Deploying the Management Console in Kubernetes Cluster
Requirements
The system requirements for the ThreatStryker Management Console kubernetes cluster are as follows:
Property | Details |
---|---|
No of nodes | 3 |
CPU: No of cores | 4 |
RAM | 16 GB |
Disk space | At-least 120 GB |
Helm Chart Install
Following helm charts have to be installed
- deepfence-console: pod deployments
- deepfence-router: external facing k8s service - for connecting from browser and sensor agents
Quick start
helm repo add deepfence https://deepfence-helm-charts.s3.amazonaws.com/enterprise
helm install deepfence-console deepfence/deepfence-console \
--set registry.username="<deepfence_username>" \
--set registry.password="<deepfence_password>" \
--set image.tag=3.8.2 \
--set volume.storageClass=default \
--namespace default \
--version=1.5.2
helm install deepfence-router deepfence/deepfence-router \
--namespace default \
--version=1.5.2
kubectl get --namespace default svc deepfence-router -w
Detailed setup instructions
Storage
If cloud managed persistent volume is not available, OpenEBS can be used
kubectl create ns openebs
helm install openebs \
--namespace openebs \
--repo "https://openebs.github.io/charts" openebs \
--set analytics.enabled=false
Storage class for OpenEBS
volume:
storageClass: openebs-hostpath
Metrics server
- Check if metrics server is installed
kubectl get deployment metrics-server -n kube-system
- If not installed, run following command
kubectl apply -f https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml
Deepfence Console Helm Chart
helm repo add deepfence https://deepfence-helm-charts.s3.amazonaws.com/enterprise
- Create values file
helm show values deepfence/deepfence-console --version=1.5.2 > deepfence_console_values.yaml
- Edit values file and set registry username and password
registry:
name: "quay.io"
imagePrefix: "quay.io/"
username: ""
password: ""
- Set image tag
image:
tag: 3.8.2
- (Optional) Set custom ssl certificate.
Certificates should be in the current directory and have names *.key and *.crt. If not set, deepfence provided self-signed certificate will be used.
# Use custom ssl certificate for Deepfence UI
# Copy *.key and *.crt file to current directory (same directory as values.yaml file)
# Supported file extensions are .crt and .key (.pem, .cert not supported)
tls:
certFile: "my_server.crt"
keyFile: "my_server.key"
- Set storage class
Any cloud managed Persistent Volumes can be set here, value will be gp3
or gp2
in AWS and default
or standard
in other clouds.
To get available storage classes, run the following command
kubectl get storageclass
volume:
storageClass: default
- (Optional) Set database
Deepfence uses elasticsearch, postgres, redis, which are deployed in-cluster by default in HA mode. It can be easily configured to use cloud managed databases like RDS for postgres, AWS elasticsearch service for elasticsearch. Set the hostnames and ports accordingly.
Check here to configure cloud-managed database
db:
# Change following values accordingly if using externally managed database
postgresUserDb:
host: deepfence-postgres
port: "5432"
user: "cve"
password: "cve"
dbname: "users"
sslmode: "disable"
elasticsearch:
scheme: "http"
host: deepfence-es
port: "9200"
user: ""
password: ""
redis:
host: deepfence-redis
port: "6379"
- Set container runtime socket path. By default, docker is disabled and containerd is enabled.
To get container runtime in the k8s cluster, run the following command
kubectl get nodes -o=custom-columns=NAME:.metadata.name,Runtime:.status.nodeInfo.containerRuntimeVersion
# Mount container runtime socket path to agent pod. Agent will detect which runtime it is using these files.
mountContainerRuntimeSocket:
dockerSock: false
# Change if socket path is not the following
dockerSockPath: "/var/run/docker.sock"
containerdSock: true
# Change if socket path is not the following
containerdSockPath: "/run/containerd/containerd.sock"
crioSock: false
# Change if socket path is not the following
crioSockPath: "/var/run/crio/crio.sock"
- Install deepfence-console helm chart with values file
helm install -f deepfence_console_values.yaml \
deepfence-console deepfence/deepfence-console \
--namespace default \
--version=1.5.2
- Wait for pods to start up
kubectl get pods -o wide -w
- Get deepfence management console ip
kubectl get --namespace default svc deepfence-router -w
Delete deepfence-console helm chart
helm delete deepfence-console
Deepfence Router Helm Chart
- Create values file
helm show values deepfence/deepfence-router --version=1.5.2 > deepfence_router_values.yaml
- Set cloud provider
# Cloud Provider: aws, azure, gcp, ibm_cloud, open_stack
# cloudProvider is required to set appropriate LoadBalancer annotations
cloudProvider: "aws"
- Set management console port (default: 443)
# Configure port for browser / agents
managementConsolePort: "443"
- Static IP address is recommended in production. Static public ip should be created in the same region/zone/resource group as the cluster.
- AWS:
- Use
awsEipAllocations
field. Create same number of elastic ip addresses as the number of subnets.
- Use
- Azure and Google Cloud:
- Use
loadBalancerIP
field.
- Use
- Self managed kubernetes:
- Use
externalIPs
. Details here.
- Use
- If ip address is not set, kubernetes (cloud managed) will create an ip address, which will be deleted if helm chart is deleted or if
deepfence-router
service is deleted.
Router Service
- By default, LoadBalancer will be
external
- This can be changed to
internal
if all agents can access management console using internal ip address and user has set up ssh tunneling for port 443 from local desktop.
service:
name: deepfence-router
# Select the type of service to be used.
# When exposing the service in an on premisses Kubernetes cluster, select NodePort as type
# Also, possible to use Ingress as type when ingress controller is installed
type: LoadBalancer # NodePort/Ingress
# Nodeport configuration. Only used when selecting NodePort in the service type
nodePortHttps: ""
nodePortHttp: ""
# Using static ip address for load balancer
# - Google Cloud: https://cloud.google.com/kubernetes-engine/docs/tutorials/configuring-domain-name-static-ip
# loadBalancerIP: "1.2.3.4"
# - Azure: https://docs.microsoft.com/en-us/azure/aks/static-ip
# loadBalancerIP: "1.2.3.4"
loadBalancerIP: ""
# - AWS: (v1.16+) https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html#kubernetes-1.16
# Static ip for NLB: awsEipAllocations: "eipalloc-0123456789abcdefg,eipalloc-0123456789hijklmn"
awsEipAllocations: ""
# LoadBalancer type: external or internal
loadBalancerType: "external"
# If loadBalancerType is "external", we recommend setting loadBalancerSourceRanges to the ip address / CIDR ranges
# of your laptop's ip or corporate CIDR range. If this is set empty, ports 443 and 80 will be open to the public internet.
# Example: ["143.231.0.0/16","210.57.79.18/32"]
loadBalancerSourceRanges: []
# ACM SSL certificate for AWS Classic LoadBalancer (This cannot be set if awsEipAllocations is set)
# https://aws.amazon.com/premiumsupport/knowledge-center/terminate-https-traffic-eks-acm/
# Example: "arn:aws:acm:{region}:{user id}:certificate/{id}"
awsLoadBalancerAcmArn: ""
# externalIPs: When kubernetes is not cloud managed, add public ip addresses of kubernetes nodes to externalIPs
externalIPs: []
externalTrafficPolicy: "Cluster"
- Install deepfence-router helm chart with values file
helm install -f deepfence_router_values.yaml \
deepfence-router deepfence/deepfence-router \
--namespace default \
--version=1.5.2
Delete deepfence-router helm chart
helm delete deepfence-router
Deploying on Openshift using Helm
-
Add helm repo:
helm repo add deepfence https://deepfence-helm-charts.s3.amazonaws.com/enterprise
helm repo update
helm search repo deepfence/deepfence-console -
After adding helm repo run below command, this installs router and console
helm install deepfence-console deepfence/deepfence-console \
--set registry.username=<registry_username> \
--set registry.password=<registry_password> \
--set image.tag=3.8.2 \
--set discovery.runConsoleDiscovery=false \
--namespace deepfence-console \
--create-namespace \
--version=1.5.2The Quay registry username and password is provided by email. Check the README inside the package for detailed setup instructions.
helm show readme --version=1.5.2 deepfence/deepfence-console
helm show values --version=1.5.2 deepfence/deepfence-console -
Some components of Deepfence console needs privileged permissions, run below commands to add privileged and anyuid permisions to deepfence-console service account
oc adm policy add-scc-to-user anyuid -z deepfence-console -n deepfence-console
oc adm policy add-scc-to-user privileged -z deepfence-console -n deepfence-console -
To connect to Management console install deepfence-router, this creates a loadbalancer service which can be used to access the console, run below command to install:
helm install deepfence-router deepfence/deepfence-router \
--namespace deepfence-console \
--create-namespace \
--version=1.5.2get the loadbalancer ip using below command
kubectl get --namespace deepfence-console svc deepfence-router -w
-
Openshift provides Route which can be used instead of Loadbalancer
-
to create a route for management console first install deepfence-router helm chart with service type ClusterIP
helm install deepfence-router deepfence/deepfence-router \
--set service.type=ClusterIP \
--namespace deepfence-console \
--create-namespace \
--version=1.5.2 -
get the openshift cluster domain
oc get ingresses.config/cluster -o jsonpath={.spec.domain}
-
create the route.yaml using below sample
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: deepfence-console
namespace: deepfence-console
spec:
host: deepfence-console.<< cluster domain>>
port:
targetPort: https-port
tls:
termination: passthrough
to:
kind: Service
name: deepfence-router
weight: 100
wildcardPolicy: None -
apply the route.yaml using below command:
kubectl apply -f route.yaml
-
Management console will be accessible at the url https://deepfence-console.domain.com
-
-
To delete deepfence console helm chart, run following command:
helm delete deepfence-router -n deepfence-console
helm delete deepfence-console -n deepfence-consoleif route is created
oc delete route -n deepfence-console deepfence-console
or
kubectl delete routes.route.openshift.io -n deepfence-console deepfence-console