Skip to content

Commit 3d4026e

Browse files
authored
Merge pull request #19944 from gaoguangze111/add-falco-zh-translation
Add falco chinese translation
2 parents 2c7817f + d767954 commit 3d4026e

File tree

1 file changed

+239
-0
lines changed
  • content/zh/docs/tasks/debug-application-cluster

1 file changed

+239
-0
lines changed
Lines changed: 239 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,239 @@
1+
---
2+
reviewers:
3+
- soltysh
4+
- sttts
5+
- ericchiang
6+
content_template: templates/concept
7+
title: 使用 Falco 审计
8+
---
9+
<!--
10+
---
11+
reviewers:
12+
- soltysh
13+
- sttts
14+
- ericchiang
15+
content_template: templates/concept
16+
title: Auditing with Falco
17+
---
18+
-->
19+
{{% capture overview %}}
20+
<!--
21+
### Use Falco to collect audit events
22+
-->
23+
### 使用 Falco 采集审计事件
24+
25+
<!--
26+
[Falco](https://falco.org/) is an open source project for intrusion and abnormality detection for Cloud Native platforms.
27+
This section describes how to set up Falco, how to send audit events to the Kubernetes Audit endpoint exposed by Falco, and how Falco applies a set of rules to automatically detect suspicious behavior.
28+
-->
29+
[Falco](https://falco.org/)是一个开源项目,用于为云原生平台提供入侵和异常检测。本节介绍如何设置 Falco、如何将审计事件发送到 Falco 公开的 Kubernetes Audit 端点、以及 Falco 如何应用一组规则来自动检测可疑行为。
30+
31+
{{% /capture %}}
32+
33+
{{% capture body %}}
34+
35+
<!--
36+
#### Install Falco
37+
-->
38+
#### 安装 Falco
39+
40+
<!--
41+
Install Falco by using one of the following methods:
42+
-->
43+
使用以下方法安装 Falco :
44+
45+
<!--
46+
- [Standalone Falco][falco_installation]
47+
- [Kubernetes DaemonSet][falco_installation]
48+
- [Falco Helm Chart][falco_helm_chart]
49+
-->
50+
- [独立安装 Falco][falco_installation]
51+
- [Kubernetes DaemonSet][falco_installation]
52+
- [Falco Helm Chart][falco_helm_chart]
53+
54+
<!--
55+
Once Falco is installed make sure it is configured to expose the Audit webhook. To do so, use the following configuration:
56+
-->
57+
安装完成 Falco 后,请确保将其配置为公开 Audit Webhook。为此,请使用以下配置:
58+
59+
```yaml
60+
webserver:
61+
enabled: true
62+
listen_port: 8765
63+
k8s_audit_endpoint: /k8s_audit
64+
ssl_enabled: false
65+
ssl_certificate: /etc/falco/falco.pem
66+
```
67+
68+
<!--
69+
This configuration is typically found in the `/etc/falco/falco.yaml` file. If Falco is installed as a Kubernetes DaemonSet, edit the `falco-config` ConfigMap and add this configuration.
70+
-->
71+
此配置通常位于 `/etc/falco/falco.yaml` 文件中。如果 Falco 作为 Kubernetes DaemonSet 安装,请编辑 `falco-config` ConfigMap 并添加此配置。
72+
<!--
73+
#### Configure Kubernetes Audit
74+
-->
75+
#### 配置 Kubernetes 审计
76+
77+
<!--
78+
1. Create a [kubeconfig file](/docs/concepts/configuration/organize-cluster-access-kubeconfig/) for the [kube-apiserver][kube-apiserver] webhook audit backend.
79+
80+
cat <<EOF > /etc/kubernetes/audit-webhook-kubeconfig
81+
apiVersion: v1
82+
kind: Config
83+
clusters:
84+
- cluster:
85+
server: http://<ip_of_falco>:8765/k8s_audit
86+
name: falco
87+
contexts:
88+
- context:
89+
cluster: falco
90+
user: ""
91+
name: default-context
92+
current-context: default-context
93+
preferences: {}
94+
users: []
95+
EOF
96+
-->
97+
1. 为 [kube-apiserver][kube-apiserver] webhook 审计后端创建一个[kubeconfig](/docs/concepts/configuration/organize-cluster-access-kubeconfig/)文件。
98+
99+
cat <<EOF > /etc/kubernetes/audit-webhook-kubeconfig
100+
apiVersion: v1
101+
kind: Config
102+
clusters:
103+
- cluster:
104+
server: http://<ip_of_falco>:8765/k8s_audit
105+
name: falco
106+
contexts:
107+
- context:
108+
cluster: falco
109+
user: ""
110+
name: default-context
111+
current-context: default-context
112+
preferences: {}
113+
users: []
114+
EOF
115+
<!--
116+
1. Start [kube-apiserver][kube-apiserver] with the following options:
117+
118+
```shell
119+
--audit-policy-file=/etc/kubernetes/audit-policy.yaml --audit-webhook-config-file=/etc/kubernetes/audit-webhook-kubeconfig
120+
```
121+
-->
122+
2. 使用以下选项启动 [kube-apiserver][kube-apiserver]:
123+
124+
```shell
125+
--audit-policy-file=/etc/kubernetes/audit-policy.yaml --audit-webhook-config-file=/etc/kubernetes/audit-webhook-kubeconfig
126+
```
127+
<!--
128+
#### Audit Rules
129+
-->
130+
#### 审计规则
131+
132+
<!--
133+
Rules devoted to Kubernetes Audit Events can be found in [k8s_audit_rules.yaml][falco_k8s_audit_rules]. If Audit Rules is installed as a native package or using the official Docker images, Falco copies the rules file to `/etc/falco/`, so they are available for use.
134+
135+
There are three classes of rules.
136+
137+
The first class of rules looks for suspicious or exceptional activities, such as:
138+
-->
139+
140+
专门用于 Kubernetes 审计事件的规则可以在 [k8s_audit_rules.yaml][falco_k8s_audit_rules] 中找到。如果审计规则是作为本机软件包安装或使用官方 Docker 镜像安装的,则 Falco 会将规则文件复制到 `/etc/falco/` 中以便使用。
141+
142+
共有三类规则。
143+
144+
第一类规则用于查找可疑或异常活动,例如:
145+
146+
<!--
147+
- Any activity by an unauthorized or anonymous user.
148+
- Creating a pod with an unknown or disallowed image.
149+
- Creating a privileged pod, a pod mounting a sensitive filesystem from the host, or a pod using host networking.
150+
- Creating a NodePort service.
151+
- Creating a ConfigMap containing private credentials, such as passwords and cloud provider secrets.
152+
- Attaching to or executing a command on a running pod.
153+
- Creating a namespace external to a set of allowed namespaces.
154+
- Creating a pod or service account in the kube-system or kube-public namespaces.
155+
- Trying to modify or delete a system ClusterRole.
156+
- Creating a ClusterRoleBinding to the cluster-admin role.
157+
- Creating a ClusterRole with wildcarded verbs or resources. For example, overly permissive.
158+
- Creating a ClusterRole with write permissions or a ClusterRole that can execute commands on pods.
159+
-->
160+
-未经授权或匿名用户的任何活动。
161+
-创建使用未知或不允许的镜像的 pod。
162+
-创建特权 Pod,从主机安装敏感文件系统的 Pod 或使用主机网络的 Pod。
163+
-创建 NodePort 服务。
164+
-创建包含私有证书(例如密码和云提供商 secrets )的 ConfigMap。
165+
-在正在运行的 Pod 上附加或执行命令。
166+
-在一组允许的名称空间之外创建一个名称空间。
167+
-在 kube-system 或 kube-public 命名空间中创建 pod 或服务帐户。
168+
-尝试修改或删除系统 ClusterRole。
169+
-创建一个 ClusterRoleBinding 到 cluster-admin 角色。
170+
-创建 ClusterRole 时在动词或资源中使用通配符。 例如,过度赋权。
171+
-创建具有写权限的 ClusterRole 或可以在 Pod 上执行命令的 ClusterRole。
172+
173+
<!--
174+
A second class of rules tracks resources being created or destroyed, including:
175+
176+
- Deployments
177+
- Services
178+
- ConfigMaps
179+
- Namespaces
180+
- Service accounts
181+
- Role/ClusterRoles
182+
- Role/ClusterRoleBindings
183+
-->
184+
第二类规则跟踪正在创建或销毁的资源,包括:
185+
186+
- Deployments
187+
- Services
188+
- ConfigMaps
189+
- Namespaces
190+
- Service accounts
191+
- Role/ClusterRoles
192+
- Role/ClusterRoleBindings
193+
194+
<!--
195+
The final class of rules simply displays any Audit Event received by Falco. This rule is disabled by default, as it can be quite noisy.
196+
197+
For further details, see [Kubernetes Audit Events][falco_ka_docs] in the Falco documentation.
198+
-->
199+
200+
最后一类规则仅负责显示 Falco 收到的所有审核事件。默认情况下,此规则是禁用的,因为它可能会很吵。
201+
202+
有关更多详细信息,请参阅 Falco 文档中的[Kubernetes审计事件][falco_ka_docs]。
203+
204+
<!--
205+
[kube-apiserver]: /docs/admin/kube-apiserver
206+
[auditing-proposal]: https://github.com/kubernetes/community/blob/master/contributors/design-proposals/api-machinery/auditing.md
207+
[auditing-api]: https://github.com/kubernetes/kubernetes/blob/{{< param "githubbranch" >}}/staging/src/k8s.io/apiserver/pkg/apis/audit/v1/types.go
208+
[gce-audit-profile]: https://github.com/kubernetes/kubernetes/blob/{{< param "githubbranch" >}}/cluster/gce/gci/configure-helper.sh#L735
209+
[kubeconfig]: /docs/tasks/access-application-cluster/configure-access-multiple-clusters/
210+
[fluentd]: http://www.fluentd.org/
211+
[fluentd_install_doc]: https://docs.fluentd.org/v1.0/articles/quickstart#step-1:-installing-fluentd
212+
[fluentd_plugin_management_doc]: https://docs.fluentd.org/v1.0/articles/plugin-management
213+
[logstash]: https://www.elastic.co/products/logstash
214+
[logstash_install_doc]: https://www.elastic.co/guide/en/logstash/current/installing-logstash.html
215+
[kube-aggregator]: /docs/concepts/api-extension/apiserver-aggregation
216+
[falco_website]: https://www.falco.org
217+
[falco_k8s_audit_rules]: https://github.com/falcosecurity/falco/blob/master/rules/k8s_audit_rules.yaml
218+
[falco_ka_docs]: https://falco.org/docs/event-sources/kubernetes-audit
219+
[falco_installation]: https://falco.org/docs/installation
220+
[falco_helm_chart]: https://github.com/helm/charts/tree/master/stable/falco
221+
-->
222+
[kube-apiserver]: /docs/admin/kube-apiserver
223+
[auditing-proposal]: https://github.com/kubernetes/community/blob/master/contributors/design-proposals/api-machinery/auditing.md
224+
[auditing-api]: https://github.com/kubernetes/kubernetes/blob/{{< param "githubbranch" >}}/staging/src/k8s.io/apiserver/pkg/apis/audit/v1/types.go
225+
[gce-audit-profile]: https://github.com/kubernetes/kubernetes/blob/{{< param "githubbranch" >}}/cluster/gce/gci/configure-helper.sh#L735
226+
[kubeconfig]: /docs/tasks/access-application-cluster/configure-access-multiple-clusters/
227+
[fluentd]: http://www.fluentd.org/
228+
[fluentd_install_doc]: https://docs.fluentd.org/v1.0/articles/quickstart#step-1:-installing-fluentd
229+
[fluentd_plugin_management_doc]: https://docs.fluentd.org/v1.0/articles/plugin-management
230+
[logstash]: https://www.elastic.co/products/logstash
231+
[logstash_install_doc]: https://www.elastic.co/guide/en/logstash/current/installing-logstash.html
232+
[kube-aggregator]: /docs/concepts/api-extension/apiserver-aggregation
233+
[falco_website]: https://www.falco.org
234+
[falco_k8s_audit_rules]: https://github.com/falcosecurity/falco/blob/master/rules/k8s_audit_rules.yaml
235+
[falco_ka_docs]: https://falco.org/docs/event-sources/kubernetes-audit
236+
[falco_installation]: https://falco.org/docs/installation
237+
[falco_helm_chart]: https://github.com/helm/charts/tree/master/stable/falco
238+
239+
{{% /capture %}}

0 commit comments

Comments
 (0)