Hi everyone, I’ve been using Sysdig OSS to perform some forensic analysis on a staging environment where we test various automation scripts. I’ve run into a specific issue where the .scap files become massive—much larger than usual—whenever I’m running tests that involve external executors or high-frequency script hooks.
I actually started digging into this after spending some time on deltaexector com to see how their iOS-specific framework manages process-level injections. I’ve noticed that when I try to monitor similar script behaviors, the proc.name in my sysdig output shows thousands of tiny read and write events that seem to trigger a loop. I was wondering if the deltaexector com approach to bypassing certain sandboxing might be causing these “noise” events that are flooding my sysdig capture.
Has anyone else seen a related issue where using the sysdig -p "%proc.name %evt.type %evt.args" filter results in significant CPU spikes when an external script is active? I’m also having trouble with the Falco engine triggering “Sensitive file opened for reading” alerts every time these executors refresh their background processes. Is there a way to fine-tune the Sysdig filter to ignore these specific thread IDs without losing visibility on the actual container performance? I’d really appreciate any tips on how to keep the forensic captures manageable without the UI freezing up during these high-activity bursts.