Skip to content

Latest commit

 

History

History
71 lines (53 loc) · 2.69 KB

README.md

File metadata and controls

71 lines (53 loc) · 2.69 KB

Packer Plugin KubeArmor

A plugin for KubeArmor which provides KubeArmor Hardening Host Security policies for the build workloads.

KubeArmor is a security solution for the Kubernetes and cloud native platforms that helps protect your workloads from attacks and threats. It does this by providing a set of hardening policies that are based on industry-leading compliance and attack frameworks such as CIS, MITRE, NIST-800-53, and STIGs. These policies are designed to help you secure your workloads in a way that is compliant with these frameworks and recommended best practices.

Installation

Since we do not have a release currently so we have to build the provisioner and use it.

  1. Clone the repo.
  2. Run make build.
  3. Configure the Packer_PLUGIN_PATH - export PACKER_PLUGIN_PATH=~/go/src/github.com/packer-plugin-kubearmor.
  4. Run packer init .
  5. Run packer build <file>.hcl.

Requirements

In order to use the provided KubeArmor Host Security Policies by the provisioner the build also needs to have KubeArmor and other tools and dependencies required. For installing KubeArmor and ensuring all the dependencies are met we are providing an ansible playbook which could be used with ansible provisioner.

NOTE : Please ensure that the user which executes the ansible playbook doesn't require password.

Example

packer {
  required_plugins {
    virtualbox-ovf = {
      source  = "github.com/hashicorp/virtualbox"
      version = "~> 1"
    }
    ansible = {
      source  = "github.com/hashicorp/ansible"
      version = "~> 1"
    }
    kubearmor = {
      version = ">= 0.0.1"
      source = "github.com/hashicorp/kubearmor"
    }
  }
}

source "virtualbox-ovf" "basic-example" {
  source_path = "ubuntu20.ova"
  ssh_username = ""
  ssh_password = ""
  shutdown_command = "echo 'packer' | sudo -S shutdown -P now"
}

build {
  name = "learn-packer"
  sources = ["sources.virtualbox-ovf.basic-example"]
  
 
  provisioner "ansible" {
    playbook_file = "./ansible/conf.yml"
  }

  provisioner "kubearmor" {
    policyPath = "/home/prateek/policies"
  }
}

In order to get an .ova file first create a Virtual Machine on VirtualBox and then export it in OVF Version 2 format. Exporting will generate an .ova file.

Using the Policies in the build

In order to apply the policies please go thorugh the guide.

Since KubeArmor is already installed so we don't have to install it.

Ensure KubeArmor service is running inside the build sudo systemctl status kubearmor and use karmor vm policy to apply the policies.