Skip to content

Commit

Permalink
adding event information for Tracee Policy based on aquasecurity#3403
Browse files Browse the repository at this point in the history
Signed-off-by: AnaisUrlichs <urlichsanais@gmail.com>
  • Loading branch information
AnaisUrlichs committed Aug 25, 2023
1 parent 5d12c73 commit 823e009
Showing 1 changed file with 56 additions and 0 deletions.
56 changes: 56 additions & 0 deletions docs/docs/policies/rules.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,62 @@ Rules determine which events a policy should trace.
An event can match all occurrences of events for a specific scope, or specific events depending on its filters.
Events support three types of filters: `context`, `arguments` and `return value`.

### Type of Events

You can add as events either of the following:

**[A syscall](../events/builtin/syscalls/index.md)**

Example Scope Section referencing the `open` syscall:

```bash
spec:
scope:
- global
rules:
event: open
```

**[Network Events](../events/builtin/network.md)**

Network Events can be specified from the list of `Available network events`.

For example:

```bash
spec:
scope:
- global
rules:
event: net_packet_ipv4
```

**[A behavioural Signature](../events/builtin/signatures.md)**

To specified one of the behavioral signatures as event, simply provide the name of the signature in the YAML manifest of the Tracee Policy:

```bash
spec:
scope:
- global
rules:
event: TRC-101
```

**[Any of our extra events](../events/builtin/extra/bpf_attach.md)**

Any of the extra events listed in the Tracee documentation can be listed in the Tracee Policy.

For instance, to specify the [do_sigaction](../events/builtin/extra/do_sigaction.md) event, provide the name in the YAML manifest:

```bash
spec:
scope:
- global
rules:
event: do_sigaction
```

## Context filters

Context is data which is collected along the event. They can be filtered like:
Expand Down

0 comments on commit 823e009

Please sign in to comment.