Pulsar is an event-driven framework for monitoring the activity of Linux devices at runtime, powered by eBPF.
The Pulsar core modules use eBPF probes to collect events from the kernel in a safe and efficient way. Pulsar events can be categorized in the four main following areas:
- File I/O: I/O operations on disk and memory.
- Network: data from the network stack.
- Processes: processes information, including file execution and file opening.
- System Activity: device activity, including system calls.
Pulsar is built with a modular design that makes it easy to adapt the core architecture to new use cases, create new modules or write custom rules.
Warning
A kernel 5.5 or higher with BPF and BTF enabled is required. Visit the official Pulsar website for the full requirements and installation options available.
To download and install Pulsar, run the following in your terminal:
curl --proto '=https' --tlsv1.2 -sSf https://raw.githubusercontent.com/Exein-io/pulsar/main/pulsar-install.sh | sh
Launch the pulsar daemon in a terminal with administrator privileges:
pulsard
That's pretty much it. At this point Pulsar is actively monitoring the activity of all the target processes, and checking it against the set of security policies defined in the rules file. You can test this by triggering a threat event, for example running the following command in another terminal:
ln -s /etc/shadow /tmp/secret
In the pulsar terminal you should see something similar to:
Event { header: Header { pid: 498, is_threat: true, source: ModuleName("rules-engine"), timestamp: SystemTime { tv_sec: 1667920537, tv_nsec: 113401482 }, image: "/usr/bin/ln", parent: 487, fork_time: SystemTime { tv_sec: 1667920537, tv_nsec: 102790045 } }, payload: RuleEngineDetection { rule_name: "Create sensitive files symlink", payload: FileLink { source: "/tmp/secret", destination: "/etc/shadow", hard_link: false } } }
As you can see from the is_threat
field set to true
, Pulsar is correctly identifying the symbolic link creation as a threat event.
Behind the scenes, when an application performs an operation, it gets intercepted at kernel level by the Pulsar BPF probes, turned into a unique event object and sent to the userspace. There, the Pulsar rule engine processes the event against the set of rules defined in the rules file and, if there is a match, it emits a new event, marked as a threat. Finally a logger module prints threat events to the terminal.
In the example above, the event produced matched the following rule:
- name: Read sensitive file
type: FileOpened
condition: (payload.filename IN ["/etc/shadow", "/etc/sudoers", "/etc/pam.conf", "/etc/security/pwquality.conf"] OR payload.filename STARTS_WITH "/etc/sudoers.d/" OR payload.filename STARTS_WITH "/etc/pam.d/") AND (payload.flags CONTAINS "O_RDONLY" OR payload.flags CONTAINS "O_RDWR")
The recommended approach to getting started with Pulsar is by using the official installations script. Follow the guide in the Quickstart section.
Another approach to install Pulsar is by using a pre-built binary. Binaries are available for the latest release. Use pulsar-exec
for x86-64 (pulsar-exec-static
for a static build) or pulsar-exec-static-aarch64
for AArch64 platform. Using there approach you also need to download and setup the helper scripts to have a more convenient way to start in daemon/cli mode.
We do not recommend build Pulsar from source. Building from source is only necessary if you wish to make modifications. If you want to play with the source code check the Developers section of the documentation.
- Read the docs: understand how to install and set up Pulsar.
- Concepts: dive deep into Pulsar architecture and main concepts.
- Tutorials: learn how to use Pulsar with practical examples.
- Develop new eBPF modules: build new eBPF probes and integrate them into Pulsar through the modules system;
- Roadmap: check out the plan for next Pulsar releases;
- Support: join the Discord server for community support.
If you're interested in contributing to Pulsar — thank you!
We have a contributing guide which will help you getting involved in the project. Also check the Developers section of the documentation for more information on Pulsar development.
Join the Pulsar Discord server to chat with developers, maintainers, and the whole community. You can also drop any question about Pulsar on the official GitHub discussions or use the GitHub issues for feature requests and bug reports.
Pulsar is licensed under two licenses — Pulsar userspace code is licensed under APACHE-2.0. Pulsar eBPF probes are licensed under GPL-2.0.