- Elastic integrations
- Integrations quick reference
- 1Password
- Abnormal Security
- ActiveMQ
- Active Directory Entity Analytics
- Admin By Request EPM integration
- Airflow
- Akamai
- Apache
- API (custom)
- Arbor Peakflow SP Logs
- Arista NG Firewall
- Atlassian
- Auditd
- Auth0
- authentik
- AWS
- Amazon CloudFront
- Amazon DynamoDB
- Amazon EBS
- Amazon EC2
- Amazon ECS
- Amazon EMR
- AWS API Gateway
- Amazon GuardDuty
- AWS Health
- Amazon Kinesis Data Firehose
- Amazon Kinesis Data Stream
- Amazon MQ
- Amazon Managed Streaming for Apache Kafka (MSK)
- Amazon NAT Gateway
- Amazon RDS
- Amazon Redshift
- Amazon S3
- Amazon S3 Storage Lens
- Amazon Security Lake
- Amazon SNS
- Amazon SQS
- Amazon VPC
- Amazon VPN
- AWS Bedrock
- AWS Billing
- AWS CloudTrail
- AWS CloudWatch
- AWS ELB
- AWS Fargate
- AWS Inspector
- AWS Lambda
- AWS Logs (custom)
- AWS Network Firewall
- AWS Route 53
- AWS Security Hub
- AWS Transit Gateway
- AWS Usage
- AWS WAF
- Azure
- Activity logs
- App Service
- Application Gateway
- Application Insights metrics
- Application Insights metrics overview
- Application State Insights metrics
- Azure logs (v2 preview)
- Azure OpenAI
- Billing metrics
- Container instance metrics
- Container registry metrics
- Container service metrics
- Custom Azure Logs
- Custom Blob Storage Input
- Database Account metrics
- Event Hub input
- Firewall logs
- Frontdoor
- Functions
- Microsoft Entra ID
- Monitor metrics
- Network Watcher VNet
- Network Watcher NSG
- Platform logs
- Resource metrics
- Spring Cloud logs
- Storage Account metrics
- Virtual machines metrics
- Virtual machines scaleset metrics
- Barracuda
- BeyondInsight and Password Safe Integration
- BitDefender
- Bitwarden
- blacklens.io
- Blue Coat Director Logs
- BBOT (Bighuge BLS OSINT Tool)
- Box Events
- Bravura Monitor
- Broadcom ProxySG
- Canva
- Cassandra
- CEL Custom API
- Ceph
- Check Point
- Cilium Tetragon
- CISA Known Exploited Vulnerabilities
- Cisco
- Cisco Meraki Metrics
- Citrix
- Claroty CTD
- Cloudflare
- Cloud Asset Inventory
- CockroachDB Metrics
- Common Event Format (CEF)
- Containerd
- CoreDNS
- Corelight
- Couchbase
- CouchDB
- Cribl
- CrowdStrike
- Cyberark
- Cybereason
- CylanceProtect Logs
- Custom Websocket logs
- Darktrace
- Data Exfiltration Detection
- DGA
- Digital Guardian
- Docker
- DomainTools Real Time Unified Feeds
- Elastic APM
- Elastic Fleet Server
- Elastic Security
- Elastic Stack monitoring
- Elasticsearch Service Billing
- Envoy Proxy
- ESET PROTECT
- ESET Threat Intelligence
- etcd
- Falco
- F5
- File Integrity Monitoring
- FireEye Network Security
- First EPSS
- Forcepoint Web Security
- ForgeRock
- Fortinet
- Gigamon
- GitHub
- GitLab
- Golang
- Google Cloud
- Custom GCS Input
- GCP
- GCP Audit logs
- GCP Billing metrics
- GCP Cloud Run metrics
- GCP CloudSQL metrics
- GCP Compute metrics
- GCP Dataproc metrics
- GCP DNS logs
- GCP Firestore metrics
- GCP Firewall logs
- GCP GKE metrics
- GCP Load Balancing metrics
- GCP Metrics Input
- GCP PubSub logs (custom)
- GCP PubSub metrics
- GCP Redis metrics
- GCP Security Command Center
- GCP Storage metrics
- GCP VPC Flow logs
- GCP Vertex AI
- GoFlow2 logs
- Hadoop
- HAProxy
- Hashicorp Vault
- HTTP Endpoint logs (custom)
- IBM MQ
- IIS
- Imperva
- InfluxDb
- Infoblox
- Iptables
- Istio
- Jamf Compliance Reporter
- Jamf Pro
- Jamf Protect
- Jolokia Input
- Journald logs (custom)
- JumpCloud
- Kafka
- Keycloak
- Kubernetes
- LastPass
- Lateral Movement Detection
- Linux Metrics
- Living off the Land Attack Detection
- Logs (custom)
- Lumos
- Lyve Cloud
- Mattermost
- Memcached
- Menlo Security
- Microsoft
- Microsoft 365
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft DHCP
- Microsoft DNS Server
- Microsoft Entra ID Entity Analytics
- Microsoft Exchange Online Message Trace
- Microsoft Exchange Server
- Microsoft Graph Activity Logs
- Microsoft M365 Defender
- Microsoft Office 365 Metrics Integration
- Microsoft Sentinel
- Microsoft SQL Server
- Mimecast
- ModSecurity Audit
- MongoDB
- MongoDB Atlas
- MySQL
- Nagios XI
- NATS
- NetFlow Records
- Netskope
- Network Beaconing Identification
- Network Packet Capture
- Nginx
- Okta
- Oracle
- OpenAI
- OpenCanary
- Osquery
- Palo Alto
- pfSense
- PHP-FPM
- PingOne
- PingFederate
- Pleasant Password Server
- PostgreSQL
- Prometheus
- Proofpoint TAP
- Proofpoint On Demand
- Pulse Connect Secure
- Qualys VMDR
- QNAP NAS
- RabbitMQ Logs
- Radware DefensePro Logs
- Rapid7
- Redis
- Rubrik RSC Metrics Integration
- Sailpoint Identity Security Cloud
- Salesforce
- SentinelOne
- ServiceNow
- Slack Logs
- Snort
- Snyk
- SonicWall Firewall
- Sophos
- Spring Boot
- SpyCloud Enterprise Protection
- SQL Input
- Squid Logs
- SRX
- STAN
- Statsd Input
- Sublime Security
- Suricata
- StormShield SNS
- Symantec
- Symantec Endpoint Security
- Sysmon for Linux
- Sysdig
- Syslog Router Integration
- System
- System Audit
- Tanium
- TCP Logs (custom)
- Teleport
- Tenable
- Threat intelligence
- ThreatConnect
- Threat Map
- Thycotic Secret Server
- Tines
- Traefik
- Trellix
- Trend Micro
- TYCHON Agentless
- UDP Logs (custom)
- Universal Profiling
- Vectra Detect
- VMware
- WatchGuard Firebox
- WebSphere Application Server
- Windows
- Wiz
- Zeek
- ZeroFox
- Zero Networks
- ZooKeeper Metrics
- Zoom
- Zscaler
Falco Integration
editFalco Integration
editVersion |
1.3.0 (View all) |
Compatible Kibana version(s) |
8.13.3 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
This integration allows for the shipping of Falco alerts to Elastic for observability and organizational awareness. Alerts can then be analyzed by using either the dashboard included with the integration or via the creation of a custom dashboard within Kibana.
Data Streams
editThe Falco integration collects one type of data stream:
- Logs The Logs data stream collected by the Falco integration is comprised of Falco Alerts. See more details about Falco Alerts in Falco’s Outputs Documentation. A complete list of potential fields used by this integration can be found in the Logs reference
Requirements
editYou need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.
Falco must be configured to output alerts to a supported output channel as defined in Setup. The system will only receive fields output by Falco’s rules. If a rule does not include a desired field the rule must be edited in Falco to add the field.
This integration is compatible with Falco version 0.37 and above, and should not be expected to perform successfully in lower versions.
Setup
editFor step-by-step instructions on how to set up an integration, see the Getting started guide.
In order to capture alerts from Falco you must configure Falco to output Alerts as JSON to one of the supported channels: Logfile or TCP Syslog.
Required: To configure Falco to output JSON, set the config properties json_output=true
and json_include_output_property=true
in Falco’s config. See the examples in Falco’s Output Channels documentation.
Logfile Input
editThe logfile input reads data from one or more Falco log files using the Elastic Agent. Use this input when the Elastic Agent will be deployed to the same machine as Falco or when Falco’s log files are available via a mounted filesystem.
To use this input Falco must be configured to output alerts to a log file. See Falco’s File Output documentation for details.
TCP Syslog Input
editThe TCP Syslog input allows the Elastic Agent to receive Falco Alerts via remote syslog. Use this input when you want to send data via Falco Sidekick.
To use this input you will need to deploy the Elastic Agent first and then configure and deploy Falco Sidekick to send Alerts to the Agent via Syslog. See Syslog Output and Connecting Falco to Sidekick for more details.
Logs Reference
editalerts
editFalco alerts can contain a multitude of various fields pertaining to the type of activity on the host machine.
Exported fields
Field | Description | Type | Unit |
---|---|---|---|
@timestamp |
Event timestamp with nanos. |
date |
|
cloud.image.id |
Image ID for the cloud instance. |
keyword |
|
data_stream.dataset |
Data stream dataset. |
constant_keyword |
|
data_stream.namespace |
Preserved Falco field |
constant_keyword |
|
data_stream.type |
Data stream type. |
constant_keyword |
|
event.dataset |
Data stream / event dataset. |
constant_keyword |
|
event.module |
The module the event belongs to. |
constant_keyword |
|
falco.container.mounts |
List of mount information. |
nested |
|
falco.container.mounts.dest |
keyword |
||
falco.container.mounts.mode |
keyword |
||
falco.container.mounts.propagation |
keyword |
||
falco.container.mounts.rdrw |
keyword |
||
falco.container.mounts.source |
keyword |
||
falco.hostname |
Required field for integration |
keyword |
|
falco.output |
text |
||
falco.output_fields.client.ip |
Falco copy of the ECS field of the same name |
ip |
|
falco.output_fields.container.cni_json |
Container’s CNI result field from the respective container status info. |
object |
|
falco.output_fields.container.duration |
Number of nanoseconds since container.start_ts. |
long |
nanos |
falco.output_fields.container.full_id |
Preserved Falco field |
text |
|
falco.output_fields.container.healthcheck |
The container’s health check. Will be N/A if no health check configured. |
text |
|
falco.output_fields.container.id |
The truncated container ID (first 12 characters) extracted from the Linux cgroups by Falco within the kernel |
keyword |
|
falco.output_fields.container.image.digest |
Preserved Falco field |
text |
|
falco.output_fields.container.image.full_id |
Full container image ID, enriched as part of the container engine enrichment. |
keyword |
|
falco.output_fields.container.image.id |
Container image ID. |
keyword |
|
falco.output_fields.container.image.name |
Falco copy of the ECS field of the same name |
text |
|
falco.output_fields.container.image.repository |
The container image repository. |
keyword |
|
falco.output_fields.container.image.tag |
Preserved Falco field |
text |
|
falco.output_fields.container.ip |
Preserved Falco field |
text |
|
falco.output_fields.container.liveness_probe |
The container’s liveness probe. Will be N/A if no liveness probe configured. |
text |
|
falco.output_fields.container.mounts |
The raw text value for container mounts information |
text |
|
falco.output_fields.container.name |
The container name |
keyword |
|
falco.output_fields.container.privileged |
Preserved Falco field |
boolean |
|
falco.output_fields.container.readiness_probe |
The container’s readiness probe. Will be N/A if no readiness probe configured. |
text |
|
falco.output_fields.container.start_ts |
Container start as epoch timestamp. |
date_nanos |
|
falco.output_fields.container.type |
Preserved Falco field |
text |
|
falco.output_fields.destination.ip |
Falco copy of the ECS field of the same name |
ip |
|
falco.output_fields.evt.abspath |
Calculated absolute path. |
text |
|
falco.output_fields.evt.abspath_dst |
Destination of the absolute path. |
text |
|
falco.output_fields.evt.abspath_src |
Source of the absolute path. |
text |
|
falco.output_fields.evt.arg.flags |
Preserved Falco field |
text |
|
falco.output_fields.evt.args |
Aggregated string of all event arguments. |
text |
|
falco.output_fields.evt.asynctype |
The type of event, if asyncronous. |
keyword |
|
falco.output_fields.evt.buffer |
Binary buffer for events which have one. |
binary |
|
falco.output_fields.evt.buflen |
Length of the binary buffer, if applicable. |
unsigned_long |
|
falco.output_fields.evt.category |
Preserved Falco field |
text |
|
falco.output_fields.evt.count.error |
Returns 1 for events that returned with an error |
integer |
|
falco.output_fields.evt.count.error_file |
Returns 1 for events that returned with an error and are related to file I/O |
integer |
|
falco.output_fields.evt.count.error_memory |
Returns 1 for events that returned with an error and are related to memory allocation. |
integer |
|
falco.output_fields.evt.count.error_net |
Returns 1 for events that returned with an error and are related to network I/O |
integer |
|
falco.output_fields.evt.count.error_other |
Returns 1 for events that returned with an error and are related to none of the previous categories. |
integer |
|
falco.output_fields.evt.count.exit |
Returns 1 for exit events. |
integer |
|
falco.output_fields.evt.cpu |
Number of the CPU where the event occurred. |
integer |
|
falco.output_fields.evt.deltatime |
Delta between current event and previous. |
long |
nanos |
falco.output_fields.evt.dir |
Either an enter event (>) or an exit event (<). |
keyword |
|
falco.output_fields.evt.failed |
Denotes if the event returned an error status. |
boolean |
|
falco.output_fields.evt.hostname |
Preserved Falco field |
text |
|
falco.output_fields.evt.info |
Contains either the event arguments, or the data decoded from them. |
text |
|
falco.output_fields.evt.io_dir |
Type based on whether the event reads from or writes to FDs. |
keyword |
|
falco.output_fields.evt.is_async |
Denotes whether the event is async or not. |
boolean |
|
falco.output_fields.evt.is_io |
Denotes events that read or write to FDs. |
boolean |
|
falco.output_fields.evt.is_io_read |
Denotes events that read from FDs. |
boolean |
|
falco.output_fields.evt.is_io_write |
Denotes events that write to FDs. |
boolean |
|
falco.output_fields.evt.is_open_create |
Denotes whether or not a file was created for open/openat/openat2/open_by_handle_at events. |
boolean |
|
falco.output_fields.evt.is_open_exec |
Denotes whether or not a file was created with execute permissions for open/openat/openat2/open_by_handle_at or create events. |
boolean |
|
falco.output_fields.evt.is_open_read |
Denotes whether or not the path was opened for reading for open/openat/openat2/open_by_handle_at events. |
boolean |
|
falco.output_fields.evt.is_open_write |
Denotes whether or not the path was opened for writing for open/openat/openat2/open_by_handle_at events. |
boolean |
|
falco.output_fields.evt.is_syslog |
Denotes events that are written to /dev/log |
boolean |
|
falco.output_fields.evt.is_wait |
Denotes events that force the thread to wait. |
boolean |
|
falco.output_fields.evt.latency |
Delta between an exit event and corresponding enter event. |
long |
nanos |
falco.output_fields.evt.num |
Preserved Falco field |
integer |
|
falco.output_fields.evt.plugininfo |
Summary of the event if it came from a plugin-defined event source. |
text |
|
falco.output_fields.evt.pluginname |
Name of the plugin that generated the event (if applicable). |
keyword |
|
falco.output_fields.evt.rawres |
Return value of the event, as a number. |
long |
|
falco.output_fields.evt.res |
Return value of the event. |
text |
|
falco.output_fields.evt.source |
Preserved Falco field |
text |
|
falco.output_fields.evt.time |
Preserved Falco field |
date |
|
falco.output_fields.evt.time.iso8601 |
Time event occurred |
date |
|
falco.output_fields.evt.type |
Preserved Falco field |
text |
|
falco.output_fields.evt.wait_latency |
Time spent waiting for events to return, in cases where the thread is forced to wait. |
long |
nanos |
falco.output_fields.fd.I4proto |
The IP protocol of a socket. Can be tcp, udp, icmp or raw. |
keyword |
|
falco.output_fields.fd.cip.name |
Preserved Falco field |
text |
|
falco.output_fields.fd.connected |
Denotes if the socket is connected for TCP/UDP FDs. |
boolean |
|
falco.output_fields.fd.containerdirectory |
Concatenation of the container ID and the directory name. |
keyword |
|
falco.output_fields.fd.containername |
Concatenation of the container ID and the FD name. |
keyword |
|
falco.output_fields.fd.cport |
Preserved Falco field |
long |
|
falco.output_fields.fd.cproto |
For TCP/UDP FDs, the client protocol. |
keyword |
|
falco.output_fields.fd.dev |
Device number containing the referenced file. |
integer |
|
falco.output_fields.fd.dev_major |
Major device number containing the referenced file. |
integer |
|
falco.output_fields.fd.dev_minor |
Minor device number containing the referenced file. |
integer |
|
falco.output_fields.fd.directory |
Preserved Falco field |
text |
|
falco.output_fields.fd.filename |
Preserved Falco field |
text |
|
falco.output_fields.fd.ino |
Preserved Falco field |
text |
|
falco.output_fields.fd.is_server |
Denotes if process owning the FD is the server endpoint in the connection. |
boolean |
|
falco.output_fields.fd.lip.name |
Preserved Falco field |
text |
|
falco.output_fields.fd.lport |
Preserved Falco field |
long |
|
falco.output_fields.fd.lproto |
For TCP/UDP FDs, the local protocol. |
keyword |
|
falco.output_fields.fd.name |
FD full name. If the fd is a file, this field contains the full path. If the FD is a socket, this field contain the connection tuple. |
text |
|
falco.output_fields.fd.name_changed |
Denotes if the name of an FD changes due to an event. |
boolean |
|
falco.output_fields.fd.num |
Unique number identifying the file descriptor. |
long |
|
falco.output_fields.fd.rip.name |
Preserved Falco field |
text |
|
falco.output_fields.fd.rport |
Preserved Falco field |
long |
|
falco.output_fields.fd.rproto |
For TCP/UDP FDs, the remote protocol. |
keyword |
|
falco.output_fields.fd.sip.name |
Preserved Falco field |
text |
|
falco.output_fields.fd.sockfamily |
The socket family for socket events. Can be ip or unix. |
keyword |
|
falco.output_fields.fd.sport |
Preserved Falco field |
long |
|
falco.output_fields.fd.sproto |
For TCP/UDP FDs, the server protocol. |
keyword |
|
falco.output_fields.fd.type |
Type of FD. Can be file, directory, ipv4, ipv6, unix, pipe, event, signalfd, eventpoll, inotify signalfd or memfd. |
keyword |
|
falco.output_fields.fd.typechar |
Type of FD as a single character. Can be f for file, 4 for IPv4 socket, 6 for IPv6 socket, u for unix socket, p for pipe, e for eventfd, s for signalfd, l for eventpoll, i for inotify, b for bpf, u for userfaultd, r for io_uring, m for memfd ,o for unknown. |
keyword |
|
falco.output_fields.fd.uid |
Unique identifier for the FD, created from the FD number and thread ID. |
keyword |
|
falco.output_fields.fdlist.cips |
For poll events, client IP addresses in the fds argument. |
ip |
|
falco.output_fields.fdlist.cports |
For poll events / TCP/UDP FDs, client TCP/UDP ports in the fds argument. |
ip |
|
falco.output_fields.fdlist.names |
For poll events, FD names in the fds argument. |
keyword |
|
falco.output_fields.fdlist.sips |
For poll events, server IP addresses in the fds argument. |
ip |
|
falco.output_fields.fdlist.sports |
For poll events, server TCP/UDP ports in the fds argument. |
ip |
|
falco.output_fields.fs.path.name |
For any event type that deals with a filesystem path, the path the file syscall is operating on. This path is always fully resolved, prepending the thread cwd when needed. |
keyword |
|
falco.output_fields.fs.path.source |
For any event type that deals with a filesystem path, and specifically for a source and target like mv, cp, etc, the source path the file syscall is operating on. This path is always fully resolved, prepending the thread cwd when needed. |
keyword |
|
falco.output_fields.fs.path.target |
For any event type that deals with a filesystem path, and specifically for a target and target like mv, cp, etc, the target path the file syscall is operating on. This path is always fully resolved, prepending the thread cwd when needed. |
keyword |
|
falco.output_fields.group.gid |
Preserved Falco field |
integer |
|
falco.output_fields.group.name |
Preserved Falco field |
text |
|
falco.output_fields.k8s.ns.name |
Preserved Falco field |
text |
|
falco.output_fields.k8s.pod.cni_json |
Kubernetes CNI result field from the respective pod status info. |
object |
|
falco.output_fields.k8s.pod.full_sandbox_id |
Full, non-truncated Kubernetes pod sandbox ID. |
keyword |
|
falco.output_fields.k8s.pod.ip |
Preserved Falco field |
text |
|
falco.output_fields.k8s.pod.labels |
Preserved Falco field |
text |
|
falco.output_fields.k8s.pod.name |
Preserved Falco field |
text |
|
falco.output_fields.k8s.pod.sandbox_id |
Truncated Kubernetes pod sandbox ID (first 12 characters). |
keyword |
|
falco.output_fields.k8s.pod.uid |
Preserved Falco field |
text |
|
falco.output_fields.output |
Preserved Falco field |
text |
|
falco.output_fields.priority |
Preserved Falco field |
keyword |
|
falco.output_fields.proc.args |
Preserved Falco field |
text |
|
falco.output_fields.proc.cmdlenargs |
Total length of command line args, excluding whitespace. |
long |
|
falco.output_fields.proc.cmdline |
Preserved Falco field |
text |
|
falco.output_fields.proc.cmdnargs |
Preserved Falco field |
integer |
|
falco.output_fields.proc.cwd |
Preserved Falco field |
text |
|
falco.output_fields.proc.duration |
Preserved Falco field |
text |
|
falco.output_fields.proc.env |
Preserved Falco field |
text |
|
falco.output_fields.proc.exe |
First command line argument, collected from args. |
text |
|
falco.output_fields.proc.exe_ino |
The inode number of the executable file on disk. |
long |
|
falco.output_fields.proc.exe_ino_ctime |
Last status change of executable file as epoch timestamp. |
date_nanos |
|
falco.output_fields.proc.exe_ino_ctime_duration_pidns_start |
Number of nanoseconds between PID namespace start ts and ctime exe file if PID namespace start predates ctime. |
long |
|
falco.output_fields.proc.exe_ino_ctime_duration_proc_start |
Number of nanoseconds between modifying status of executable image and spawning a new process using the changed executable image. |
long |
|
falco.output_fields.proc.exe_ino_mtime |
Last modification time of executable file as epoch timestamp. |
date_nanos |
|
falco.output_fields.proc.exeline |
Full command line, with exe as first argument. |
text |
|
falco.output_fields.proc.exepath |
Preserved Falco field |
text |
|
falco.output_fields.proc.fdopencount |
Number of open FDs for the process. |
unsigned_long |
|
falco.output_fields.proc.fdopenlimit |
Maximum number of FDs the process can open. |
long |
|
falco.output_fields.proc.fdusage |
Ratio between open FDs and maximum available FDs for the process. |
double |
|
falco.output_fields.proc.is_container_healthcheck |
Denotes if this process is running as a part of the container’s health check. |
boolean |
|
falco.output_fields.proc.is_container_liveness_probe |
Denotes if this process is running as a part of the container’s liveness probe. |
boolean |
|
falco.output_fields.proc.is_container_readiness_probe |
Denotes if this process is running as a part of the container’s readiness probe. |
boolean |
|
falco.output_fields.proc.is_exe_from_memfd |
Denotes if this process' executable file is in upper layer in overlayfs. |
boolean |
|
falco.output_fields.proc.is_exe_upper_layer |
Denotes if this process' executable file is in upper layer in overlayfs. |
boolean |
|
falco.output_fields.proc.is_exe_writable |
Denotes if this process' executable file is writable by the same user that spawned the process. |
boolean |
|
falco.output_fields.proc.is_sid_leader |
Preserved Falco field |
boolean |
|
falco.output_fields.proc.is_vpgid_leader |
Preserved Falco field |
boolean |
|
falco.output_fields.proc.loginshellid |
PID of the oldest shell among the ancestors of the current process, if applicable. |
long |
|
falco.output_fields.proc.name |
Preserved Falco field |
text |
|
falco.output_fields.proc.nchilds |
Number of alive (not leader) threads in the process generating the event currently has, excluding the leader thread. |
unsigned_long |
|
falco.output_fields.proc.nthreads |
Number of alive threads in the process generating the event currently has, including the leader thread. |
unsigned_long |
|
falco.output_fields.proc.pcmdline |
Preserved Falco field |
text |
|
falco.output_fields.proc.pexe |
First command line argument of the parent process. |
text |
|
falco.output_fields.proc.pexepath |
Preserved Falco field |
text |
|
falco.output_fields.proc.pid.ts |
Preserved Falco field |
text |
|
falco.output_fields.proc.pidns_init_start_ts |
Start of PID namespace as epoch timestamp. |
date_nanos |
|
falco.output_fields.proc.pname |
Preserved Falco field |
text |
|
falco.output_fields.proc.ppid |
Preserved Falco field |
integer |
|
falco.output_fields.proc.ppid.duration |
Preserved Falco field |
long |
|
falco.output_fields.proc.ppid.ts |
Preserved Falco field |
text |
|
falco.output_fields.proc.pvpid |
Preserved Falco field |
integer |
|
falco.output_fields.proc.sid |
Preserved Falco field |
integer |
|
falco.output_fields.proc.sid.exe |
First command line argument of the current process’s session leader. |
text |
|
falco.output_fields.proc.sid.exepath |
Preserved Falco field |
text |
|
falco.output_fields.proc.sname |
Preserved Falco field |
text |
|
falco.output_fields.proc.thread.cap_inheritable |
Set of inheritable capabilities set. |
keyword |
|
falco.output_fields.proc.tty |
Controlling terminal of the process. |
long |
|
falco.output_fields.proc.vmrss |
Resident non-swapped memory for the process. |
unsigned_long |
byte |
falco.output_fields.proc.vmsize |
Total virtual memory for the process. |
unsigned_long |
byte |
falco.output_fields.proc.vmswap |
Swapped memory for the process. |
unsigned_long |
|
falco.output_fields.proc.vpgid |
Preserved Falco field |
integer |
|
falco.output_fields.proc.vpgid.exe |
First command line argument of the current process’s group leader. |
text |
|
falco.output_fields.proc.vpgid.exepath |
Preserved Falco field |
text |
|
falco.output_fields.proc.vpgid.name |
Preserved Falco field |
text |
|
falco.output_fields.proc.vpid |
Preserved Falco field |
integer |
|
falco.output_fields.process.group_leader.vpid |
Preserved Falco field |
long |
|
falco.output_fields.process.parent.pid |
Preserved Falco field |
long |
|
falco.output_fields.process.pid |
Preserved Falco field |
long |
|
falco.output_fields.process.session_leader.pid |
Preserved Falco field |
long |
|
falco.output_fields.proct.ppid.duration |
Preserved Falco field |
text |
|
falco.output_fields.rule |
Preserved Falco field |
text |
|
falco.output_fields.server.ip |
Falco copy of the ECS field of the same name |
ip |
|
falco.output_fields.source.ip |
Falco copy of the ECS field of the same name |
ip |
|
falco.output_fields.syslog.facility |
Preserved Falco field |
text |
|
falco.output_fields.syslog.facility.str |
Preserved Falco field |
text |
|
falco.output_fields.syslog.severity |
Preserved Falco field |
text |
|
falco.output_fields.syslog.severity.str |
Preserved Falco field |
text |
|
falco.output_fields.thread.cap_effective |
Preserved Falco field |
text |
|
falco.output_fields.thread.cap_permitted |
Preserved Falco field |
text |
|
falco.output_fields.thread.cgroups |
Aggregated string of cgroups the thread belongs to. |
flattened |
|
falco.output_fields.thread.cpu |
CPU consumed by the thread in the last second. |
double |
|
falco.output_fields.thread.cpu_system |
The system CPU consumed by the thread in the last second. |
double |
|
falco.output_fields.thread.cpu_user |
The user CPU consumed by the thread in the last second. |
double |
|
falco.output_fields.thread.exectime |
CPU time spent by last scheduled thread. |
long |
nanos |
falco.output_fields.thread.ismain |
Denotes if the threat generating the event is the main one in the process. |
boolean |
|
falco.output_fields.thread.pfmajor |
Number of major page faults since thread start. |
unsigned_long |
|
falco.output_fields.thread.pfminor |
Number of minor page faults since thread start. |
unsigned_long |
|
falco.output_fields.thread.tid |
Preserved Falco field |
integer |
|
falco.output_fields.thread.totalexectime |
Total CPU time for the current thread since the beginning of the capture. |
long |
nanos |
falco.output_fields.thread.vmrss |
Resident non-swapped memory for the process' main thread. Non-main threads will appear as zero. |
unsigned_long |
|
falco.output_fields.thread.vmsize |
Total virtual memory for the process' main thread. Non-main threads will appear as zero. |
unsigned_long |
|
falco.output_fields.thread.vtid |
The ID of the thread generating the event as seen from its current PID namespace. |
long |
|
falco.output_fields.user.homedir |
Home directory of the user. |
text |
|
falco.output_fields.user.loginname |
Audit user name. |
keyword |
|
falco.output_fields.user.loginuid |
Audit user ID. If an invalid UID is encountered, returns -1. |
long |
|
falco.output_fields.user.name |
Preserved Falco field |
text |
|
falco.output_fields.user.shell |
User’s shell. |
keyword |
|
falco.output_fields.user.uid |
Preserved Falco field |
integer |
|
falco.priority |
Falco alert priority |
keyword |
|
falco.rule |
Name of the Falco rule that triggered the alert |
keyword |
|
falco.source |
Preserved Falco field |
keyword |
|
falco.tags |
Preserved Falco field |
keyword |
|
falco.time |
Preserved Falco field |
date |
|
falco.uuid |
Preserved Falco field |
keyword |
|
host.containerized |
If the host is a container. |
boolean |
|
host.os.build |
OS build information. |
keyword |
|
host.os.codename |
OS codename, if any. |
keyword |
|
input.type |
Input type |
keyword |
|
log.offset |
Log offset |
long |
|
log.source.address |
Log source when collecting via TCP input |
keyword |
|
process.group.id |
Preserved Falco field |
text |
|
process.group.name |
Preserved Falco field |
text |
Example
An example event for alerts
looks as following:
{ "@timestamp": "2024-08-07T13:49:16.479Z", "agent": { "ephemeral_id": "e24920c4-6d15-4f8f-b432-f643a642b923", "id": "3cce77a3-202d-48b6-955c-bde66f5021b2", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.14.1" }, "container": { "id": "2ae6a7f15b6e", "name": "elastic-package-service-10413-falco-event-generator-1" }, "data_stream": { "dataset": "falco.alerts", "namespace": "94205", "type": "logs" }, "ecs": { "version": "8.0.0" }, "elastic_agent": { "id": "3cce77a3-202d-48b6-955c-bde66f5021b2", "snapshot": false, "version": "8.14.1" }, "event": { "agent_id_status": "verified", "dataset": "falco.alerts", "ingested": "2024-08-14T12:08:25Z", "kind": "alert", "original": "<5>2024-08-07T13:49:16Z a72f9a747cf8 Falco[1]: {\"uuid\":\"23716645-4d9d-4254-9429-2a287a9af199\",\"output\":\"2024-08-07T13:49:16.479964318+0000: Notice Shell spawned by untrusted binary (parent_exe=/tmp/falco-event-generator3282684109/httpd parent_exepath=/bin/event-generator pcmdline=httpd --loglevel info run ^helper.RunShell$ gparent=event-generator ggparent=containerd-shim aname[4]=containerd-shim aname[5]=init aname[6]=\\u003cNA\\u003e aname[7]=\\u003cNA\\u003e evt_type=execve user=root user_uid=0 user_loginuid=-1 process=bash proc_exepath=/bin/bash parent=httpd command=bash -c ls \\u003e /dev/null terminal=0 exe_flags=EXE_WRITABLE container_id=2ae6a7f15b6e container_name=elastic-package-service-10413-falco-event-generator-1)\",\"priority\":\"Notice\",\"rule\":\"Run shell untrusted\",\"time\":\"2024-08-07T13:49:16.479964318Z\",\"output_fields\":{\"container.id\":\"2ae6a7f15b6e\",\"container.name\":\"elastic-package-service-10413-falco-event-generator-1\",\"evt.arg.flags\":\"EXE_WRITABLE\",\"evt.time.iso8601\":1723038556479964318,\"evt.type\":\"execve\",\"proc.aname[2]\":\"event-generator\",\"proc.aname[3]\":\"containerd-shim\",\"proc.aname[4]\":\"containerd-shim\",\"proc.aname[5]\":\"init\",\"proc.aname[6]\":null,\"proc.aname[7]\":null,\"proc.cmdline\":\"bash -c ls \\u003e /dev/null\",\"proc.exepath\":\"/bin/bash\",\"proc.name\":\"bash\",\"proc.pcmdline\":\"httpd --loglevel info run ^helper.RunShell$\",\"proc.pexe\":\"/tmp/falco-event-generator3282684109/httpd\",\"proc.pexepath\":\"/bin/event-generator\",\"proc.pname\":\"httpd\",\"proc.tty\":0,\"user.loginuid\":-1,\"user.name\":\"root\",\"user.uid\":0},\"source\":\"syscall\",\"tags\":[\"T1059.004\",\"container\",\"host\",\"maturity_stable\",\"mitre_execution\",\"process\",\"shell\"],\"hostname\":\"e822ea6618ae\"}", "provider": "syscall", "timezone": "+00:00" }, "event.category": [ "process" ], "event.severity": 2, "event.type": [ "start" ], "falco": { "hostname": "e822ea6618ae", "output": "2024-08-07T13:49:16.479964318+0000: Notice Shell spawned by untrusted binary (parent_exe=/tmp/falco-event-generator3282684109/httpd parent_exepath=/bin/event-generator pcmdline=httpd --loglevel info run ^helper.RunShell$ gparent=event-generator ggparent=containerd-shim aname[4]=containerd-shim aname[5]=init aname[6]=<NA> aname[7]=<NA> evt_type=execve user=root user_uid=0 user_loginuid=-1 process=bash proc_exepath=/bin/bash parent=httpd command=bash -c ls > /dev/null terminal=0 exe_flags=EXE_WRITABLE container_id=2ae6a7f15b6e container_name=elastic-package-service-10413-falco-event-generator-1)", "output_fields": { "container": { "id": "2ae6a7f15b6e", "name": "elastic-package-service-10413-falco-event-generator-1" }, "evt": { "arg": {}, "time": { "iso8601": 1723038556479 }, "type": "execve" }, "proc": { "cmdline": "bash -c ls > /dev/null", "exepath": "/bin/bash", "name": "bash", "pcmdline": "httpd --loglevel info run ^helper.RunShell$", "pexe": "/tmp/falco-event-generator3282684109/httpd", "pexepath": "/bin/event-generator", "pname": "httpd", "tty": 0 }, "user": { "loginuid": -1, "name": "root", "uid": "0" } }, "priority": "Notice", "rule": "Run shell untrusted", "source": "syscall", "tags": [ "T1059.004", "container", "host", "maturity_stable", "mitre_execution", "process", "shell" ], "time": "2024-08-07T13:49:16.479964318Z", "uuid": "23716645-4d9d-4254-9429-2a287a9af199" }, "falco.container.mounts": null, "host": { "architecture": "aarch64", "containerized": false, "hostname": "docker-fleet-agent", "id": "bec788532d91483489ff64145e57effe", "ip": [ "192.168.160.9" ], "mac": [ "02-42-C0-A8-A0-09" ], "name": "docker-fleet-agent", "os": { "codename": "focal", "family": "debian", "kernel": "6.6.12-linuxkit", "name": "Ubuntu", "platform": "ubuntu", "type": "linux", "version": "20.04.6 LTS (Focal Fossa)" } }, "input": { "type": "tcp" }, "log": { "source": { "address": "192.168.160.5:34984" }, "syslog": { "appname": "Falco", "facility": { "code": 0, "name": "kernel" }, "hostname": "a72f9a747cf8", "priority": 5, "procid": "1", "severity": { "code": 5, "name": "Notice" } } }, "observer": { "hostname": "e822ea6618ae", "product": "falco", "type": "sensor", "vendor": "sysdig" }, "process": { "command_line": "bash -c ls > /dev/null", "executable": "/bin/bash", "name": "bash", "parent": { "command_line": "httpd --loglevel info run ^helper.RunShell$", "executable": "/bin/event-generator", "name": "httpd" }, "user": { "id": "0", "name": "root" } }, "related": { "hosts": [ "e822ea6618ae" ] }, "rule": { "name": "Run shell untrusted" }, "tags": [ "preserve_original_event", "preserve_falco_fields" ], "threat.technique.id": [ "T1059" ], "threat.technique.subtechnique.id": [ "T1059.004" ] }
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
1.3.0 |
Enhancement (View pull request) |
8.13.3 or higher |
1.2.1 |
Bug fix (View pull request) |
8.13.3 or higher |
1.2.0 |
Enhancement (View pull request) |
8.13.3 or higher |
1.1.1 |
Bug fix (View pull request) Bug fix (View pull request) |
8.13.3 or higher |
1.1.0 |
Enhancement (View pull request) |
8.13.3 or higher |
1.0.2 |
Bug fix (View pull request) |
8.13.3 or higher |
1.0.1 |
Bug fix (View pull request) |
8.13.3 or higher |
1.0.0 |
Enhancement (View pull request) |
8.13.3 or higher |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.1 |
Bug fix (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |