https://github.com/crowdstrike/puppet-falcon
Science Score: 26.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Committers with academic emails
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (12.1%) to scientific vocabulary
Keywords
Keywords from Contributors
Repository
Basic Info
- Host: GitHub
- Owner: CrowdStrike
- License: mit
- Language: Ruby
- Default Branch: main
- Homepage: https://forge.puppet.com/modules/crowdstrike/falcon
- Size: 146 KB
Statistics
- Stars: 7
- Watchers: 11
- Forks: 9
- Open Issues: 9
- Releases: 17
Topics
Metadata Files
README.md
falcon
Table of Contents
- Description
- Usage - Configuration options and additional functionality
- Limitations - OS compatibility, etc.
apivslocalinstall methods- Development - Guide for contributing to the module
- License
Description
The falcon module installs, configures, and manages the falcon service across multiple operating systems and distributions.
Note:
puppet-falconis an open source project, not a CrowdStrike product. As such, it carries no formal support, expressed or implied.
Usage
All parameters for the falcon module are contained within the main falcon class. There are many options that will modify what the module does. Refer to REFERENCE.md for more details.
Below are some of the common use cases.
Note:
falconpackages are not public so this module has two options for installing the falcon sensor. Using theinstall_methodparameter you can chooseapiorlocal.apiis the default. More information is outlined in API vs Local install methods.
Basic Install, Configure, and Manage the service
```puppet
using the api method
class {'falcon':
clientid => Sensitive('12346'),
clientsecret => Sensitive('12345'),
cid => 'AJKQUI123JFKSDFJK
}
``
```puppet
using the local method
$package_options = { 'ensure' => 'present', 'source' => '/tmp/sensor.rpm' # any other attributes that are valid for the package resource }
class {'falcon':
installmethod => 'local',
packageoptions => $package_options,
cid => 'AJKQUI123JFKSDFJK
}
``
Using the api install method
The api install methods uses the API to download the sensor package. The version of the package that is downloaded are determined by the parameters passed to the module.
There are three parameters that alter the behavior of the api install method. Only one of these parameters can be used at a time, and they are evaluated in the order they are listed below.
version- Will download the sensor package matching the version you specify.update_policy- Will download the version specified by the update policy.version_decrement- Will download thenth version before the current version.
The drawbacks to using the api install method are outlined in API vs Local install methods.
Examples for each are below.
Using the version parameter
This takes precedence over update_policy and version_decrement.
puppet
class { 'falcon':
client_id => Sensitive('12346'),
client_secret => Sensitive('12345'),
version => '1.0.0',
cid => 'AJKQUI123JFKSDFJK`
}
Using the update_policy parameter
This takes precedence over the version_decrement parameter.
puppet
class { 'falcon':
client_id => Sensitive('12346'),
client_secret => Sensitive('12345'),
update_policy => 'platform_default',
cid => 'AJKQUI123JFKSDFJK`
}
Using the version_decrement parameter
Use version_decrement to download the n-x version.
A value of 0 will download the latest version, and a value of 2 will download the n-2 version (2 releases behind latest).
puppet
class { 'falcon':
client_id => Sensitive('12346'),
client_secret => Sensitive('12345'),
version_decrement => 2,
cid => 'AJKQUI123JFKSDFJK`
}
Using the local install method
The local install method gives you full control on how the sensor is installed.
Some reasons you may use this method are:
- You want to install the sensor from a local file
- You have your own package management system
You can learn more about the local install method in API vs Local install methods.
When you use the local install method, package_options is required. Parameters in package_options are passed to the the package resource. You must provide any required parameters for the package resource except the name parameter. The module will pick the appropriate name based on the operating system. You can still override the name by specifying the name property in the package_options hash.
```puppet
Using a local file
file {'/tmp/sensor.rpm': ensure => 'present', source => 'https://company-filer-server.com/sensor.rpm' }
class {'falcon': installmethod => 'local', packageoptions => { 'ensure' => 'present', 'source' => '/tmp/sensor.rpm' }, require => File['/tmp/sensor.rpm'] } ```
```puppet
Using a http source
class {'falcon': installmethod => 'local', packageoptions => { 'ensure' => 'present', 'source' => 'http://example.com/sensor.rpm' } } ```
```puppet
Overriding the name parameter
class {'falcon': installmethod => 'local', packageoptions => { 'ensure' => 'present', 'source' => '/tmp/sensor.rpm', 'name' => 'falcon-sensor' } } ```
Removing the Installer file
When install_method is api you can use the cleanup_installer parameter to remove the installer file after installation.
puppet
class { 'falcon':
client_id => Sensitive('12346'),
client_secret => Sensitive('12345'),
cleanup_installer => true,
cid => 'AJKQUI123JFKSDFJK`
}
Overriding the default Package parameters
You can override any parameter that is passed to the package resource using the package_options parameter. Valid Package Parameters
This works the same in both api and local install methods.
```puppet $packageoptions = { 'provider' => 'rpm', 'installoptions' => '--force', }
class { 'falcon': packageoptions => $packageoptions } ```
Opt out of the module installing the package
puppet
class {'falcon':
package_manage => false
# ... other required params
}
Opt out of the module configuring the agent - Linux Only
Note The windows agent can only be configured at install time. The Linux agent ships with
falconctlthat allows puppet to configure the agent after install. For example: updating thecidproperty in your resource will update thecidon the linux agent on the next run, but not the windows.
puppet
class {'falcon':
config_manage => false
# ... other required params
}
Opt out of the module controlling the service
puppet
class {'falcon':
service_manage => false
# ... other required params
}
Registering a cid
puppet
class {'falcon':
cid => 'AJKQUI123JFKSDFJK`
# ... other required params
}
Registering a cid with a provisioning token
If your company requires a provisioning token to register a agent, you can use the provisioning_token parameter.
puppet
class {'falcon':
cid => 'AJKQUI123JFKSDFJK`,
provisioning_token => '1234567890'
# ... other required params
}
Setting proxy settings
You can use the proxy_host, proxy_port, and proxy_enabled parameters to configure proxy settings for your agent.
Note Mac installs have no proxy settings specific to the agent. Instead it uses the OS's proxy settings. Passing values to these parameters won't configure any proxy settings for Mac.
class {'falcon': cid => 'AJKQUI123JFKSDFJK`, provisioningtoken => '1234567890,' proxyhost => 'neptune.example.com', proxyport => '8080', proxyenabled => true # ... other required params }
Pinning the agent version
If you want to pin the agent version to a specific version using the api install method then you can set version_manage to true.
In our example below we use version_decrement, but it works the same for all. Puppet will consult the API to determine what version version_decrement => 2 resolves to. It then will download that version and ensure it is installed.
Each subsequent run it will check the api to see if the version returned is the one installed. If for example, a new version is released it would cause the version returned from the check to change causing the agent to be upgraded to the new n-2 version.
warning: This causes the module to consult the API every run to ensure the version the API returns is the version that is installed. This could cause rate limit issues for large deployments. If you want to have automated upgrades/downgrades and use the
apiinstall method it is generally suggested to setversion_managetofalseand allow the CrowdStrike Update Policy to do the upgrades/downgrades instead of Puppet.
puppet
class {'falcon':
version_manage => true
client_id => Sensitive('12346'),
client_secret => Sensitive('12345'),
update_policy => 'platform_default'
cid => 'AJKQUI123JFKSDFJK`
# ... other required params
}
Using the install_method of local
puppet
class {'falcon':
install_method => 'local',
package_options => {
'ensure' => '32.4.3',
'source' => '/tmp/sensor-32.4.3.rpm'
}
}
api vs local install methods
Generally the api method will be fine for most use cases if version_manage is set to false. If version_manage is set to true you may run into api rate limits.
You can use local install method if you want full control and don't want to leverage the API.
Why are there two install methods?
Generally Puppet modules that manage a package control the full lifecycle of that package from installation to removal. The fact CrowdStrike agent packages are not public makes this hard.
We still wanted to give a hands off way of quickly getting a package installed so we created the api install method. This method will require you to provide api credentials, and then we will download the correct package version from the CrowdStrike API. There are parameters that let you control the behavior like setting update_policy. This will cause the module to download the correct version based on what the update policy suggests. Examples of each here.
However, this method might not be suitable for everyone so the local install method was created that gives you full control on how the sensor is installed.
How the api install method works
The api install method will use the falcon api to download the correct package version. The correct package version depends on what parameters you provide. You can see Examples of each here.
The first run will cause Puppet to call the appropriate CrowdStrike apis to get the information needed to download the sensor package. It will then download the sensor package. After that, normal puppet resources take over.
If you set version_manage to true every run will cause the module to consult the CrowdStrike API to get the appropriate package version. Then it will determine if the installed version is the same as the returned version. If they are not the same, then it will download the correct package version and do the appropriate install/update/downgrade actions.
If you set version_manage to false then api calls will only happen when the CrowdStrike sensor is not installed.
API rate limits
The main limitation of the api install method is api rate limits. We haven't hit them ourselves, but it may be possible for large installations to hit a rate limit when using the api install method with version_manage set to true.
Each time Puppet compiles a catalog for a node it uses the API to determine what version of the agent should be installed. If the agent is already on the correct version then no further apis calls are made.
Setting version_manage to false will prevent any api calls unless the agent is not installed.
Reducing API calls
The best way to reduce API calls is to set version_manage to false. This will ensure the only time the API is called is when the agent is not installed. This should prevent API rate limit issues.
Installing on MacOS
Apple platforms require a Mobile Device Management (MDM) profile to install kernel extensions without user prompting. Because of this limitation, this module will only download and install the Falcon Sensor. The Mac deployment guide in the CrowdStrike documentation outlines the steps required to configure the Mac sensor to start reporting to a CID.
Development
If you want to develop new content or improve on this collection, please open an issue or create a pull request. All contributions are welcome!
License
See the LICENSE for more information.
Owner
- Name: CrowdStrike
- Login: CrowdStrike
- Kind: organization
- Email: github@crowdstrike.com
- Location: United States of America
- Website: https://www.crowdstrike.com
- Repositories: 183
- Profile: https://github.com/CrowdStrike
GitHub Events
Total
- Create event: 4
- Release event: 1
- Issues event: 9
- Delete event: 4
- Issue comment event: 6
- Push event: 11
- Pull request review event: 5
- Pull request event: 15
Last Year
- Create event: 4
- Release event: 1
- Issues event: 9
- Delete event: 4
- Issue comment event: 6
- Push event: 11
- Pull request review event: 5
- Pull request event: 15
Committers
Last synced: about 1 year ago
Top Committers
| Name | Commits | |
|---|---|---|
| ffalor | 3****r | 51 |
| github-actions[bot] | 4****] | 16 |
| Carlos Matos | c****s@c****m | 3 |
| Šimon Lukašík | i****k@f****g | 1 |
| cocker-cc | 3****c | 1 |
| Matt Kraai | m****t@k****s | 1 |
Committer Domains (Top 20 + Academic)
Issues and Pull Requests
Last synced: 6 months ago
All Time
- Total issues: 32
- Total pull requests: 77
- Average time to close issues: about 2 months
- Average time to close pull requests: 1 day
- Total issue authors: 13
- Total pull request authors: 7
- Average comments per issue: 0.94
- Average comments per pull request: 0.13
- Merged pull requests: 68
- Bot issues: 0
- Bot pull requests: 20
Past Year
- Issues: 5
- Pull requests: 8
- Average time to close issues: about 2 months
- Average time to close pull requests: about 1 hour
- Issue authors: 3
- Pull request authors: 3
- Average comments per issue: 0.2
- Average comments per pull request: 0.0
- Merged pull requests: 7
- Bot issues: 0
- Bot pull requests: 2
Top Authors
Issue Authors
- ffalor (18)
- gchagan36 (2)
- bwitt (2)
- namidul (1)
- maoneal (1)
- carlosmmatos (1)
- Tamerz (1)
- CossyCosmas (1)
- stboch (1)
- absld (1)
- cconfredo (1)
- mkopnsrc (1)
- danislav (1)
Pull Request Authors
- ffalor (54)
- github-actions[bot] (22)
- bwitt (3)
- carlosmmatos (2)
- cocker-cc (1)
- isimluk (1)
- mtkraai (1)
Top Labels
Issue Labels
Pull Request Labels
Packages
- Total packages: 1
-
Total downloads:
- puppet 36,969 total
- Total dependent packages: 0
- Total dependent repositories: 0
- Total versions: 18
forge.puppet.com: crowdstrike-falcon
Module to manage CrowdStrike Falcon Sensor
- Homepage: https://github.com/crowdstrike/puppet-falcon
- License: MIT
-
Latest release: 0.13.0
published 6 months ago
Rankings
Dependencies
- pyyaml ==6.0
- github_changelog_generator >= 0 development
- puppet-resource_api >= 0 development
- puppet-strings >= 0 development
- puppet_litmus >= 0 development
- rspec-puppet-facts >= 0 development
- rubocop >= 0 development
- solargraph >= 0 development
- webmock >= 0 development
- actions/cache v2 composite
- actions/checkout v2 composite
- ruby/setup-ruby v1 composite
- actions/checkout v2 composite
- docker://puppet/iac_release ci composite
- actions/checkout v2 composite
- docker://puppet/iac_release ci composite
- puppetlabs/peter-evans-create-pull-request v3 composite
- actions/checkout v2 composite
- actions/create-release v1 composite
- docker://puppet/pdk nightly composite
- actions/checkout v2 composite
- docker://puppet/iac_release ci composite
- ghcr.io/ffalor/puppet latest build