Build Deepfence ThreatMapper from Source
Prerequisites
Build host:
- 16 Gb RAM, 4 cores to build and run the Deepfence Management Console
- Packages: build tools,
golang
,docker
,docker-compose
If necessary, enable docker for the user account that will build the Deepfence containers:
sudo usermod -aG docker $USER # start new shell, or 'su $USER' for group change to take effect
Building the Container Images
git clone https://github.com/deepfence/ThreatMapper.git
cd ThreatMapper
make
The build process will create a number of container images and store these in your local Docker repository.
Running the Deepfence Management Console on the local machine
cd ThreatMapper/deployment-scripts
docker-compose -f docker-compose.yml up --detach
Once started, you can point a web browser at https://--IP-ADDRESS---/
to register a first user on the Deepfence Management Console. See Initial Configuration for more information.
To stop the Deepfence Management Console:
docker-compose -f docker-compose.yml down
Push the images to a remote repository
If you plan to deploy the Management Console or Sensors (deepfence_agent_ce
and deepfence_cluster_agent_ce
) on another host, you should push the images to a suitable, accessible repository:
For example, to push the images to DockerHub:
ACC=myorg # the name of the dockerhub account
docker login -u $ACC # log in to the account
for IMG in \
deepfence_redis_ce \
deepfence_postgres_ce \
deepfence_kafka_broker_ce \
deepfence_router_ce \
deepfence_file_server_ce \
deepfence_server_ce \
deepfence_worker_ce \
deepfence_ui_ce \
deepfence_agent_ce \
deepfence_cluster_agent_ce \
deepfence_package_scanner_ce \
deepfence_malware_scanner_ce \
deepfence_secret_scanner_ce \
deepfence_neo4j_ce
do
docker tag deepfenceio/$IMG $ACC/$IMG:latest
docker push $ACC/$IMG:latest
done