Skip to content
This repository has been archived by the owner on Sep 21, 2023. It is now read-only.

A misbehaving input should not be able to flood the shipper and prevent publishing the events of other inputs #213

Open
Tracked by #197 ...
cmacknz opened this issue Jan 10, 2023 · 0 comments
Labels
Team:Elastic-Agent Label for the Agent team

Comments

@cmacknz
Copy link
Member

cmacknz commented Jan 10, 2023

We will need a way to prevent a misbehaving input from flooding the shipper queue and preventing events from other inputs from being published.

This is a particular concern when the shipper is integrated with the endpoint security input. A user, misbehaving input, or malicious actor should not be able to flood the shipper with log files or other data and prevent or reduce the publishing of security events.

The easiest way to prevent this in the current system is to have the agent provision a separate shipper process for endpoint security, but this will always mean there is an additional queue and output to tune. In the ideal case this would be unnecessary but it is more difficult to achieve.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Team:Elastic-Agent Label for the Agent team
Projects
None yet
Development

No branches or pull requests

1 participant