Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow Multiple Rules to Match Event #1542

Closed
ossie-git opened this issue Jan 28, 2021 · 8 comments
Closed

Allow Multiple Rules to Match Event #1542

ossie-git opened this issue Jan 28, 2021 · 8 comments
Milestone

Comments

@ossie-git
Copy link

ossie-git commented Jan 28, 2021

Motivation

As mentioned here - #1541 - only the first rule gets triggered and once Falco matches a rule, it stops processing other rules. This is meant as a performance improvement (I'm not sure by how much and it would be great if the actual speed improvements were documented somewhere) but it has the following serious cons:

  • rule writers have to be very careful about rule ordering. In practice, this probably means that you can't have the default rules first unless you modify / disable rules that may possibly overshadow your own rule
  • rule writers have to basically understand every rule that runs before their rule to make sure it doesn't match first
  • if a rule writer places their rules first in a custom file (before the default rules file), they would have to copy over all the macros and lists they want to use to their new file
  • you might end up disabling other useful rules in the fear that they overshadow your own rules
  • when testing, you typically only test your own custom rule(s). This means that your rule(s) may work as intended in testing but not in production due to a default rule hiding it in production. And if your backend is configured to report only on rules with a given PRIORITY, you might end up with no alerts on either rule
  • when adding new rules, you typically just add them to the end of the file instead of thinking where exactly in the rule order you have to insert them. Even the official rule set basically does this (for example, the k8s Audit All Events rule isn't the last rule in the file even though it would hide the rest of the rules after it). It isn't enabled by default but even then, it should be the last rule as it has the capability of hiding all remaining rules

It would therefore be great if this was configurable. I think very few rule authors will perform the necessary mental gymnastics needed for all of the above and it makes it more difficult for those who do want to add their own rules

Feature

an option in /etc/falco/falco.yaml to turn off the default behavior and allow all rules to be processed

Alternatives

Additional context

@poiana
Copy link
Contributor

poiana commented Apr 28, 2021

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@poiana
Copy link
Contributor

poiana commented May 28, 2021

Stale issues rot after 30d of inactivity.

Mark the issue as fresh with /remove-lifecycle rotten.

Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle rotten

@poiana
Copy link
Contributor

poiana commented Jun 27, 2021

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

@poiana
Copy link
Contributor

poiana commented Jun 27, 2021

@poiana: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@poiana poiana closed this as completed Jun 27, 2021
@LucaGuerra LucaGuerra reopened this Jul 6, 2023
@LucaGuerra
Copy link
Contributor

/remove-lifecycle rotten

@LucaGuerra LucaGuerra added this to the 0.36.0 milestone Jul 7, 2023
@jasondellaluce
Copy link
Contributor

Now addressed by #2705 from @loresuso.

/close

@poiana poiana closed this as completed Aug 9, 2023
@poiana
Copy link
Contributor

poiana commented Aug 9, 2023

@jasondellaluce: Closing this issue.

In response to this:

Now addressed by #2705 from @loresuso.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@github-project-automation github-project-automation bot moved this from Todo to Done in Falco Roadmap Aug 9, 2023
@jasondellaluce
Copy link
Contributor

/milestone 0.36.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Archived in project
Development

No branches or pull requests

4 participants