Name:tracee-policiesNamespace:tracee-systemData====signatures.yaml:----apiVersion:tracee.aquasec.com/v1beta1kind:Policymetadata:name:signature-eventsannotations:description:traces all signature eventsspec:scope:-globalrules:-event:stdio_over_socket-event:k8s_api_connection-event:aslr_inspection-event:proc_mem_code_injection-event:docker_abuse-event:scheduled_task_mod-event:ld_preload-event:cgroup_notify_on_release-event:default_loader_mod-event:sudoers_modification-event:sched_debug_recon-event:system_request_key_mod-event:cgroup_release_agent-event:rcd_modification-event:core_pattern_modification-event:proc_kcore_read-event:proc_mem_access-event:hidden_file_created-event:anti_debugging-event:ptrace_code_injection-event:process_vm_write_inject-event:disk_mount-event:dynamic_code_loading-event:fileless_execution-event:illegitimate_shell-event:kernel_module_loading-event:k8s_cert_theft-event:proc_fops_hooking-event:syscall_hooking-event:dropped_executable
But let's supposed we also need tracee to trace all execve events, for it we need to change the configmap tracee-policies adding a new policy.
Let's edit the tracee-policies ConfigMap using kubectl:
kubectl edit cm/tracee-policies -n tracee-system
The ConfigMap will open in your default text editor. Locate the data section.
To add a new policy for tracking execve events, add the following YAML block before the signatures.yaml section, maintaining proper indentation:
Once the daemonset is up and running, the modified policies will be applied.
Congratulations! You have successfully installed Tracee via Helm, modified the default policies to add an execve event policy.
Note: Modifying the policies may have security implications, so it is important to carefully consider the events you enable based on your specific requirements and security considerations.
Feel free to reach out if you have any further questions or need additional assistance!