-
Notifications
You must be signed in to change notification settings - Fork 169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The tracking of orphan processes is lost. #1577
Comments
ei @ChrisLiCheng thank you for reporting! The feature request makes sense! If I understood well you would like to track all descendant processes created by a specific |
Hi @ChrisLiCheng, Thank you for your response and your consideration of my feature request. To provide further clarification on my use case, I'm working in a scenario where I need to analyze unknown programs, and it's crucial for me to track not only the direct child processes of a specific PID but also all descendant processes, including orphan processes. The reason I mentioned potential issues with using the session ID (sid) is that in my analysis, I've encountered situations where the program can modify or set a new sid, making it unreliable for my purposes. I need a more robust and reliable way to trace the ancestry of processes, regardless of any modifications they may make to their session IDs. I hope this clarifies my requirements better. If you have any further questions or need more details, please feel free to ask. Your help in addressing this need is greatly appreciated. |
uhm, thank you for the additional context! at the moment I have no further questions, we will evaluate the feature request! |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh with Rotten issues close after an additional 30d of inactivity. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle rotten |
/remove-lifecycle rotten |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
Motivation
The motivation behind this request is to be able to trace all descendant processes created after specifying proc.apid=xxx and track them starting from pid=xxx. This is essential for monitoring and managing processes efficiently, especially in scenarios where sysdig loses track of child processes once the parent process exits and the child process is inherited by the process with pid=1.
Feature
I am requesting a feature that allows sysdig to continue tracking child processes even after the parent process has exited and the child process becomes managed by the init process (pid=1). Currently, sysdig loses track of these child processes, making it challenging to monitor their behavior.
Alternatives
Considering specifying proc.name or proc.aname in the tracking conditions is one alternative to address the issue of losing track of orphan processes when the process name remains the same. However, in cases like the one demonstrated in my example, proc.name or proc.aname can also change, rendering this approach ineffective.
An additional alternative, as mentioned in my initial message, is to run the target program inside a container and track events for the entire container. This approach can help maintain visibility into child processes even when they are inherited by the init process. However, it may not be a feasible solution in all situations, and having a built-in feature within sysdig would provide a more versatile and streamlined solution.
Additional context
Below is my test program.
The text was updated successfully, but these errors were encountered: