-
Notifications
You must be signed in to change notification settings - Fork 597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Helm support for AWS Account posture scanner #2024
Comments
I understand the need of having cloud-scanner as a part of console/agent deployment. Currently we don't have it, but we can look into it. |
@ibreakthecloud @gnmahanth I appreciate you looking into this. As far as i can see the way i have it running at the moment is working successfully. The only niggle with it is that the Account ID that its showing in the console is the Instance ID of the node the pod is running on. Is there a way that can be overridden via an environment variable or a command arg or something? |
@lumattr thanks for reporting the issue, there is no support for running cloud scanner on kubernetes we are looking into it cc: @ibreakthecloud @jatin-baweja Steps to reproduce the issue
---
apiVersion: v1
kind: Secret
metadata:
name: console-details
type: Opaque
stringData:
deepfenceKey: "<deepfence key>"
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: cloud-scanner
name: cloud-scanner
spec:
replicas: 1
selector:
matchLabels:
app: cloud-scanner
template:
metadata:
labels:
app: cloud-scanner
spec:
serviceAccountName: cloud-scanner
containers:
- image: deepfenceio/cloud-scanner:2.1.1
name: cloud-scanner
args:
- "-mode"
- "service"
- "-mgmt-console-url"
- <console url>
- "-debug"
- "true"
- "-cloud-audit-log-ids"
- arn:aws:cloudtrail:<aws region>:<account id>:trail/trail
env:
- name: DEEPFENCE_KEY
valueFrom:
secretKeyRef:
name: "console-details"
key: "deepfenceKey"
resources:
requests:
cpu: 1000m
memory: 2048Mi
limits:
cpu: 4000m
memory: 8192Mi logs:
|
Additional context
It would be great if the AWS account scanner would be deployed in helm. I Appreaciate that it takes additional effort due to the need to have a Service account and an IAM role attached, but as i have the console and agents already in K8s its awkward to have a seperate ECS cluster for the account scanner.
Is your feature request related to a problem? Please describe.
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
Describe the solution you'd like
Ideally it would be a helm chart that would run the cloud-scanner image, and would require me as the end user to create a role with the needed policy, attach that to a service account and pass that to the helm chart.
Describe alternatives you've considered
This could be a terraform module, but that wouldnt work for me specifically as we use CDK in house.
Components/Services
Additional context
This is how i am deploying it at the moment:
cloudscanner.ts
The text was updated successfully, but these errors were encountered: