Discovery Configuration - Self Managed and Data Plane¶
Make sure you have completed the Prerequisites before proceeding with the Discovery configuration.
The following prerequisites are required to enable Discovery features in AWS.
- Create IAM policies and roles for Privacera Manager to create AWS resources required for Privacera Discovery (optional).
- Create an S3 bucket and path for storing the configurations and temporary files for Privacera Discovery or let Privacera Manager create it for you.
- Create DynamoDB tables to store metadata and tags or let Privacera Manager create them for you.
- Create an SQS queue for real-time scanning or let Privacera Manager create it for you (optional).
- Create IAM policies and roles for the Discovery and Portal pods to access the AWS resources.
- Create IAM policies for the Discovery and Portal pods to scan the S3 bucket (optional).
- Assign the IAM roles to the EKS Service Accounts for the Discovery and Portal pods.
And you have the values for the following placeholders:
- DISCOVERY_BUCKET_NAME: Discovery configuration bucket name and path.
- DynamoDB table names for storing metadata and tags (only if you have created the tables manually).
- SCAN_REQUEST_TABLE: DynamoDB table name for storing scan requests
- RESOURCE_TABLE: DynamoDB table name for storing resource metadata
- ALERT_TABLE: DynamoDB table name for storing alerts
- AUDIT_SUMMARY_TABLE: DynamoDB table name for storing audit summary
- ACTIVE_SCANS_TABLE: DynamoDB table name for storing active scans
- STATE_TABLE: DynamoDB table name for storing state
- DISCOVERY_BUCKET_SQS_NAME: Amazon SQS Queue name (only if you have created the queue manually).
- IAM Role For Discovery and Portal Pods: ARN of the IAM role created for Discovery driver, executor and Portal pods. You can set the same value as
privacera-discovery-role-privacera-prod
from prerequisites.)
Enable Discovery features¶
Run the following commands on the Privacera Manager host to enable Discovery features in Self Managed and PrivaceraCloud Data Plane deployments.
Copy the vars.discovery.aws.yml
from config/sample-vars
to config/custom-vars
and edit the file.
Bash | |
---|---|
Add or edit the following variables:
Replace the following placeholders
These were created as part of the Prerequisites -> AWS steps.
DISCOVERY_BUCKET_NAME: Discovery configuration bucket name.
DISCOVERY_IAM_ROLE_ARN: ARN of the IAM role created for Discovery driver, executor and Portal pods
DISCOVERY_CONSUMER_IAM_ROLE_ARN: ARN of the IAM role created for Discovery consumer pods
PORTAL_IAM_ROLE_ARN: ARN of the IAM role created for Discovery driver, executor and Portal pods
Copy the vars.discovery.azure.yml
from from config/sample-vars
to config/custom-vars
.
Bash | |
---|---|
Add or edit the following variables:
Copy the vars.discovery.gcp.yml
from from config/sample-vars
to config/custom-vars
and edit the file.
Bash | |
---|---|
Add or edit the following variables:
Enable Kafka for Discovery¶
Copy the vars.kafka.yml
from from config/sample-vars
to config/custom-vars
and edit the file.
Bash | |
---|---|
Add or edit the following variables:
Apply the configuration¶
To apply the configuration you should run Privacera Manager to restart the services.
- Prev Prerequisites
- Next Advanced Configuration