• Stars
    star
    220
  • Rank 174,230 (Top 4 %)
  • Language
    Go
  • License
    Apache License 2.0
  • Created almost 4 years ago
  • Updated about 1 month ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Community managed Helm charts for running Falco with Kubernetes

Falco Helm Charts

Falco Core Repository Stable License

This GitHub project is the source for our Helm chart repository.

The purpose of this repository is to provide a place for maintaining and contributing Charts related to the Falco project, with CI processes in place for managing the releasing of Charts into our Helm Chart Repository.

For more information about installing and using Helm, see the Helm Docs.

Repository Structure

This GitHub repository contains the source for the packaged and versioned charts released to https://falcosecurity.github.io/charts (our Helm Chart Repository).

The Charts in this repository are organized into folders: each directory that contains a Chart.yaml is a chart.

The Charts in the master branch (with a corresponding GitHub release) match the latest packaged Charts in our Helm Chart Repository, though there may be previous versions of a Chart available in that Chart Repository.

Charts

Charts currently available are listed below.

Usage

Adding falcosecurity repository

Before installing any chart provided by this repository, add the falcosecurity Charts Repository:

helm repo add falcosecurity https://falcosecurity.github.io/charts
helm repo update

Installing a chart

Please refer to the instruction provided by the Chart you want to install. For installing Falco via Helm, the documentation is here.

Contributing

We are glad to receive your contributions. To help you in the process, we have prepared a CONTRIBUTING.md, which includes detailed information on contributing to falcosecurity projects. Furthermore, we implemented a mechanism to automatically release and publish our charts whenever a PR is merged (if you are curious how this process works, you can find more details in our release.md).

So, we ask you to follow these simple steps when making your PR:

  • The DCO is required to contribute to a falcosecurity project. So ensure that all your commits have been signed off. We will not be able to merge the PR if a commit is not signed off.
  • Bump the version number of the chart by modifying the version value in the chart's Chart.yaml file. This is particularly important, as it allows our CI to release a new chart version. If the version has not been increased, we will not be able to merge the PR.
  • Add a new section in the chart's CHANGELOG.md file with the new version number of the chart.
  • If your changes affect any chart variables, please update the chart's README.md file accordingly and run make docs in the chart folder.

Finally, when opening your PR, please fill in the provided PR template, including the final checklist of items to indicate that all the steps above have been performed.

If you have any questions, please feel free to contact us via GitHub issues.

More Repositories

1

falco

Cloud Native Runtime Security
C++
6,860
star
2

falcosidekick

Connect Falco to your ecosystem
Go
502
star
3

libs

libsinsp, libscap, the kernel module driver, and the eBPF driver sources
C
200
star
4

falco-exporter

Prometheus Metrics Exporter for Falco output events
Go
108
star
5

falcosidekick-ui

A simple WebUI with latest events from Falco
Vue
97
star
6

falcoctl

Administrative tooling for Falco
Go
81
star
7

rules

Falco rule repository
Go
80
star
8

event-generator

Generate a variety of suspect actions that are detected by Falco rulesets
Go
73
star
9

plugins

Falco plugins registry
Go
69
star
10

pdig

ptrace-based event producer for udig
C
65
star
11

driverkit

Kit for building Falco drivers: kernel modules or eBPF probes
Go
61
star
12

client-go

Go client and SDK for Falco
Go
52
star
13

community

The Falco Project Community
50
star
14

evolution

Evolution process of The Falco Project
Go
45
star
15

falco-website

Source code of the official Falco website
HTML
32
star
16

test-infra

Falco workflow & testing infrastructure
Jsonnet
30
star
17

plugin-sdk-go

Falco plugins SDK for Go
Go
23
star
18

client-py

Python client and SDK for Falco
Python
19
star
19

falco-playground

Web-application used to validate Falco rules and test against scap file
TypeScript
18
star
20

kernel-crawler

A tool to crawl Linux kernel versions
Python
16
star
21

client-rs

The rust language implementation of the Falco client
Rust
14
star
22

kilt

Kilt is a project that defines how to inject foreign apps into containers
Go
13
star
23

testing

All-purpose test suite for Falco and its ecosystem
Go
11
star
24

deploy-kubernetes

Kubernetes deployment resources for Falco
10
star
25

k8s-metacollector

Fetches the metadata from kubernetes API server and dispatches them to Falco instances
Go
9
star
26

kernel-testing

Ansible playbooks to provision firecracker VMs and run Falco kernel tests
Dockerfile
7
star
27

falco-aws-terraform

Terraform Module for Falco AWS Resources
HCL
5
star
28

libs-sdk-go

Go SDK for Falco libs
Go
4
star
29

syscalls-bumper

A tool to automatically update supported syscalls in libs
Go
4
star
30

.github

Default community health files
4
star
31

ebpf-probe

eBPF probe for syscall events
3
star
32

kernel-module

3
star
33

pigeon

Secrets and config manager for Falco's infrastructure
Go
2
star
34

plugin-sdk-cpp

Falco plugins SDK for C++
C++
2
star
35

libsinsp

System inspection library
2
star
36

libscap

2
star
37

template-repository

Acts as a template for new repositories
1
star
38

dbg-go

A go tool to work with falcosecurity drivers build grid
Go
1
star
39

advocacy

Advocacy machinery
1
star
40

peribolos-syncer

Tool to synchronize Peribolos configuration with GitHub people sources of truth.
Go
1
star
41

contrib

Community sandbox to test-drive ideas/projects/code
Python
1
star
42

flycheck-falco-rules

Falco Rules Syntax Checker for Emacs, Using Flycheck
Emacs Lisp
1
star
43

cncf-green-review-testing

Falco configurations intended for testing with the CNCF Green Reviews Working Group
1
star