fleet/tools/osquery
Zach Wasserman 663641d521
Add commands for enrolling hosts in E2E tests (#1089)
- Add `addDockerHost` and `stopDockerHost` commands.
- Example usage in test.
2021-06-15 10:14:57 -07:00
..
.env Default osquery container version to latest in test docker-compose (#2152) 2019-11-17 14:10:11 -08:00
docker-compose.linux-overrides.yml docker-compose QoL improvements (#2319) 2020-10-09 10:10:33 -07:00
docker-compose.yml Add commands for enrolling hosts in E2E tests (#1089) 2021-06-15 10:14:57 -07:00
example_osquery.flags Fix up test osquery tooling (#996) 2021-06-07 13:34:17 -07:00
fleet.crt Remove kolide types and packages from backend (#974) 2021-06-06 15:07:29 -07:00
fleet.key Remove kolide types and packages from backend (#974) 2021-06-06 15:07:29 -07:00
README.md Fix up test osquery tooling (#996) 2021-06-07 13:34:17 -07:00

Configs and Tools for Testing Fleet

The files in this directory are intended to assist with Fleet development.

  • docker-compose.yml: This docker-compose file helps with starting osqueryd instances for testing Fleet. More on this below.

  • example_config.json: An example config file with insecure default passwords. Useful for testing in a local dev environment, but should /never/ be used in production.

  • example_osquery.conf: An example osquery config file that sets up basic configuration for distributed queries.

  • example_osquery.flags: An example osquery flagfile setting the config options that must be loaded before the full JSON config.

  • fleet.crt & fleet.key: Self-signed SSL certificate & key useful for testing locally with osqueryd. Works with the domain host.docker.internal (exposed within docker containers as the host's IP). Should never be used in production.

Testing with containerized osqueryd

Using Docker enables us to rapidly spin up and down pre-configured osqueryd instances for testing Fleet. Currently we have container images for Ubuntu14 and Centos7 osquery installations.

Setup

Docker and docker-compose are the only dependencies. The necessary container images will be pulled from Docker Cloud on first run.

Set the environment variable ENROLL_SECRET to the value of your Fleet enroll secret (available on the manage hosts page, or via fleetctl get enroll-secret).

(Optionally) Set FLEET_SERVER if you want to connect to a fleet server besides host.docker.internal:8080.

Running osqueryd

The osqueryd instances are configured to use the TLS plugins at host.docker.internal:8080. Using the example_osquery.flags in this directory should configure Fleet with the appropriate settings for these osqueryd containers to connect.

To start one instance each of Centos 6, Centos 7, Ubuntu 14, and Ubuntu 16 osqueryd, use:

docker-compose up

Linux users should use the overrides (which add DNS entries for host.docker.internal based on the DOCKER_HOST env var):

docker-compose -f docker-compose.yml -f docker-compose.linux-overrides.yml up

The logs will be displayed on the host shell. Note that docker-compose up will reuse containers (so the state of osqueryd will be maintained across calls). To remove the containers and start from a fresh state on the next call to up, use:

docker-compose rm

If you want to only start one instance of osqueryd, use:

docker-compose run ubuntu14-osquery

or

docker-compose run centos7-osquery

Note that docker-compose run does not save state between calls.

This system can also be used to start many instances of osqueryd running in containers on the same host:

docker-compose up -d && docker-compose scale ubuntu14-osquery=10 centos7-osquery=10

To stop the containers when running in detached mode like this, use:

docker-compose stop

And to delete the containers when wanting a fresh state, or when finished testing, use:

docker-compose rm

We have had no trouble running up to 100 containerized osqueryd instances on a single processor core and about 1GB of RAM.

Generating a osqueryd core file

The docker containers are configured to allow core files to be generated if osqueryd crashes for some reason. You can attach to the container hosting the errant osqueryd instance, install gdb and use it to read the core file to find out where the crash occurred. The other scenario where you might find a core dump useful is if osqueryd stops responding. In this case you can generate a core dump using the following instructions.

  1. Open a shell session on a container
docker exec -t -i <container id> /bin/bash
  1. Find the process ID of osqueryd
ps aux

There will be two osqueryd processes, you'll probably be interested in the child process (the one with the higher pid)

  1. Send a signal to the process to core dump
kill -3 <pid>

The core file should be in your current working directory on the container.