close
The Wayback Machine - https://web.archive.org/web/20190331070511/https://github.com/facebook/osquery
Skip to content
SQL powered operating system instrumentation, monitoring, and analytics.
Branch: experimental
Clone or download
akindyakov and facebook-github-bot Move osquery/events/linux/probes/ to osquery/experimental/tracing/linux/
Summary: To clean it up, they are parts of the same experimental subsystem and shoul be close to each other in experimental directory.

Reviewed By: marekcirkos

Differential Revision: D14668951

fbshipit-source-id: 404be1f3c24699557edc0b9e5ada823ea04533f1
Latest commit 93fd8a2 Mar 29, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Image .github Add task issue template (#4901) Aug 13, 2018
Image docs Remove unused flag enable_monitor Feb 7, 2019
Image mode Reduce number of configurations on system.py Mar 18, 2019
Image osquery Move osquery/events/linux/probes/ to osquery/experimental/tracing/linux/ Mar 29, 2019
Image packs detects when a proc is tapping keyboard event (#5345) Jan 15, 2019
Image plugins Remove the rest use cases of createError with message as an arg (#5524) Mar 13, 2019
Image specs chrome_extensions: Add the profile name to the table (#5213) Mar 27, 2019
Image tests Homogenise integration test_name s Mar 26, 2019
Image third-party Make RockDB export ROCKSDB_LITE (#5470) Feb 26, 2019
Image tools Switch to the more common form Mar 29, 2019
Image .buckconfig Move build system to BUCK Dec 7, 2018
Image .clang-format format: Remove Cpp restriction (#3521) Aug 2, 2017
Image .gitignore ux: adding generated buck config to .gitignore (#5423) Feb 7, 2019
Image .travis.yml Enable TravisCI for macOS (#5352) Jan 15, 2019
Image .watchmanconfig watcher: Do not initialize the config in watcher (#3403) Jun 14, 2017
Image BUILD.md Adding testing and fix build instructions on BUILD.md (#5362) Jan 17, 2019
Image CODE_OF_CONDUCT.md Update osquery code of conduct to reference Facebook policy (#5459) Feb 20, 2019
Image CONTRIBUTING.md Cleanup grammar, acronyms in CONTRIBUTING (#5432) Feb 12, 2019
Image Doxyfile Add clang-format rules from 3.6 (#2360) Aug 15, 2016
Image LICENSE Clarify licensing (#4792) Aug 2, 2018
Image LICENSE-Apache-2.0 Clarify licensing (#4792) Aug 2, 2018
Image LICENSE-GPL-2.0 Clarify licensing (#4792) Aug 2, 2018
Image Makefile Move build system to BUCK Dec 7, 2018
Image README.md typo fix, one other wording tweak/update in README.md (#5321) Dec 13, 2018
Image SECURITY.md security: Update SECURITY.md with recent merges (#3787) Oct 5, 2017
Image SUPPORT.md Improve SUPPORT.md (#4835) Aug 8, 2018
Image Vagrantfile Move build system to BUCK Dec 7, 2018
Image mkdocs.yml Removing macOS kernel module (#4572) Jun 17, 2018

README.md

osquery

osquery logo

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework.
Available for Linux, macOS, Windows and FreeBSD.

What is osquery?

osquery exposes an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.

SQL tables are implemented via a simple plugin and extensions API. A variety of tables already exist and more are being written: https://osquery.io/schema. To best understand the expressiveness that is afforded to you by osquery, consider the following SQL queries:

List the users:

SELECT * FROM users;

Check the processes that have a deleted executable:

SELECT * FROM processes WHERE on_disk = 0;

Get the process name, port, and PID, for processes listening on all interfaces:

SELECT DISTINCT processes.name, listening_ports.port, processes.pid
  FROM listening_ports JOIN processes USING (pid)
  WHERE listening_ports.address = '0.0.0.0';

Find every macOS LaunchDaemon that launches an executable and keeps it running:

SELECT name, program || program_arguments AS executable
  FROM launchd
  WHERE (run_at_load = 1 AND keep_alive = 1)
  AND (program != '' OR program_arguments != '');

Check for ARP anomalies from the host's perspective:

SELECT address, mac, COUNT(mac) AS mac_count
  FROM arp_cache GROUP BY mac
  HAVING count(mac) > 1;

Alternatively, you could also use a SQL sub-query to accomplish the same result:

SELECT address, mac, mac_count
  FROM
    (SELECT address, mac, COUNT(mac) AS mac_count FROM arp_cache GROUP BY mac)
  WHERE mac_count > 1;

These queries can be:

  • performed on an ad-hoc basis to explore operating system state using the osqueryi shell
  • executed via a scheduler to monitor operating system state across a set of hosts
  • launched from custom applications using osquery Thrift APIs

Download & Install

To download the latest stable builds and for repository information and installation instructions visit https://osquery.io/downloads.

Build from source

Building osquery from source is encouraged! Check out our contributing guide and join the community on Slack.

License

By contributing to osquery you agree that your contributions will be licensed as defined on the LICENSE file.

Vulnerabilities

We keep track of security announcements in our tagged version release notes on GitHub. We aggregate these into SECURITY.md too.

Facebook has a bug bounty program that includes osquery. If you find a security vulnerability in osquery, please submit it via the process outlined on that page and do not file a public issue. For more information on finding vulnerabilities in osquery, see our blog post Bug Hunting osquery.

Learn more

If you're interested in learning more about osquery read the launch blog post for background on the project, visit the users guide.

Development and usage discussion is happening in the osquery Slack, grab an invite automatically here!

You can’t perform that action at this time.