-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Queries without watchdog restrictions #195
Comments
Discussed this moment with @zwass in Slack. |
Setting |
Issue #202 is now resolved, so the denylist parameter can be set via fleetctl and the Fleet API starting with Fleet 3.7.0 (coming next week). We've discussed internally and decided that we will not actually expose this configuration via the UI. We believe that it's confusing, as setting the |
Hi, I'm a little confused on this as I was just reading the updated docs (via osquery/osquery#6922) - https://github.com/zwass/osquery/blob/denylist-doc/docs/wiki/deployment/configuration.md. There was a note added: If this note above is correct, then what exactly does adding the |
The denylist parameter in osquery prevents the query from being added to the denylist. I'm skeptical of the value of it overall because it does us little benefit if the query is going to be killed by the watchdog anyway. I suppose there may be some small set of queries that complete without the watchdog killing the worker sometimes and that could motivate turning the denylist off for that query. |
Ah, I get it now.
Yes, I don't understand the value of that at all. I wasn't even aware that it was possible for a query to be denylisted without getting killed by the watchdog. |
@dachin11 you still don't have it quite right. A query cannot be denylisted without getting killed by the watchdog. You can't control the watchdog on a per-query basis. What you can control is whether the query is added to the denylist after it is killed by the watchdog. Typically you want a query to be denylisted if it's killed by the watchdog because it will most likely be killed each time it executes. If it's not denylisted then you just use more resources attempting to run the query. This would only have value if you believe that the query might sometimes complete without triggering the watchdog. |
Thank you for the clarification. |
1) What version of Fleet are you using (fleet version --full)?
fleet - version 3.5.1
branch: master
revision: 55a2aa2
build date: 2020-12-15T02:50:05Z
build user: zwass
go version: go1.15
What operating system are you using?
NAME="CentOS Linux"
VERSION="8"
What did you do?
Opened Fleet GUI, Queries page. Created and pushed scheduled query. But after some period of time I've seen what this query is in denylist in some amount of hosts, although interactive query works fine.
What did you expect to happen?
I expected to have stable results from osquery from every enrolled in Fleet hosts because of we have alerts in SIEM based on these data.
What happened instead?
Blacklisted query for 24 hours
Enhancement details
At the moment, we are trying to optimize our query to reduce its load on CPU, and we are also trying to increase the parameters of the watchdog.
Nevertheless, it would be great to have an opportunity to launch some queries with an analogue of
denylist: false
option from the description https://osquery.readthedocs.io/en/stable/deployment/configuration/#schedule from Fleet (in particular, in scheduled queries).This would allow us to force the execution of queries that we are confident in the correctness and get more stable results.
The text was updated successfully, but these errors were encountered: