ef73039559
Feature: Improve our capability to detect vulnerable software on Ubuntu hosts To improve the capability of detecting vulnerable software on Ubuntu, we are now using OVAL definitions to detect vulnerable software on Ubuntu hosts. If data sync is enabled (disable_data_sync=false) OVAL definitions are automatically kept up to date (they are 'refreshed' once per day) - there's also the option to manually download the OVAL definitions using the 'fleetctl vulnerability-data-stream' command. Downloaded definitions are then parsed into an intermediary format and then used to identify vulnerable software on Ubuntu hosts. Finally, any 'recent' detected vulnerabilities are sent to any third-party integrations. |
||
---|---|---|
.. | ||
agent.go | ||
mac10.14.6.tmpl | ||
README.md | ||
ubuntu_16.04.tmpl | ||
ubuntu_18.04.tmpl | ||
ubuntu_20.04.tmpl | ||
ubuntu_21.04.tmpl | ||
ubuntu_21.10.tmpl | ||
ubuntu_22.04.tmpl | ||
ubuntu_1604-vulnerable_software.json | ||
ubuntu_1804-vulnerable_software.json | ||
ubuntu_2004-vulnerable_software.json | ||
ubuntu_2104-vulnerable_software.json | ||
ubuntu_2110-vulnerable_software.json | ||
ubuntu_2204-vulnerable_software.json | ||
vulnerable.software |
Osquery Server Performance Tester
This is a tool to generate realistic traffic to an osquery management server (primarily, Fleet). With this tool, many thousands of hosts can be simulated from a single host.
Requirements
The only requirement for running this tool is a working installation of Go.
Usage
Typically go run
is used.
You can use --help
to view the available configuration:
go run agent.go --help
The tool should be invoked with the appropriate enroll secret. A typical invocation looks like:
go run agent.go --enroll_secret hgh4hk3434l2jjf
When starting many hosts, it is a good idea to extend the intervals, and also the period over which the hosts are started:
go run agent.go --enroll_secret hgh4hk3434l2jjf --host_count 5000 --start_period 5m --query_interval 60s --config_interval 5m
This will start 5,000 hosts over a period of 5 minutes. Each host will check in for live queries at a 1 minute interval, and for configuration at a 5 minute interval. Starting over a 5 minute period ensures that the configuration requests are spread evenly over the 5 minute interval.
It can be useful to start the "same" hosts. This can be achieved with the
--seed
parameter:
go run agent.go --enroll_secret hgh4hk3434l2jjf --seed 0
By using the same seed, along with other values, we usually get hosts that look the same to the server. This is not guaranteed, but it is a useful technique.
Running Locally (Development Environment)
First, ensure your Fleet local development environment is up and running. Refer to Building Fleet for details. Once this is done:
- navigate to the Hosts tab of your Fleet web interface (typically, this would be at https://localhost:8080/hosts/manage).
- click on "Manage enroll secret" and copy the enroll secret.
- start the
osquery-perf
agent (from the root of the Fleet repository, it would bego run ./cmd/osquery-perf/agent.go --enroll_secret <paste-the-secret>
).
The agent will start. You can connect to MySQL to view changes made to the development database by the agent (e.g., at the terminal, with docker-compose exec mysql mysql -uroot -ptoor -Dfleet
). Remember that frequency of the reported data depends on the configuration of the Fleet instance, so you may want to start it with shorter delays for some cases and enable debug logging (e.g., ./build/fleet serve --dev --logging_debug --osquery_detail_update_interval 1m
).
Resource Limits
On many systems, trying to simulate a large number of hosts will result in hitting system resource limits (such as number of open file descriptors).
If you see errors such as dial tcp: lookup localhost: no such host
or read: connection reset by peer
, try increasing these limits.
macOS
Run the following command in the shell before running the Fleet server and before running agent.go
(run it once in each shell):
ulimit -n 64000