Home Container Behavior Analysis with AI
Post
Cancel

Container Behavior Analysis with AI

Overview

Learn the normal behavior of containers (e.g., CPU usage, syscalls, network connections) and use AI to detect anomalies that may indicate compromise or misuse.


Components Used

ComponentPurpose
K3sLightweight Kubernetes cluster
KubeSphereDashboard & DevOps tools (CI/CD, observability)
FalcoRuntime security and syscall monitoring
PrometheusMetrics collection
GrafanaMetrics and anomaly visualization
Python MLTraining and running AI models for anomaly detection

image

Step-by-Step Implementation

1. Deploy Falco to Monitor Runtime Events

Falco monitors system calls made by containers in real time. Add helm repo.Deploy falco with the falcosidekick enabled. The sidekick will allow falco to forwards its logs to loki,

1
2
helm repo add falcosecurity https://falcosecurity.github.io/charts
helm repo update

Deploy falco via helm.

SettingPurpose
falcoctl.artifact.install.enabled=falseRedundant for eBPF
falcoctl.artifact.follow.enabled=falseCauses crashes in K3s/minimal OS
falco.http_output.enabled=trueEnables logs to be sent via HTTP
falco.http_output.url=”http://falcosidekick.falco:2801”Set output to Falco pod internal DNS name
1
2
3
4
5
6
7
8
9
10
11
helm install falco falcosecurity/falco \
  --namespace falco --create-namespace \
  --set falco.driver.kind=ebpf \
  --set falco.ebpf.enabled=true \
  --set falco.privileged=true \
  --set falcoctl.artifact.install.enabled=false \
  --set falcoctl.artifact.follow.enabled=false \
  --set falco.http_output.enabled=true \
  --set falco.http_output.url="http://falcosidekick.falco:2801" \
  --set falco.json_output=true \
  --set json_include_output_property=true

Now install the falcosidekick. The sidekick will allow falco to forwards its logs to Loki.

1
2
helm repo add falcosecurity https://falcosecurity.github.io/charts
helm repo update

Install with UI

1
2
3
4
5
6
helm upgrade --install falcosidekick falcosecurity/falcosidekick \
  --namespace falco \
  --set config.debug=true \
  --set service.type=ClusterIP \
  --set webui.enabled=true \
  --set webui.service.type=NodePort

Run kubectl get svc -n falco falcosidekick-ui to see which port the UI is being forwarded to. You should be able to access the UI at Node_IP_Address:NodePort. A prometheus endpoint can be scrapped at /metrics.

This post is licensed under CC BY 4.0 by the author.