Github url

osquery

by osquery

osquery /osquery

SQL powered operating system instrumentation, monitoring, and analytics.

16.9K Stars 2.0K Forks Last release: 16 days ago (4.4.0) Other 5.5K Commits 105 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

osquery

osquery logo

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework.
Available for Linux, macOS, Windows, and FreeBSD.

Information and resources- Homepage: https://osquery.io - Downloads: https://osquery.io/downloads - Documentation: https://osquery.readthedocs.org - Stack Overflow: https://stackoverflow.com/questions/tagged/osquery - Table Schema: https://osquery.io/schema - Query Packs: https://osquery.io/packs- Slack: Slack Status- Build Status: Build Status Coverity Scan Build Status Documentation Status- CII Best Practices: CII Best Practices

What is osquery?

osquery exposes an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.

SQL tables are implemented via a simple plugin and extensions API. A variety of tables already exist and more are being written: https://osquery.io/schema. To best understand the expressiveness that is afforded to you by osquery, consider the following SQL queries:

List the [

users

](https://osquery.io/schema/current#users):

sql SELECT \* FROM users;

Check the [

processes

](https://osquery.io/schema/current#processes) that have a deleted executable:

sql SELECT \* FROM processes WHERE on\_disk = 0;

Get the process name, port, and PID, for processes listening on all interfaces:

sql SELECT DISTINCT processes.name, listening\_ports.port, processes.pid FROM listening\_ports JOIN processes USING (pid) WHERE listening\_ports.address = '0.0.0.0';

Find every macOS LaunchDaemon that launches an executable and keeps it running:

sql SELECT name, program || program\_arguments AS executable FROM launchd WHERE (run\_at\_load = 1 AND keep\_alive = 1) AND (program != '' OR program\_arguments != '');

Check for ARP anomalies from the host's perspective:

SELECT address, mac, COUNT(mac) AS mac\_count FROM arp\_cache GROUP BY mac HAVING count(mac) \> 1;

Alternatively, you could also use a SQL sub-query to accomplish the same result:

SELECT address, mac, mac\_count FROM (SELECT address, mac, COUNT(mac) AS mac\_count FROM arp\_cache GROUP BY mac) WHERE mac\_count \> 1;

These queries can be: * performed on an ad-hoc basis to explore operating system state using the osqueryi shell * executed via a scheduler to monitor operating system state across a set of hosts * launched from custom applications using osquery Thrift APIs

Download & Install

To download the latest stable builds and for repository information and installation instructions visithttps://osquery.io/downloads.

Build from source

Building osquery from source is encouraged! Check out our build guide. Also check out our contributing guide and join the community on Slack.

License

By contributing to osquery you agree that your contributions will be licensed as defined on the LICENSE file.

Vulnerabilities

We keep track of security announcements in our tagged version release notes on GitHub. We aggregate these into SECURITY.mdtoo.

Learn more

The osquery documentation is availableonline. Documentation for older releases can be found by version number, as well.

If you're interested in learning more about osquery read the launch blog postfor background on the project, visit the users guide.

Development and usage discussion is happening in the osquery Slack, grab an invitehere!

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.