Traffic Capture Settings
The tap
section in your Qtap configuration controls what traffic is captured and how it's processed. This section provides fine-grained control over which network connections to monitor, what traffic to include or exclude, and how to apply different processing stacks to specific domains.
Basic Configuration
Here's the structure of a basic tap
configuration:
Traffic Direction Settings
The direction
parameter controls which traffic flows Qtap captures:
egress
Captures all outgoing traffic (both internal and external)
egress-external
Only captures traffic to external networks
egress-internal
Only captures traffic within internal networks
Network Interface Settings
Loopback Traffic
The ignore_loopback
parameter controls whether traffic on the loopback interface (localhost) is captured:
When set to
true
, traffic to addresses like127.0.0.1
orlocalhost
is ignoredWhen set to
false
, local traffic is included in capture
DNS Traffic
The audit_include_dns
parameter controls whether DNS queries are captured:
This is useful for:
Troubleshooting DNS resolution issues
Tracking which domains your applications are trying to reach
Identifying potential DNS-based data exfiltration
Process Filtering
The filters
section allows you to control which processes Qtap monitors:
Predefined Process Groups
The groups
parameter allows you to ignore specific types of processes:
kubernetes
Standard Kubernetes processes
container
Container runtime processes
gke
Google Kubernetes Engine processes
eks
Amazon Elastic Kubernetes Service processes
qpoint
Qpoint's own processes (prevents self-monitoring)
When a group is included in the list, traffic from those processes is ignored.
Custom Process Filters
The custom
parameter allows you to define specific processes to ignore:
Each entry requires:
exe
: The executable pathstrategy
: Matching strategy, which can be:exact
: Exact path matchprefix
: Path prefix matchregex
: Regular expression match
Domain-Specific Rules
The endpoints
section allows you to apply different processing stacks to specific domains or patterns:
Each endpoint entry consists of:
domain
: The domain pattern to match (supports wildcards)http.stack
: The stack to apply for matching HTTP traffic
This allows you to:
Apply detailed logging to specific APIs
Handle sensitive traffic differently
Focus debugging efforts on problematic domains
Complete Example
Here's a comprehensive example that demonstrates all the main features:
This configuration:
Captures all outgoing traffic (
direction: egress
)Ignores localhost traffic (
ignore_loopback: true
)Includes DNS queries in audit logs (
audit_include_dns: true
)Applies the
default_stack
to most HTTP trafficIgnores traffic from Kubernetes and Qpoint processes
Ignores traffic from specific executables (wget, curl)
Applies the
debug_stack
to all traffic to GitHub and Google domains
Last updated