@snyk-partners/snyk-monitor-eks-blueprints-addon
v1.1.1
Published
**_This project is currently in Beta._**
Downloads
15
Readme
Snyk Monitor add-on for Amazon EKS Blueprints (CDK)
This project is currently in Beta.
This is an add-on to the Amazon EKS Blueprints for CDK project. The CDK code in this repository can be used to quickly deploy an Amazon EKS cluster with the Snyk Monitor (part of the Snyk Container product) installed out of the box. Additionally, EKS Blueprints users can add this module as a dependency in their project. This allows them to install the Snyk Monitor using CDK code and manage its configuration using GitOps.
Snyk Monitor
With the Snyk Monitor in your Amazon EKS cluster, you get automatic security scans when new container images are deployed. Snyk Monitor uses the Kubernetes API to watch deployment activity. When changes are detected, it pulls the container image from your Elastic Container Registry (ECR), inspects its contents, and posts the results to your account on Snyk.io. The results provide actionable remediation advice. For example, many security vulnerabilities can be resolved by upgrading the base image to the version recommended by Snyk.
Prerequisites
Skip this section and go here if you want to use this addon in an existing EKS Blueprints project.
Instructions are provided for MacOS. For Linux and Windows please consult documentation how to install the required components (make
, nodejs
).
- Install Make on Mac.
brew install make
- Install Node.js.
brew install node
Make sure that the installed Node.js version is compatible with CDK. More information can be found here (scroll to the "Prerequisites" section).
Install AWS CLI and provide credentials by running
aws configure
.In order to avoid problems with CDK version potentially being different from the version used by EKS Blueprints, create a local alias for CDK (as opposed to system wide installation). For that include the following alias to your ~/.bashrc or ~/.zshrc file:
alias cdk="npx cdk"
Make sure you run source ~/.bashrc
after editing the file.
Example for mac/linux terminal:
$ echo 'alias cdk="npx cdk"' >> ~/.zshrc
$ source ~/.zshrc
- Clone this git repository
git clone https://github.com/snyk-partners/snyk-monitor-eks-blueprints-addon.git
cd snyk-monitor-eks-blueprints-addon
Installation
The CDK code in this repository can be used to deploy a new Amazon EKS cluster with the Snyk Monitor built-in. Alternatively, the node module released from this repository can be used as a dependency in existing EKS Blueprints projects to integrate the Snyk Monitor.
New Amazon EKS Cluster
Run
npm install
.Run
make build && make lint && make list
to build.Run
aws configure
. This command makes theCDK_DEFAULT_ACCOUNT
andCDK_DEFAULT_REGION
environment variables available to subsequent steps.Run
export INTEGRATION_ID=abcd1234-abcd-1234-abcd-1234abcd1234
with your actual integration ID. To get the integration ID, log in to your Snyk account and navigate to https://app.snyk.io/org/YOUR-ORGANIZATION-NAME/manage/integrations/kubernetes.[Optional] Run
export STACK_ID=some-string-value
to change the name of the CloudFormation stack that will be deployed. The default value issnyk-monitor-eks-blueprints-addon
.NOTE: Refer to
<project>/bin/main.ts
for more details on environment variable usage.Run
cdk deploy snyk-monitor-eks-blueprints-addon
(orcdk deploy $STACK_ID
if you changed the name) to deploy to AWS.Connect to the EKS cluster by using the
aws eks
commands in the stack outputs:
- Congratulations! You deployed and connected to an EKS cluster running Snyk Monitor. Refer to the Testing the Snyk Monitor section for next steps.
Existing Amazon EKS Blueprints Project
- Add this module as a dependency:
npm install @snyk-partners/snyk-monitor-eks-blueprints-addon
- Use it as follows:
import * as cdk from 'aws-cdk-lib';
import * as blueprints from '@aws-quickstart/eks-blueprints';
import { SnykMonitorAddOn } from '@snyk-partners/snyk-monitor-eks-blueprints-addon';
const app = new cdk.App();
const addOns: Array<blueprints.ClusterAddOn> = [
new SnykMonitorAddOn({
integrationId: '<integration ID>',
values: {} // additional Helm chart values
})
];
const account = '<aws account id>'
const region = '<aws region>'
const props = { env: { account, region } }
new blueprints.EksBlueprint(app, { id: '<CFN stack ID>', addOns}, props)
Note: the integrationId
is not a password, but sensitive enough to treat with care. Do not share your integrationId
with the public. Support for AWS Secrets Manager is planned for a future release.
Testing the Snyk Monitor
- Check the Snyk Monitor logs to ensure that it's running and able to connect to your container registry:
kubectl -n snyk-monitor logs <snyk-monitor-pod-ID>
Deploy a vulnerable application to your Amazon EKS cluster. The java-goof project is recommended because it includes multiple vulnerable applications as well as scripts and Kubernetes manifests to deploy them. Do not expose vulnerable applications to the public internet.
Follow the instructions here to set up monitoring for the vulnerable workload(s). Continue reading to learn how to interpret test results.
AWS CodePipeline
This repository includes an AWS CodePipeline which is used to test the Snyk Monitor addon for EKS Blueprints. The pipeline is deployed using cdk deploy snyk-monitor-eks-blueprints-addon-pipeline
.
Follow the instructions here to get familiarized with the code and requirements to deploy the pipeline. The pipeline depends on a GitHub personal access token, AWS Secrets Store, and environment variables which all need to be configured manually. AWS CodeBuild may need increased privileges to complete the "build" phase of the pipeline.