Discovery Engine Save

Discover least permissive security posture, Network Microsegmentation, and Application behaviour based on visibility/observability data emitted from policy engines..

Project README

Discovery Engine

Discovery Engine discovers the security posture for your workloads and auto-discovers the policy-set required to put the workload in least-permissive mode. The engine leverages the rich visibility provided by KubeArmor and Cilium to auto discover the systems and network security posture.

Getting Started Guide

Quick Install

kubectl apply -f https://raw.githubusercontent.com/accuknox/discovery-engine/dev/deployments/k8s/deployment.yaml

The discovery engine will automatically connect to the kubearmor and cilium agents installed in kube-system namespace. Discovery engine can connect to either or both the engines and provide necessary insights into the workloads.

Get the discovered policies

Use karmor discover --help to check all the options. To install karmor cli tool follow the link here.

Example, Get policies discovered for deployment having label "app=wordpress" in wordpress-mysql namespace.

karmor discover -n wordpress-mysql -l "app=wordpress" -f yaml > wordpress.yaml

The wordpress.yaml can then be used to enforce policies using kubearmor by using kubectl apply -f wordpress.yaml.

Uninstall

kubectl delete -f https://raw.githubusercontent.com/accuknox/discovery-engine/dev/deployments/k8s/deployment.yaml

Want to do more with the discovered policies?

The discovered policies contains the execution posture for your workloads. You can use these policies to check what the workloads are doing. Check this guide to know more.

Others

  1. Detailed functionality overview
  2. Types of policies discovered
Open Source Agenda is not affiliated with "Discovery Engine" Project. README Source: accuknox/discovery-engine
Stars
28
Open Issues
42
Last Commit
7 months ago

Open Source Agenda Badge

Open Source Agenda Rating