• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar

Red Sift Blog

Democratizing technology essential for cybersecurity.

Red Sift Blog
  • redsift.com
  • Featured
  • About
  • Get in touch
You are here: Home / Labs / Announcing ingraind 1.0

Announcing ingraind 1.0

by Peter Parkanyi
April 1, 2020April 8, 2020Filed under:
  • Labs

Almost 2 years ago when I joined Red Sift, I kicked off development on ingraind and its core, RedBPF, with the goal of building a better kind of security agent to monitor file access, network traffic and DNS queries in our infrastructure. We have shared our journey on this blog, and received a lot of helpful input from the Rust and Linux kernel community during this time.

Just under 1000 git commits later in the two repositories combined, we are happy to announce version 1.0.

Of course, we are actively dogfooding ingraind ourselves, and running it in our production system. Combined with our data processing backend, the data collected by ingraind is extremely helpful to resolve issues with the help of great visualisations.

InGRAIN showing network and file access of the Docker and Kubernetes runtimes

However, the full list of operating systems ingraind supports has grown to support main cloud providers out of the box, making sure you can get it running in Google and AWS Kubernetes deployments quickly.

RedBPF behind ingraind

A lot of effort went into creating an efficient toolchain to run Rust eBPF programs in the kernel by the amazing Alessandro Decina. We have removed all C code from the ingraind sources, and exclusively rely on our own idiomatic Rust library, RedBPF.

We introduced the cargo bpf tool to help building new monitoring modules, so that extending ingraind is easy and safe for most programmers even with only superficial knowledge of Rust. If you need to hook a specific system call, or kernel function, you can easily do that and incorporate it to your own deployment. An extensive documentation will also help you get there.

On top of this, Alessandro dived into LLVM to figure out a reliable way to unroll large loops, an important part of making eBPF programming easier, where loops don’t exist. In order to support code that panics, such as boundary checks when indexing arrays or accessing kernel memory using slices, we transform the LLVM bitcode to inline panic handlers which are normally annotated with #[never(inline)].

To make Rust programs more comfortable to write, we also generate bindings for kernel structures, so some of the convenient preprocessor-generated accessors that are available in C is turned into simple function calls in Rust.

I also want to thank all our external contributors for the amazing feedback that helped push ingraind and RedBPF to where they are now.

The entire team at Red Sift are really excited to publish the new website for project, ingraind.org. It collects all the documentation and resources that you need to get started on working with ingraind.

To learn more about eBPF and systems monitoring in Rust, head over to ingraind.org, or the GitHub repositories for ingraind and RedBPF. We’d love to hear about your experience!

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Related

Tagged:
  • ebpf
  • monitoring
  • rust

Post navigation

Previous Post Award: OnDMARC by Red Sift shortlisted in SC Awards Europe 2020
Next Post Featured: Government and Public Sector Journal (GPSJ)

Primary Sidebar

Recent Posts

  • Red Sift joins TechNation’s Upscale 6.0 Cohort
  • How Containerization is changing the delivery of Applications and Services
  • 360° Email Protection: Essential Modern Security for Business Email and Remote Workforces
  • Award: Red Sift listed in “Top 25 Cybersecurity Companies Of 2020”
  • Last Christmas, I gave you my heart, my bank codes and my online identity

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • November 2016
  • October 2016
  • February 2016

Categories

  • AI
  • BEC
  • Coronavirus
  • Cybersecurity
  • Deliverability
  • DMARC
  • Email
  • Finance
  • Labs
  • News
  • OnINBOX
  • Partner Program
  • Red Sift Tools
  • Uncategorized
  • Work @ Red Sift

Copyright © 2021 · Milan Pro on Genesis Framework · WordPress · Log in