Skip to content

Commit

Permalink
fix: add detect threats lab (#84)
Browse files Browse the repository at this point in the history
  • Loading branch information
srodenhuis authored Nov 7, 2024
1 parent ba2051e commit 9210377
Show file tree
Hide file tree
Showing 5 changed files with 45 additions and 0 deletions.
2 changes: 2 additions & 0 deletions .cspell.json
Original file line number Diff line number Diff line change
Expand Up @@ -18,10 +18,12 @@
"Entra",
"minikube",
"cloudnativepg",
"falcosecurity",
"srodenhuis",
"Traefik",
"rbaumgar",
"ebpf",
"syscalls",
"Ficy",
"grype",
"minio",
Expand Down
38 changes: 38 additions & 0 deletions docs/get-started/labs/detect-threats.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
slug: detect-threats
title: Detect threats in running containers
sidebar_label: Detect Threats
---

:::info
Falco needs to be activated for this lab.
:::

Falco is a cloud native security tool that provides runtime security. It leverages custom rules on Linux kernel events and other data sources through plugins, enriching event data with contextual metadata to deliver real-time alerts. Falco enables the detection of abnormal behavior, potential security threats, and compliance violations.

## Generate threats

For this lab we'll deploy the `event-generator` in a Team namespace. The event-generator is a tool designed to generate events for both syscalls and k8s audits. The tool can be used to check if Falco is working properly. It does so by performing a variety of suspects actions which trigger security events. The event-event generator implements a minimalistic framework which makes easy to implement new actions.

1. Add the falcosecurity charts repository:

```bash
helm repo add falcosecurity https://falcosecurity.github.io/charts
helm repo update
```

2. Install the chart in the team namespace:

```bash
helm install team-labs falcosecurity/event-generator -n team-labs
```

## See the events in the detected threats in containers dashboard

1. In the left menu, click on `Apps` and open `Grafana`.

2. Click on the `Detected threads in containers` dashboards

3. See all the generated threat events

![falco-dashboard](../../img/falco-dashboard.png)
4 changes: 4 additions & 0 deletions docs/get-started/labs/scan-containers.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@ title: Scan your running containers for vulnerabilities
sidebar_label: Scan Containers
---

:::important
Trivy Operator is not supported when installed using Akamai Connected Cloud or when running Kubernetes version 1.31.
:::

:::info
Trivy Operator needs to be activated for this lab.
:::
Expand Down
Binary file added docs/img/falco-dashboard.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions sidebar-docs.js
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,7 @@ module.exports = {
"get-started/labs/create-postgresql-db",
"get-started/labs/scan-images",
"get-started/labs/scan-containers",
"get-started/labs/detect-threats",
"get-started/labs/view-logs",
"get-started/labs/view-metrics",
"get-started/labs/monitor-services",
Expand Down

0 comments on commit 9210377

Please sign in to comment.