote artifact.
We found it! The :0 suffix is just a floating tag referring, in our example, to the 0.1.0 tag. Falco could have used the 0.1.0 tag directly, the 0.1 one, or even the :latest tag (but that could have had some consequences in the future).
Summarizing what we have learned so far:
falcoctl
will follow the artifact tagged as falco-rules:0 which resolves to the OCI artifact ghcr.io/falcosecurity/rules/falco-rules:0.1.0.- This information results from combining the
/etc/falcoctl/falcoctl.yaml
configuration file and thehttps://falcosecurity.github.io/falcoctl/index.yaml
index file. - The OCI artifact ghcr.io/falcosecurity/rules/falco-rules:0 could point to a different artifact in the future without us having to reconfigure every Falco installation.
- Every 6 hours,
falcoctl
will check whether the artifact has changed and will update it locally.
Customize Falcoctl configuration
To let falcoctl
manage our new artifacts, we are going to add some changes to our falcoctl.yaml
configuration.
First, we are installing new custom rules, so we'll add that to the artifact.install section:
Then, let's add the new artifact to follow and decrease the checking interval to 5 minutes:
If you container registry is private and requires credentials to access it, here you can find further information to configure it: Falcoctl Configuration Example.
The final falcoctl.yaml
file would look like that, depending on the changes you have done:
To verify the custom_falco_rules.yaml
file doesn't exist, we'll
Before we fully apply those changes, instruct Falco to read this new file. Open the file /etc/falco/falco.yaml
and add the new rules file:
Time to let falcoctl
follow the new artifact:
Before we move on, observe the alert that Falco has been giving when the falcoctl-artifact-follow
service restarts:
We can get rid of that alert by extending our custom-falco-rules.yaml
ruleset file, generate a new OCI artifact and let falcoctl
download it. It'll be the perfect example to test our new configuration.
The following macro adds a new condition not to trigger the rule. The condition is that the process trying to write in the the /etc/
directory is falcoctl
. We added that list previously to have some content in the file.
This should trigger the GitHub actions workflow and in a few minutes, we should have an updated ruleset file in our /etc/falco
directory:
If you look at the status of the falco
service you should see the line indicating the reload of Falco's configuration:
Falco and Falcoctl running on Kubernetes
The architecture here is a bit different. Basically, since falco
is deployed as a container inside a Pod
managed by a DaemonSet
, falcoctl
will also run as a sidecar container within the same Pod. That way, they can share the rules directory where falcoctl
will deposit every updated version of the rules files.
Let's start deploying Falco on Kubernetes and see how the initial configuration looks like:
There we can see the falco
Pod with 2 running containers. Let's extract their names:
The first container seems to be based on the falco-no-driver
image (the driver is loaded separately), and the second one has the name falcoctl-artifact-follow
. If you went through the previous section, you'll see the name of the container matches the service name in Linux.
Now we need to look for the configuration file. We saw in the previous section its name was /etc/falcoctl/falcoctl.yaml
. Let's start extracting the volumes on the falcoctl-artifact-follow
container:
Now that we have the configMap name, we can proceed to update its configuration.
Customing the Falcoctl ConfigMap
It is a good practice to observe what normal logs look like before changing a program to a newer configuration. So just to keep track of it:
Nothing new, it follows the falco-rules:0
artifact and checks every 6 hours. Same as in the previous section.
Here we have the default configuration installed by Helm when deploying falco
and falcoctl
:
and here are the changes that we want to do on it so it checks every 2 minutes, as before, and for a newer OCI artifact.
Translated into our Helm chart values.yaml
, the fields to modify would look like:
The previous and following steps assume you have a local values.yaml
file that you can customize.
We'll pass it as an argument (-f
option) to the Helm command updating in this way our Falco deployment.
You can download a copy of that file from here.
Followed by Helm upgrade command:
Once we have updated those changes, we can wait for the new Pods with the current configuration:
Once the Pod is running, the logs from the sidecar container should tell us if all went as expected:
Our rules artifact is being followed now, it'll check every 2 minutes, so we can observe the content of the rules directory and the rules file:
To test the workflow, as we did before, we can update the rules file locally, commit and push it to GitHub, and see if falcoctl
updates it the same way it did in the previous section.
After some minutes, this should be the content of the rules file inside the new container:
To make falco
use this file, we'd need to tell Falco where to find these new rules. We can do that by editing the Helm values.yaml
file again to make Falco aware of our custom rules file:
Followed again by the respective Helm upgrade command:
Once updated the deployment, we can wait for the Pods with the newest configuration. Their logs will look like the following:
And we can continue updating our rules files in the GitHub repository, the GitHub Actions pipeline will take care of creating the OCI artifacts, and falcoctl
will distribute those rules to wherever we have configured.
Conclusion
The Falco community has recognized the importance of staying up-to-date with the latest security threats and best practices, and the Falco maintainers have adopted the use of OCI artifacts as a solution for easy, controlled, and efficient delivery of Falco rules.
Through this blog, readers have learned how using OCI artifacts Falco takes a step towards ensuring the security of their systems and staying ahead of potential security threats.