Skip to content

Latest commit

 

History

History
113 lines (89 loc) · 7.69 KB

File metadata and controls

113 lines (89 loc) · 7.69 KB

Helm Chart - Falcon Integration Gateway

Falcon Integration Gateway (FIG) forwards threat detection findings from CrowdStrike Falcon platform to the backend of your choice. Consult the project page to learn more about its capabilities. This document describes a helm chart that can be used to deploy the FIG in various configurations.

Dependencies

  1. Requires a Kubernetes cluster
  2. Helm 3.x is installed and supported by the Kubernetes vendor.
  3. Must be a CrowdStrike customer
  4. At least one backend prepared to ingest events

Configuration Options

The following tables lists the Falcon Sensor configurable parameters and their default values.

Parameter Description Default
falcon.client_id CrowdStrike API Client ID None (Required)
falcon.client_secret CrowdStrike API Client Secret None (Required)
falcon.cloud_region CrowdStrike Cloud Region (us-1, us-2, eu-1, us-gov-1) None (Required)
falcon.integration_gateway.application_id Unique string for each FIG instance within your CID helm-chart-default
falcon.integration_gateway.level Logging level (ERROR, WARN, INFO, DEBUG) INFO
falcon.integration_gateway.severity_threshold Filter events based on severity (1-5) 2
falcon.integration_gateway.older_than_days_threshold Filter events based on age in days 14
falcon.integration_gateway.detections_exclude_clouds Exclude events based on cloud origination None
falcon.integration_gateway.worker_threads Number of FIG application threads to process events 4
push.aws_security_hub.enabled Enable event forwarding to AWS Security Hub false
push.aws_security_hub.region AWS Region None
push.azure_log_analytics.enabled Enable event forwarding to Azure Log Analytics false
push.azure_log_analytics.workspace_id None
push.azure_log_analytics.primary_key None
push.azure_log_analytics.arc_autodiscovery false
push.chronicle.enabled Enable event forwarding to Google Chronicle false
push.chronicle.region None
push.chronicle.security_key None
push.cloudtrail_lake.enabled Enable event forwarding to AWS CloudTrail Lake false
push.cloudtrail_lake.channel_arn CloudTrail Lake Channel for sending events None
push.cloudtrail_lake.region AWS Region None
push.gcp_security_command_center.enabled Enable event forwarding to GCP Security Command Center false
push.vmware_workspace_one.enabled Enable event forwarding to VMware Workspace ONE false
push.vmware_workspace_one.syslog_host None
push.vmware_workspace_one.syslog_port None
push.vmware_workspace_one.token None
serviceAccount.annotations Annotations for serviceAccount {}

Installation

API Scopes

  • Obtain OAuth2 API credentials for CrowdStrike Falcon
    • Navigate to API Clients and Keys within CrowdStrike Falcon platform.
    • Use Add new API client button in the top right corner to create a new key pair
    • Make sure only the following permissions are assigned to the key pair:
      • Event streams: [Read]
      • Hosts: [Read]

Consult the backend guides for additional API scopes that may be required.

Helm Chart

The helm chart is under active development. Contributors are welcomed to install either directly from the git repository or from the helm repository.

Installation from Helm Repository

  1. Add the CrowdStrike Falcon Helm repository

    helm repo add crowdstrike https://crowdstrike.github.io/falcon-helm
  2. Update the local Helm repository Cache

    helm repo update
  3. Example install with Azure Log Analytics enabled:

    helm upgrade --install falcon-fig crowdstrike/falcon-integration-gateway -n falcon-integration-gateway --create-namespace \
         --set falcon.client_id=$FALCON_CLIENT_ID \
         --set falcon.client_secret=$FALCON_CLIENT_SECRET \
         --set falcon.cloud_region=$FALCON_CLOUD \
         --set push.azure_log_analytics.enabled=true \
         --set push.azure_log_analytics.workspace_id=1234ab-cdef-abc7d-acdb-82321223 \
         --set push.azure_log_analytics.primary_key=ASDFzxy/vgC/m6HKOY6bqi5g==
  4. Alternative example install with AWS Security Hub enabled:

    helm upgrade --install falcon-fig crowdstrike/falcon-integration-gateway -n falcon-integration-gateway --create-namespace \
         --set falcon.client_id=$FALCON_CLIENT_ID \
         --set falcon.client_secret=$FALCON_CLIENT_SECRET \
         --set falcon.cloud_region=$FALCON_CLOUD \
         --set push.aws_security_hub.enabled=true \
         --set push.aws_security_hub.region="eu-west-2" \
         --set serviceAccount.annotations."eks.amazonaws.com/role-arn"="arn:aws:iam::12345678910:role/fig-demo-J78KUNY32R1"

Installation directly from Git

Example run with Azure Log Analytics enabled:

helm install -n test --create-namespace --generate-name ./falcon-integration-gateway \
     --set falcon.client_id=$FALCON_CLIENT_ID \
     --set falcon.client_secret=$FALCON_CLIENT_SECRET \
     --set falcon.cloud_region=$FALCON_CLOUD \
     --set push.azure_log_analytics.enabled=true \
     --set push.azure_log_analytics.workspace_id=1234ab-cdef-abc7d-acdb-82321223 \
     --set push.azure_log_analytics.primary_key=ASDFzxy/vgC/m6HKOY6bqi5g==