Created on
01-15-2025
08:37 AM
Edited on
01-16-2025
12:20 AM
By
Jean-Philippe_P
Description | This article describes how to integrate a server MicroK8S with the FortiCNAPP agent |
Scope | Lacework, FortiCNAPP. |
Solution |
The usage of a product like MicroK8s for production scopes can be considered debatable but in some scenarios where budget limitations exist, or the application requirements are relatively simple, MicroK8s can be more than adequate.
In a productive deployment, MicroK8s can be just a small component of a more complex infrastructure, and it can be integrated with Lacework/FortiCNAPP even if the support can be in a sort of grey area.
Once the MicroK8s is up and running, verify the cluster-name via the command:
$ microk8s kubectl config view Before installing the agent on the Kubernetes host, an access token must be generated following the official documentation. Once the token has been generated, it must be used in the following command to install the agent: $ helm upgrade --install lacework-agent lacework/lacework-agent \
The command above must succeed. It is important to notice that the serverUrl can be different in some deployments the official documentation shows all the possible values for serverUrl. The last part for making the integration fully operational is to add the correct tags in the config.json. To achieve this last step, a YAML file with the following shape must be edited as per documentation:
apiVersion: v1
Let's call this file lacework-cfg-k8s.yaml, to inject it in the deployment the following command can be performed:
$ microk8s kubectl replace -f lacework-cfg-k8s.yaml -n lacework
Once this is done, it could take up to one hour to see the cluster in the Lacework/FortiCNAPP workload. Once the shape of the Lacework/FortiCNAPP GUI occurs, it would be something like the following:
|