All Projects → aquasecurity → aqua-helm

aquasecurity / aqua-helm

Licence: Apache-2.0 license
Helm Charts For Installing Aqua Security Components

Programming Languages

Mustache
554 projects
Smarty
1635 projects
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to aqua-helm

memory signature
A small wrapper class providing an unified interface to search for various memory signatures
Stars: ✭ 69 (+1.47%)
Mutual labels:  scanner
rc-scanner
Remote control your police scanner
Stars: ✭ 22 (-67.65%)
Mutual labels:  scanner
vault-charts
Charts to deploy Hashicorp Vault in Kubernetes
Stars: ✭ 15 (-77.94%)
Mutual labels:  helm-charts
sslscanner
SSL Scanner written in Crystal
Stars: ✭ 18 (-73.53%)
Mutual labels:  scanner
scanbot-sdk-example-ios
No description or website provided.
Stars: ✭ 17 (-75%)
Mutual labels:  scanner
BypassSuper
Bypass 403 or 401 or 404
Stars: ✭ 81 (+19.12%)
Mutual labels:  scanner
cattlectl
gain control over your ranch
Stars: ✭ 33 (-51.47%)
Mutual labels:  helm-charts
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-66.18%)
Mutual labels:  scanner
Helm-Cheat-Sheet
A cheat sheet for Helm commands.
Stars: ✭ 72 (+5.88%)
Mutual labels:  helm-charts
pnscan
Peter's Parallel Network Scanner
Stars: ✭ 117 (+72.06%)
Mutual labels:  scanner
flex-bison-indentation
An example of how to correctly parse python-like indentation-scoped files using flex (and bison).
Stars: ✭ 32 (-52.94%)
Mutual labels:  scanner
polscan
Zero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (-16.18%)
Mutual labels:  scanner
heimdall
Ethereum Smart Contracts Security Monitoring
Stars: ✭ 18 (-73.53%)
Mutual labels:  scanner
sgCheckup
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+13.24%)
Mutual labels:  scanner
request smuggler
Http request smuggling vulnerability scanner
Stars: ✭ 203 (+198.53%)
Mutual labels:  scanner
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+602.94%)
Mutual labels:  scanner
charts
Fairwinds helm chart repository
Stars: ✭ 99 (+45.59%)
Mutual labels:  helm-charts
metahelm
Install dependency graphs of Kubernetes Helm Charts
Stars: ✭ 70 (+2.94%)
Mutual labels:  helm-charts
Inventory Kamera
Scans Genshin Impact characters, artifacts, and weapons from the game window into a JSON file.
Stars: ✭ 348 (+411.76%)
Mutual labels:  scanner
charts
Helm charts for creating reproducible and maintainable deployments of Polyaxon with Kubernetes.
Stars: ✭ 32 (-52.94%)
Mutual labels:  helm-charts

Overview

This page contains instructions for deploying Aqua Enterprise in a Kubernetes cluster, using the Helm package manager.

Refer to the Aqua Enterprise product documentation for the broader context: Kubernetes with Helm Charts.

Contents

Helm charts

This repository includes the following charts; they can be deployed separately:

Chart Description Latest Chart Version
Server Deploys the Console, Database, and Gateway components; optionally deploys Envoy component 2022.4.7
Enforcer Deploys the Aqua Enforcer daemonset 2022.4.6
Scanner Deploys the Aqua Scanner deployment 2022.4.1
KubeEnforcer Deploys Aqua KubeEnforcer 2022.4.9
Gateway Deploys the Aqua Standalone Gateway 2022.4.7
Tenant-Manager Deploys the Aqua Tenant Manager 2022.4.0
Cyber Center Deploys Aqua CyberCenter offline for air-gap environment 2022.4.1
Cloud Connector Deploys the Aqua Cloud Connector 2022.4.0
QuickStart Not for production use (see below). Deploys the Console, Database, Gateway and KubeEnforcer components 2022.4.0
Codesec-Agent Argon Broker Deployment 1.0.9

Deployment instructions

Aqua Enterprise deployments include the following components:

  • Server (Console, Database, and Gateway)
  • Enforcer
  • KubeEnforcer
  • Scanner (Optional)

Follow the steps in this section for production-grade deployments. You can either clone the aqua-helm git repo or you can add our Helm private repository (https://helm.aquasec.com).

(Optional) Add the Aqua Helm repository

  1. Add the Aqua Helm repository to your local Helm repos by executing the following command:
helm repo add aqua-helm https://helm.aquasec.com
helm repo update
  1. Search for all components of the latest version in our Aqua Helm repository
For Helm 2.x
helm search aqua-helm
# Examples
helm search aqua-helm --versions
helm search aqua-helm --version 2022.4
For Helm 3.x
helm search repo aqua-helm
# Examples
helm search repo aqua-helm --versions
helm search repo aqua-helm --version 2022.4

Example output:

NAME                            CHART VERSION   APP VERSION     DESCRIPTION
aqua-helm/codesec-agent         1.0.9           2022.4          A Helm chart for the Argon Broker Deployment
aqua-helm/cloud-connector       2022.4.0        2022.4          A Helm chart for Aqua Cloud-Connector
aqua-helm/cyber-center          2022.4.1        2022.4          A Helm chart for Aqua CyberCenter
aqua-helm/enforcer              2022.4.6        2022.4          A Helm chart for the Aqua Enforcer
aqua-helm/gateway               2022.4.7        2022.4          A Helm chart for the Aqua Gateway
aqua-helm/kube-enforcer         2022.4.9        2022.4          A Helm chart for the Aqua KubeEnforcer Starboard
aqua-helm/scanner               2022.4.1        2022.4          A Helm chart for the Aqua Scanner CLI component
aqua-helm/server                2022.4.7        2022.4          A Helm chart for the Aqua Console components
aqua-helm/tenant-manager        2022.4.0        2022.4          A Helm chart for the Aqua Tenant Manager

Deploy the Helm charts

  1. Add Aqua Helm Repository

    helm repo add aqua-helm https://helm.aquasec.com
    helm repo update
    

    Check for available chart versions either from Changelog or by running the below command.

    helm search repo aqua-helm/enforcer --versions
    

    Create the aqua namespace.

    kubectl create namespace aqua

    Create aqua-registry secret

    kubectl create secret docker-registry aqua-registry-secret \
     --docker-server=registry.aquasec.com \
     --docker-username=$YOUR_REGISTRY_USER \
     --docker-password=$YOUR_REGISTRY_PASSWORD \
     -n aqua
    
  2. Deploy the Server chart.

    helm upgrade --install --namespace aqua aqua aqua-helm/server --version $VERSION \
    --set imageCredentials.create=false \
    --set global.platform=$PLATFORM
    
  3. Deploy the Enforcer chart.

    helm upgrade --install --namespace aqua aqua-enforcer aqua-helm/enforcer --version $VERSION \
    --set imageCredentials.create=false \
    --set global.platform=$PLATFORM
    
  4. Deploy the KubeEnforcer chart.

    helm upgrade --install --namespace aqua kube-enforcer aqua-helm/kube-enforcer --version $VERSION \
    --set global.platform=$PLATFORM \
    --set certsSecret.autoGenerate=true
    
  5. (Optional) Deploy the Scanner chart.

    helm upgrade --install --namespace aqua scanner aqua-helm/scanner --version $VERSION \
    --set user=$AQUA_CONSOLE_USERNAME \
    --set password=$AQUA_CONSOLE_PASSWORD
    
  6. Gateway is Deployed by default with Server chart, advanced Gateway Deployment options can be found Here.

  7. (Optional) Deploy the TenantManager chart.

    helm upgrade --install --namespace aqua tenant-manager aqua-helm/tenant-manager --version $VERSION \
    --set platform=$PLATFORM
    
  8. (Optional) Deploy the Cyber-Center chart.

    helm upgrade --install --namespace aqua aqua-cyber-center aqua-helm/cyber-center --version $VERSION \
    --set imageCredentials.create=false
    
  9. (Optional) Deploy the Cloud-Connector chart.

    helm upgrade --install --namespace aqua aqua-cloud-connector aqua-helm/cloud-connector --version $VERSION \
    --set userCreds.username=$AQUA_CONSOLE_USERNAME \
    --set userCreds.password=$AQUA_CONSOLE_PASSWORD \
    --set authType.tokenAuth=false \
    --set authType.userCreds=true
    
  10. Access the Aqua UI in browser with {{ .Release.Name }}-console-svc service and port, to check the service details:

    kubectl get svc -n aqua
    • Example:
      • http://< Console IP/DNS >:8080* (default access without SSL) or
      • https://< Console IP/DNS >:443* (If SSL configured to console component in server chart)

Troubleshooting

This section not all-inclusive. It describes some common issues that we have encountered during deployments.

Error 1

  • Error message: UPGRADE/INSTALL FAILED, configmaps is forbidden.
  • Example:
Error: UPGRADE FAILED: configmaps is forbidden: User "system:serviceaccount:kube-system:default" cannot list configmaps in the namespace "kube-system"
  • Solution: Create a service account for Tiller to utilize.
kubectl create serviceaccount --namespace kube-system tiller
kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller
kubectl patch deploy --namespace kube-system tiller-deploy -p '{"spec":{"template":{"spec":{"serviceAccount":"tiller"}}}}'
helm init --service-account tiller --upgrade

Error 2

  • Error message: No persistent volumes available for this claim and no storage class is set.
  • Solution: Most managed Kubernetes deployments do NOT include all possible storage provider variations at setup time. Refer to the official Kubernetes guidance on storage classes for your platform. For more information see the storage documentation.

Error 3

  • Error message: When executing kubectl get events -n aqua you might encounter either No persistent volumes available for this claim and no storage class is set or PersistentVolumeClaim is not bound.
  • Solution: If you encounter either of these errors, you need to create a persistent volume prior to chart deployment with a generic or existing storage class. Specify db.persistence.storageClass in the values.yaml file. A sample file using aqua-storage is included in the repo.
kubectl apply -f pv-example.yaml

Quick-start deployment (not for production purposes)

Quick-start deployments are fast and easy. They are intended for deploying Aqua Enterprise for non-production purposes, such as proofs-of-concept (POCs) and environments intended for instruction, development, and test.

Use the aqua-quickstart chart to

  1. Clone the GitHub repository
git clone https://github.com/aquasecurity/aqua-helm.git
cd aqua-helm/
  1. Create the aqua namespace.
kubectl create namespace aqua
  1. Deploy aqua-quickstart chart
helm upgrade --install --namespace aqua aqua ./aqua-quickstart --set imageCredentials.username=<>,imageCredentials.password=<>

Issues and feedback

If you encounter any problems or would like to give us feedback on deployments, we encourage you to raise issues here on GitHub.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].