Fleet logo
Menu An icon indicating that interacting with this button will open the navigation menu.
Fleet logo An 'X' icon indicating that this can be interacted with to close the navigation menu.
Multi platform
Device management   (+ MDM) Orchestration   (+ monitoring) Software management   (+ CVEs) Integrations

Docs
Stories
News Ask around Meetups Share your story COMPANY
The handbook Testimonials

Pricing Schedule a demo
Multi platform
Device management + MDM Orchestration + monitoring Software management + CVEs, usage, app library Integrations
Docs
Stories
News Ask around Meetups Schedule a demo Share your story COMPANY The handbook Testimonials
Pricing Try it yourself
{{categoryFriendlyName}}/
{{thisPage.meta.articleTitle}}
search

osquery 5.8.1 | Process auditing, stats, and additional tables

{{articleSubtitle}}

| The author's GitHub profile picture

JD Strong

Share this article on Hacker News Share this article on LinkedIn Share this article on Twitter

On this page

{{topic.title}}
Docs Docs REST API REST API Guides Guides Talk to an engineer Talk to an engineer
Suggest an editSuggest an edit

Try it out

See what Fleet can do

Start now
macOS Windows Linux

osquery 5.8.1 | Process auditing, stats, and additional tables

{{articleSubtitle}}

| The author's GitHub profile picture

JD Strong

Osquery 5.8.1 | Process auditing, stats, and additional tables.

osquery 5.8.1

Osquery 5.8 introduces process auditing on Windows, statistics for live queries, and additional tables. 🟣 Openness is a key Fleet value. We welcome contributions to Fleet and find ways to contribute to other open-source projects. When you support Fleet, you are also contributing to projects like osquery. Let’s take a look at the changes in this latest release.

Please note that osquery 5.8 has already been pushed to Fleet’s stable and edge auto-update channels.

Windows process_etw_events table

This PR introduces POTE (Programmable OS Tracing Engine) framework + a new windows evented table called etw_process_events which is built on top of POTE. The primary purpose of this new evented table is to audit process creation and termination on Windows. Having POTE in place will simplify the addition of future evented tables as POTE provides a simplified mechanism to create ETW-based Event publishers.

The Windows process_etw_events table brings osquery towards parity with System Monitor (Sysmon). Sysmon is a common add-on for Windows logging. With Sysmon, you can detect malicious activity by tracking code behavior and network traffic. Sysmon is part of the Sysinternals package and is owned by Microsoft.

Fleetie, Marcos contributed this pull request to the osquery project.

Live query statistics

This PR creates a new top-level stats key when writing a distributed query response. This includes the data in QueryPerformance class, indexed by the query ID in the server's read endpoint. A new stats JSON subkey exposes the stats key in the distributed query response. Performance stats are not stored. When a query executes, the stats for that execution are returned.

The addition of stats unlocks future work in Fleet that will enable performance stats for live queries and policies.

Fleetie, Artemis contributed this pull request to the osquery project.

Add pid_with_namespace for yara table

On October 25, the OpenSSL project team announced a security fix for a critical vulnerability in OpenSSL version 3.x. The patch was released on November 1, 2022. Akamai released a blog post with a YARA-based rule, helping Sysadmins find processes running with vulnerable OpenSSL versions. OpenSSL process identification works well for processes on the host OS but breaks down for processes inside containers.

This change adds the pid_with_namespace column to the YARA table in osquery, allowing for querying within containers using the yara table.

Unit_file_state column in systemd_units table

This change adds a new column to the systemd_units table to determine if a systemd service is in one of several enabled states, such as enabled or masked. This allows for discovering running processes that could have potential security implications. Previously, determining if a service was enabled was not possible in osquery.

Fleetie, Artemis contributed this pull request to the osquery project.

Bpf_process_events_v2 table

An initial experiment has been included, called linuxevents. This PR adds a new bpf_process_events_v2 table, a better, container-aware version of the built-in bpf_process_events. The new functionality is considered experimental and must be explicitly enabled with --experiment_list=linuxevents.

Key features:

  1. The table now traces internal kernel structures (i.e., task_struct) to capture all the data. We no longer need to trace system calls and keep track of file descriptors.
  2. Significantly lower memory and CPU usage.
  3. Container aware: contains both the container ID and container backend name (currently only supports podman).
  4. Uses the BTF kernel debug symbols: no kernel headers required!

macOS secureboot table

This PR adds support for macOS (Intel-based) hardware that have a secure enclave and support secure boot. This PR extends the secureboot schema from boolean to the following: Secure mode for Intel-based macOS: 0 disabled, 1 full security, 2 medium security.

Linux kernel_keys table

This PR adds a new table called kernel_keys for Linux. This table exposes the content of the file /proc/keys,

this file exposes a list of the keys for which the reading thread has view permission, providing various information about each key.

Cached_memory column in docker_container_stats

The docker container memory usage is not in sync with docker CLI which subtracts the cached memory from the used memory. A new cached_memory column has been added to docker_container_stats to retrieve the cached container memory to provide more detailed information about container memory usage.

Fleet logo
Multi platform Device management Orchestration Software management Integrations Pricing
Documentation Support Docs API Release notes Get your license
Company About News Jobs Logos/artwork Why open source?
ISO 27001 coming soon a small checkmarkSOC2 Type 2 Creative Commons Licence CC BY-SA 4.0
© 2025 Fleet Inc. Privacy
Slack logo GitHub logo LinkedIn logo X (Twitter) logo Youtube logo Mastadon logo
Tried Fleet yet?

Get started with Fleet

Start
continue
×