Skip to content

Tracing Event Filtering

sudo ./dist/tracee --scope help
sudo ./dist/tracee --events help
sudo ./dist/tracee --scope xxx --events xxx

Tracee output might become too hard to consume when tracing all the events from a system. Luckily, Tracee has a powerful mechanism to accurately filter just the information that is relevant to the user using the --scope and --events flags.

With those command line flags you define expressions that tell tracee what you are interested in based on event metadata filtering capabilities. Only events that match given criteria will be traced.

Tip

You can filter events by most of the visible fields from Tracee events.

Initial Example

All the examples bellow this item can be executed with the following tracee prefix command:

sudo ./dist/tracee \
    --output json \
    --scope comm=bash \
    --scope follow
    --output option:parse-arguments \
    <rest of filters>

This will allow you to test the filtering rules by executing a new process in any running shell and might serve as a good indicative if your filter works as expected.

Filters and Operators

  1. Event and Scope (Operators: event "-" and scope "follow". Prefix/Suffix: *)

    1) --events openat
    2) --events execve,open
    3) --events 'open*'
    4) --events '-open*,-dup*'
    5) --events 'fs,-dup*'
    6) --scope follow
    

    Note

    The event "-" remove operator will work like it means.

    Note

    The event 'fs,-dup' will select all file-system events but dup events.

    Note

    The "follow" operator will make tracee follow all newly created child processes of the parents being filtered.

  2. Event Arguments (Operators: =, !=. Prefix/Suffix: *)

    1) --events openat --events openat.args.pathname=/etc/shadow
    2) --events openat --events openat.args.pathname='/tmp*'
    3) --events openat --events openat.args.pathname!=/tmp/1,/bin/ls
    

    Note

    Multiple values are ORed if used with = operator
    But ANDed if used with any other operator.

    Tip

    As a syntax sugar, the event options filter can be set without the --events openat, since by --events openat.args.pathname=/etc/shadow tracee infers that openat must be filtered.

  3. Event Return Code (Operators: =, !=, <, >)

    1) --events openat.args.pathname=/etc/shadow --events 'openat.retval>0'
    2) --events openat.args.pathname=/etc/shadow --events 'openat.retval<0'
    

    Tip

    Try cat /etc/shadow as a regular use and filter for retval<0.

  4. Event Context (Operators: vary by field)

    1) --events openat.context.container --events openat.args.pathname=/etc/shadow
    

    Note

    The following is a list of available context fields:
    1) "timestamp"
    2) "processorId"
    3) "p", "pid", "processId"
    4) "tid", "threadId"
    5) "ppid", "parentProcessId"
    6) "hostTid", "hostThreadId"
    7) "hostPid", "hostParentProcessId"
    8) "uid", "userId"
    9) "mntns", "mountNamespace"
    10) "pidns", "pidNamespace"
    11) "processName", "comm"
    12) "hostName"
    13) "cgroupId"
    14) "host" (inversion of "container")
    15) "container"
    16) "containerId"
    17) "containerImage"
    18) "containerName"
    19) "podName"
    20) "podNamespace"
    21) "podUid"
    22) "syscall"

    Tip

    Open a container and try cat /etc/shadow.

  5. Event Sets

    1) --events fs
    2) --events lsm_hooks,network_events
    

    Note

    Selects a set of events to tracee according to pre-defined sets which can be listed by using list command line argument.

  6. Container (Operators: =, != and "new". Boolean)

    1) --scope container # all container events
    2) --scope not-container # events from the host only
    3) --scope container=new # containers created after tracee-ebf execution
    4) --scope container=3f93da58be3c --events openat
    5) --scope container=new --events openat.args.pathname=/etc/shadow
    

    Note

    The new flag allows to filter newly created containers only.

  7. Command (Operators: =, !=)

    1) --scope comm=cat,vim,ping
    2) --scope comm!=ping
    

    Note

    Do not use given command prefix for these examples as they're filtering by command name as well.

  8. Executable Path (Operators: =, !=)

    1) --scope executable=/usr/bin/ls
    2) --scope executable=host:/usr/bin/ls
    3) --scope executable=4026532448:/usr/bin/ls
    

    Note

    1. Mount namespace id or the special "host:" prefix can be used for finer filtering
    2. Given path must be absolute; i.e starts with "/"
    3. Symbolic link paths are not supported
  9. PID (Operators: =, !=, <, > and "new")

    1) --scope pid=new # newly created events (after tracee execution)
    2) --scope pid=510,1709 # # pids 510 and 1709
    3) --scope 'pid>0' --scope pid 'pid<1000'
    4) --scope pid=2578238 --scope follow --events openat.args.pathname=/etc/shadow
    

    Note

    This filter can be used to filter a specific process or thread: 1. Providing a tgid (aka pid) will filter all threads of the process. 2. Providing a tid (where tid != tgid) will only filter the specific thread.

  10. Process Tree

    1) --scope tree=476165 # events descending from process 476165
    2) --scope tree!=5023 # events that do not descend from process 5023
    
  11. UID (Operators: =, !=, <, >)

    1) --scope uid=0
    2) --scope 'uid>0'
    3) --scope 'uid>0' --scope uid!=1000 # do not filter root and uid=1000
    
  12. UTS Namespace (hostnames) (Operators: =, !=)

    1) --scope uts!=ab356bc4dd554 
    
  13. PID Namespace (Operators: =, !=)

    1) --scope pidns!=4026531836
    
  14. MOUNT Namespace (Operators: =, !=)

    1) --scope mntns=4026531840