Simple github workflow to sync the following Crowdstrike Cloud Workload Protection container images to your own docker repository using skopeo sync.
- Falcon Container Sensor
- Falcon Sensor for Linux
- Kubernetes Protection Agent
Images are synced according to the github scheduled workflow, existing images are skipped.
Documented Registries
- AWS ECR
- Generic Docker V2 Registry
- Create destination repositories in your container image registry
falcon-sensor
kpagent
-
Fork this repository.
-
Create the following Repository Secrets
Secret | Description | Example |
---|---|---|
FALCON_CID | Copy from the sensor download page | SOMETHING4DI30382C85D952A0A682E-AE |
FALCON_CLIENT_ID | Falcon platform API key with the following scopes: Falcon Images Download (read), Kubernetes Protection (read) | somethingsomething05ec5aaada734d |
FALCON_CLIENT_SECRET | Secrete generated with Client ID | somethingsomethingh9qFwKB8ij02fQbMRsdr |
FALCON_CLOUD_API | API endpoint for your cloud | us-1: api.crowdstrike.com us-2: api.us-2crowdstrike.com eu-1: api.eu-1.crowdstrike.com gov-1: api.laggar.gcw.crowdstrike.com |
FALCON_CONTAINER_REGISTRY | Your registry endpoint | us-1: registry.crowdstrike.com us-2: registry.crowdstrike.com eu-1: registry.crowdstrike.com gov-1: registry.laggar.gcw.crowdstrike.com |
- Enable workflows in the repository
Actions
tab
Create the following Repository Secrets
Secret | Description | Example |
---|---|---|
YOUR_REGISTRY | your destination docker registry | 123456789012.dkr.ecr.ap-southeast-1.amazonaws.com |
YOUR_REGISTRY_USERNAME | your destination docker registry username | AWS |
YOUR_REGISTRY_PASSWORD | your destination docker registry password | yourdockerregistrypassword |
If you are syncing to an AWS ECR registry.Set up the configure-aws-credentials action. I used this guide so the ECR login action can work.
Use the following to deploy the images in your environment:
Remember to specify your own registry.org/image:tag
helm repo add kpagent-helm https://registry.crowdstrike.com/kpagent-helm
cat << EOF >> kpa-values.yaml
image:
repository: 123456789012.dkr.ecr.ap-southeast-1.amazonaws.com/kpagent:0.69.3
crowdstrikeConfig:
clusterName: "clustername"
enableDebug: "false"
clientID: "somethingsomething05ec5aaada734d"
clientSecret: "somethingsomethingh9qFwKB8ij02fQbMRsdr"
env: "us-2"
cid: "something4di30382c85d952a0a682e"
EOF
helm upgrade kpagent kpagent-helm/cs-k8s-protection-agent \
--install -n falcon-kubernetes-protection \
--create-namespace \
--values kpa-values.yaml