Eunomia
0.1.0
A lightweight eBPF-based CloudNative Monitor tool for Container Security and Observability
|
config for eunomia More...
#include <config.h>
Public Member Functions | |
void | load_config_options_to_trackers () |
load config options to enable_trackers More... | |
Static Public Member Functions | |
static eunomia_config_data | from_toml_file (const std::string &file_path) |
parse config from toml files More... | |
static eunomia_config_data | from_json_file (const std::string &file_path) |
parse config from json files More... | |
Public Attributes | |
std::string | run_selected = "server" |
global run mode More... | |
std::vector< tracker_config_data > | enabled_trackers |
config for all enabled tracker More... | |
bool | disable_other_configs = false |
use the config data from enabled_trackers, More... | |
std::string | tracing_selected = "all" |
tracing config More... | |
std::string | tracing_target_id = "" |
tracing targets More... | |
int | exit_after = 0 |
auto exit mode More... | |
std::set< std::string > | enabled_export_types = { "prometheus", "stdout" } |
export config More... | |
std::string | fmt = "plain_text" |
export format More... | |
bool | enable_container_manager = true |
enable container tracing More... | |
std::string | prometheus_listening_address = "127.0.0.1:8528" |
bool | enable_sec_rule_detect = false |
enable sec rule analyzer and detect More... | |
std::vector< rule_config_data > | security_rules |
security rule config More... | |
std::vector< seccomp_config_data > | seccomp_data |
seccomp enabled syscalls More... | |
bool | enable_seccomp_module = false |
run container under seccomp More... | |
int | server_port = 8527 |
eunomia_http_server_port More... | |
config for eunomia
both config from toml and command line should be put here
|
static |
parse config from json files
|
static |
parse config from toml files
void eunomia_config_data::load_config_options_to_trackers | ( | ) |
load config options to enable_trackers
bool eunomia_config_data::disable_other_configs = false |
use the config data from enabled_trackers,
disable others.
bool eunomia_config_data::enable_container_manager = true |
enable container tracing
we can get container id and container name using pid from the map of it
bool eunomia_config_data::enable_sec_rule_detect = false |
enable sec rule analyzer and detect
bool eunomia_config_data::enable_seccomp_module = false |
run container under seccomp
std::set<std::string> eunomia_config_data::enabled_export_types = { "prometheus", "stdout" } |
export config
may be we should have config similar to tracker_config
std::vector<tracker_config_data> eunomia_config_data::enabled_trackers |
config for all enabled tracker
int eunomia_config_data::exit_after = 0 |
auto exit mode
std::string eunomia_config_data::fmt = "plain_text" |
export format
this should be set as well
std::string eunomia_config_data::prometheus_listening_address = "127.0.0.1:8528" |
std::string eunomia_config_data::run_selected = "server" |
global run mode
std::vector<seccomp_config_data> eunomia_config_data::seccomp_data |
seccomp enabled syscalls
std::vector<rule_config_data> eunomia_config_data::security_rules |
security rule config
TODO: add more security rule config
int eunomia_config_data::server_port = 8527 |
eunomia_http_server_port
std::string eunomia_config_data::tracing_selected = "all" |
tracing config
std::string eunomia_config_data::tracing_target_id = "" |
tracing targets