Trend Micro Cloud One Container Security components use the helm
package manager for Kubernetes.
Helm 3 or later is supported when installing Trend Micro Cloud One - Container Security components. To get started, see the Helm installation guide.
Container Security Continuous Compliance enforces policies by leveraging Kubernetes network policies to perform isolation mitigation. Network policies are implemented by the network plugin.
To install Container Security, a network plugin with NetworkPolicy support is required to allow for network isolation mitigation.
Note: If you are running Container Security in a Red Hat OpenShift environment, network isolation mitigation is only supported for pods whose security context is acceptable by oversight controller's SecurityContextConstraint. If you want to let Container Security isolate pods that are not allowed by default, you can use overrides.yaml to override the default setting.
By default, Container Security Continuous Compliance will create a Kubernetes network policy on your behalf. If you want to create it manually, follow the steps below:
cloudOne.oversight.enableNetworkPolicyCreation
to false
, as seen below: cloudOne:
oversight:
enableNetworkPolicyCreation: false
matchLabels
set to trendmicro-cloud-one: isolate
in your desired namespaces. apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
labels:
app.kubernetes.io/instance: trendmicro
name: trendmicro-oversight-isolate-policy
spec:
podSelector:
matchLabels:
trendmicro-cloud-one: isolate
policyTypes:
- Ingress
- Egress
Warning: The network policy with matchLabels trendmicro-cloud-one: isolate
must exist in each application namespaces in order to perform proper isolation mitigation.
To use the Trend Micro Cloud One Container Security components with your Kubernetes cluster an API key is required to be able to communicate with Trend Micro Cloud One Container Security.
To obtain an API key:
Navigate to the Trend Micro Cloud One Container Security console using https://cloudone.trendmicro.com.
Go to Add a cluster.
Give your Kubernetes cluster a unique name.
Copy your API key, as it will be used during the installation process.
Helm uses a file called values.yaml
to set configuration defaults. You can find detailed documentation for each of the configuration options in this file.
You can override the defaults in this file by creating an overrides.yaml
file and providing the location of this file as input during installation. The cloudOne.APIKey
should be overridden in the overrides.yaml
file.
Note: If you create a file to override the values, make sure to copy the structure from the chart's values.yaml
file. You only need to provide the values that you are overriding.
Create a file called overrides.yaml that will contain your cluster-specific settings. You can find these values in the Container Security console or Container Security API when creating a cluster. The Values.yaml file can be used as a reference when creating your overrides file.
Use helm
to install Container Security components with your cluster-specific settings. We recommend that you run Container Security in its own namespace.
To install Container Security chart into an existing Kubernetes namespace, use the --namespace
flag with the helm install
command:
helm install \
--values overrides.yaml \
--namespace ${namespace} \
trendmicro \
https://github.com/trendmicro/cloudone-container-security-helm/archive/master.tar.gz
In the example below, we create a new namespace by using helm
's --create-namespace
option:
helm install \
--values overrides.yaml \
--namespace trendmicro-system \
--create-namespace \
trendmicro \
https://github.com/trendmicro/cloudone-container-security-helm/archive/master.tar.gz
For more information about helm install
, see the Helm installation documentation.
Note: If you are running Container Security in a pure AWS EKS Fargate environment, you may need to adjust your Fargate profile to allow pods in a non-default namespace (ex: trendmicro-system
) to be scheduled. See AWS documentation for more information on Fargate profiles.
Note: If you are running Container Security in a Red Hat OpenShift environment, the Helm Chart creates a Security Context Constraint to allow Container Security components to have the minimum security context requirements to run.
Note: If you are running Container Security in a cluster where Pod Security Admission is available and you have runtime security enabled, ensure the namespace where Container Security is installed is using the privileged Pod Security Standards policy.
To upgrade an existing installation in the default Kubernetes namespace to the latest version:
helm upgrade \
--values overrides.yaml \
--namespace ${namespace} \
trendmicro \
https://github.com/trendmicro/cloudone-container-security-helm/archive/master.tar.gz
Note: Helm will override or reset values in overrides.yaml
. If you want to use the values you had previously, use the --reuse-values option during a Helm upgrade:
helm upgrade \
--namespace ${namespace} \
--reuse-values \
trendmicro \
https://github.com/trendmicro/cloudone-container-security-helm/archive/master.tar.gz
You can delete all of the resources created by a helm chart using Helm's uninstall
command:
Warning: helm uninstall
and kubectl delete namespace
are destructive commands, and will delete all of the associated resources.
helm uninstall trendmicro --namespace ${namespace}
Use the helm list --all-namespaces
command to list installed releases in all namespaces.
If you created a trendmicro-system
namespace during install, and don't have any other components in the trendmicro-system
namespace, you can delete the namespace by running kubectl delete namespace trendmicro-system
.
By default, Container Security Continuous Compliance will create a Kubernetes network policy for you. The created network policies will be cleaned up, even if the chart is uninstalled. To clean them up, run:
kubectl delete networkpolicy -l app.kubernetes.io/instance=trendmicro --all-namespaces
Warning: If you have running Pods that are isolated by a network policy, removing the network policy will give them network access again.
If you want to install a specific version you can use the archive link for the tagged release. For example, to install Trend Micro Cloud One Container Security helm chart version 2.4.3, run the following command:
helm install \
--values overrides.yaml \
--namespace ${namespace} \
--create-namespace \
trendmicro \
https://github.com/trendmicro/cloudone-container-security-helm/archive/2.4.3.tar.gz
If desired, specifics components of the Container Security helm chart can be enabled or disabled individually using an overrides file.
For example, you can choose to enable the runtime security component by including the below in your overrides.yaml
file:
cloudOne:
runtimeSecurity:
enabled: true
To learn more about managing Container Security policies with custom resources and policy operator, see the Policy as Code documentation.
You can configure Container Security to use either a socks5 proxy or http proxy by setting the httpsProxy
value.
For example, you can configure a socks5 proxy with authentication in your overrides.yaml
file this way:
proxy:
httpsProxy: socks5://10.10.10.10:1080
username: user
password: password
For http proxy, you can configure it this way:
proxy:
httpsProxy: http://10.10.10.10:3128
username: user
password: password
On OpenShift, new namespaces created after installing container security need to be configured by upgrading container security to create RBAC resources and provide scanners in the new namespaces the required privileges.
ServiceAccounts and cluster role bindings used to assign security context constraints to scanner pods will not be deleted on helm uninstall as some namespaces maybe privileged and require an admin role to delete. To delete all remaining rbac resources, you can run the following script with admin role:
./scripts/openshift-cleanup.sh
You can run runtime security on AWS bottlerocket nodes by adding these configurations in your overrides.yaml
file:
securityContext:
scout:
scout:
allowPrivilegeEscalation: true
privileged: true
You can configure Container Security to customize container runtime interface. For example, you can specify a custom path:
scout:
falco:
cri:
socket: "/run/cri/containerd.sock"
You can also configure a custom path for k0s or k3s. For example:
scout:
falco:
k0s:
socket: "/run/k0s/containerd.sock"
Runtime vulnerability scanner needs the privilege to access all directories and files in an image. DAC_READ_SEARCH
is needed when the file permissions do not allow scanner to access the files or directories in an image. In this case, you can add DAC_READ_SEARCH
to the scanner
's capabilities
securityContext:
scanner:
target:
capabilities:
add: ["DAC_READ_SEARCH"]
You can configure the logging for all components by setting the logConfig
value in your overrides.yaml
file:
logConfig:
logLevel: info # Sets the log verbosity level. Supported values are debug, info, and error. Overrides the logLevel set for each component
logFormat: json # Sets the log encoder. Supported values are json and console
stackTraceLevel: error # Sets the level above which stacktraces are captured. Supported values are info, error or panic
timeEncoding: epoch # Sets the time encoding format. Supported values are epoch, millis, nano, iso8601, rfc3339 or rfc3339nano
You can also configure the log level for each component individually by setting the logLevel
value for the component in your overrides.yaml
file:
cloudone:
admissionController:
logLevel: debug
You can enable Falco event outputs to stdout or syslog by setting values under scout.falco
in your overrides.yaml
file:
scout:
falco:
stdout_enabled: true # Enable stdout output for Falco events.
syslog_enabled: true # Enable syslog output for Falco events
Note: Enabling stdout output will cause large amounts of logs to be generated. Enable these if the events are being consumed from the respective channel. Container security will only consume the events from the grpc channel.
Most issues can be investigated using the application logs. The logs can be accessed using kubectl
.
Access the logs for the admission controller using the following command:
kubectl logs deployment/trendmicro-admission-controller --namespace ${namespace}
Access the logs for the runtime security component using the following command, where container can be one of scout
, or falco
:
kubectl logs daemonset/trendmicro-scout --namespace ${namespace} -c ${container}
Access the logs for Oversight controller (Continuous Compliance policy enforcement) using the following command:
kubectl logs deployment/trendmicro-oversight-controller [controller-manager | rbac-proxy] --namespace ${namespace}
Access the logs for Usage controller using the following command:
kubectl logs deployment/trendmicro-usage-controller [controller-manager | rbac-proxy] --namespace ${namespace}
To help debug issues reported in support cases, a log collection script is provided for customer use.
To enable debug logging, set the logConfig.logLevel
to debug
in the overrides.yaml
file and upgrade the helm chart.
logConfig:
logLevel: debug
Gather logs using the following command:
./scripts/collect-logs.sh
The following environment variables are supported for log collection:
Environment variable | Description | Default |
---|---|---|
RELEASE | Helm release name | trendmicro |
NAMESPACE | The namespace that the helm chart is deployed in | Current namespace declared in kubeconfig . If no namespace setting exists in kubeconfig , then trendmicro-system will be used. |