I am struggling to find a good read on pros and cons of running OSSEC on 
Docker containers. 

I am looking to implement intrusion detection on underlying hosts and not 
on the containers. All applications run on containers but are orchestrated 
by a orchestrator, therefore threat level is considered low. 

Because the solution needs to be highly available, I think installing 
ossec-local is more appropriate to the use case. On the server/client 
model, it appears that agents need to be registered to server and server 
then does heavy lifting. I want to send logs from ossec-local to Splunk (or 
other monitoring/alerting tools).

And finally, I have been instructed to run OSSEC on Docker containers. The 
logic behind that is, everything runs on containers. In my head that is an 
anti-pattern - containers are for isolation, an isolated process should not 
be watching hosts. Or maybe it should? Depending on the rules to be 
implemented, it sounds like I would need to map multiple volumes. 

Does anyone have experience of similar use case? Any pointers/links and 
thoughts will be highly appreciated. 

When I am done, I will share my learnings in a blog. 

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to