Skip to content

falcosecurity/plugins

Plugins

Falco Core Repository Stable License

This repository is the central hub for the Falco Plugin ecosystem. It serves two main purposes:

  • Be a registry: A comprehensive catalog of plugins recognized by The Falco Project, regardless of where their source code is hosted.
  • Monorepo for Falcosecurity plugins: Official plugins hosted and maintained by The Falco Project, with robust release and distribution processes.

For more information about the plugin system’s architecture and concepts, please see the official documentation.


Plugin Registry

The registry contains metadata and information about every plugin known and recognized by the Falcosecurity organization. It lists plugins hosted either in this repository or in other repositories. These plugins are developed for Falco and made available to the community.

Check out the Registering a Plugin to know how to add your plugin to this registry.

Registered Plugins

The tables below list all the plugins currently registered. The tables are automatically generated from the registry.yaml file.

Name Capabilities Description
plugin-id-zero-value Event Sourcing
ID: 0
``
This ID is reserved for particular purposes and cannot be registered. A plugin author should not use this ID unless specified by the documentation.

Authors: N/A
License: N/A
test Event Sourcing
ID: 999
test
This ID is reserved for source plugin development. Any plugin author can use this ID, but authors can expect events from other developers with this ID. After development is complete, the author should request an actual ID

Authors: N/A
License: N/A
k8saudit Event Sourcing
ID: 1
k8s_audit
Field Extraction
k8s_audit
Read Kubernetes Audit Events and monitor Kubernetes Clusters

Authors: The Falco Authors
License: Apache-2.0
cloudtrail Event Sourcing
ID: 2
aws_cloudtrail
Field Extraction
aws_cloudtrail
Reads Cloudtrail JSON logs from files/S3 and injects as events

Authors: The Falco Authors
License: Apache-2.0
json Field Extraction
All Sources
Extract values from any JSON payload

Authors: The Falco Authors
License: Apache-2.0
dummy Event Sourcing
ID: 3
dummy
Field Extraction
dummy
Reference plugin used to document interface

Authors: The Falco Authors
License: Apache-2.0
dummy_c Event Sourcing
ID: 4
dummy_c
Field Extraction
dummy_c
Like dummy, but written in C++

Authors: The Falco Authors
License: Apache-2.0
docker Event Sourcing
ID: 5
docker
Field Extraction
docker
Docker Events

Authors: Thomas Labarussias
License: Apache-2.0
seccompagent Event Sourcing
ID: 6
seccompagent
Field Extraction
seccompagent
Seccomp Agent Events

Authors: Alban Crequy
License: Apache-2.0
okta Event Sourcing
ID: 7
okta
Field Extraction
okta
Okta Log Events

Authors: The Falco Authors
License: Apache-2.0
github Event Sourcing
ID: 8
github
Field Extraction
github
Github Webhook Events

Authors: The Falco Authors
License: Apache-2.0
k8saudit-eks Event Sourcing
ID: 9
k8s_audit
Field Extraction
k8s_audit
Read Kubernetes Audit Events from AWS EKS Clusters

Authors: The Falco Authors
License: Apache-2.0
nomad Event Sourcing
ID: 10
nomad
Field Extraction
nomad
Read Hashicorp Nomad Events Stream

Authors: Alberto Llamas
License: Apache-2.0
dnscollector Event Sourcing
ID: 11
dnscollector
Field Extraction
dnscollector
DNS Collector Events

Authors: Daniel Moloney
License: Apache-2.0
gcpaudit Event Sourcing
ID: 12
gcp_auditlog
Field Extraction
gcp_auditlog
Read GCP Audit Logs

Authors: The Falco Authors
License: Apache-2.0
syslogsrv Event Sourcing
ID: 13
syslogsrv
Field Extraction
syslogsrv
Syslog Server Events

Authors: Maksim Nabokikh
License: Apache-2.0
salesforce Event Sourcing
ID: 14
salesforce
Field Extraction
salesforce
Falco plugin providing basic runtime threat detection and auditing logging for Salesforce

Authors: Andy
License: Apache-2.0
box Event Sourcing
ID: 15
box
Field Extraction
box
Falco plugin providing basic runtime threat detection and auditing logging for Box

Authors: Andy
License: Apache-2.0
k8smeta Field Extraction
syscall
Enriche Falco syscall flow with Kubernetes Metadata

Authors: The Falco Authors
License: Apache-2.0
k8saudit-gke Event Sourcing
ID: 16
k8s_audit
Field Extraction
k8s_audit
Read Kubernetes Audit Events from GKE Clusters

Authors: The Falco Authors
License: Apache-2.0
journald Event Sourcing
ID: 17
journal
Field Extraction
journal
Read Journald events into Falco

Authors: Grzegorz Nosek
License: Apache-2.0
kafka Event Sourcing
ID: 18
kafka
Read events from Kafka topics into Falco

Authors: Hunter Madison
License: Apache-2.0
gitlab Event Sourcing
ID: 19
gitlab
Field Extraction
gitlab
Falco plugin providing basic runtime threat detection and auditing logging for GitLab

Authors: Andy
License: Apache-2.0
keycloak Event Sourcing
ID: 20
keycloak
Field Extraction
keycloak
Falco plugin for sourcing and extracting Keycloak user/admin events

Authors: Mattia Forcellese
License: Apache-2.0
k8saudit-aks Event Sourcing
ID: 21
k8s_audit
Field Extraction
k8s_audit
Read Kubernetes Audit Events from AWS AKS Clusters

Authors: The Falco Authors
License: Apache-2.0
k8saudit-ovh Event Sourcing
ID: 22
k8s_audit
Field Extraction
k8s_audit
Read Kubernetes Audit Events from OVHcloud MKS Clusters

Authors: Aurélie Vache
License: Apache-2.0
dummy_rs Event Sourcing
ID: 23
dummy_rs
Field Extraction
dummy_rs
Like dummy, but written in Rust

Authors: The Falco Authors
License: Apache-2.0
container Field Extraction
syscall
Enriche Falco syscall flow with Container Metadata

Authors: The Falco Authors
License: Apache-2.0

Falcosecurity Plugins

Along with the registry, this repository hosts the official plugins maintained by the Falcosecurity organization. Each plugin is an independent project with its own directory in the plugins folder.

The main branch reflects the latest development state, and plugins are released on a regular basis. Development builds are published automatically when a Pull Request is merged into main, while stable builds are released only when a new tag is created. You can find all published artifacts at download.falco.org. For details on the release process, please see our Release Process.

The instructions below explain how to install and apply only to plugins from this repository.

Installing Plugins

Plugins hosted in this repository are built and distributed through Falco's official channels. You can easily install them using either falcoctl or the Falco Helm chart.

Using falcoctl

  1. Install falcoctl: If you haven't already, follow the falcoctl installation guide.
  2. Install a Plugin: Execute the following command, replacing <plugin-name> with the name of the plugin you wish to install:
    falcoctl index update falcosecurity
    falcoctl artifact install <plugin-name>

    Depending on your environment, you may need to run the above commands with sudo.

  3. Configure Falco to load the plugin as described in the plugin's documentation.

Using the Falco Helm Chart

When installing Falco using the Helm chart, you can instruct the chart to install a specific plugin by setting the falcoctl.config.artifact.install.refs value and then adding the relevant plugin configuration under falco.

The Helm charts provides a preset values-k8saudit.yaml file that can be used to install the k8saudit plugin or as example for installing other plugins.

Contributing

If you want to help and wish to contribute, please review our contribution guidelines. Code contributions are always encouraged and welcome!

If you wish to contribute a plugin to The Falco Project, simply open a Pull Request to add your plugin to the /plugins folder and update the registry accordingly. Note that to be hosted in this repository, plugins must be licensed under the Apache 2.0 License.

License

This project is licensed to you under the Apache 2.0 Open Source License.