LOW
The severity is rated as LOW because this advisory focuses on operational tuning and configuration rather than an exploit. The primary concern is the management of alerts, not a vulnerability that can be exploited by attackers.

The user has deployed Falco, a cloud-native runtime security tool, across three clusters in an OpenStack private cloud environment. The deployment is using Cilium ClusterMesh and the modern_ebpf driver for network policies. Initially, they are experiencing approximately 6000 alerts per day, mostly due to false positives from overlapping traffic between Ceph (a distributed storage system) and mining port ranges. This highlights a common issue in new deployments of security monitoring tools like Falco where initial tuning is necessary to reduce noise and focus on actual threats. The user seeks advice from experienced users about their experiences with Falco, specifically regarding the tuning process for false positives and whether default rules suffice or if heavy customization is required. Additionally, they question the necessity of using Falco in a private cloud setting versus simpler solutions.

Affected Systems
  • Falco
  • OpenStack
  • Ceph
Affected Versions: All versions with default configurations
Remediation
  • Tune Falco rules to exclude known false positive sources such as Ceph traffic. Edit the Falco rule file (e.g., `/etc/falco/rules.d/falco_rules.yaml`) and add exclusions for Ceph.
  • Review and customize Falco rules based on your specific environment to reduce noise and improve accuracy of alerts. This may involve creating custom rules in a new YAML file under `/etc/falco/rules.d/` or modifying existing ones.
  • Monitor alert trends over time and continue tuning as needed based on the evolving threat landscape and operational changes.
Stack Impact

The primary impact is on security monitoring within homelab stacks that include OpenStack, Ceph, and Falco. Initial configurations may lead to a high volume of alerts, which can overwhelm operators if not properly tuned.

Source →