From 0009bf5338c846f7304d5241189442a20b0a286d Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 13:48:19 +1000 Subject: [PATCH 01/14] initial space commit --- resources/terraform/f5xc-aws-polsup/README.md | 15 +++++++++++++++ resources/terraform/f5xc-aws-polsup/main.tf | 0 resources/terraform/f5xc-aws-polsup/outputs.tf | 0 resources/terraform/f5xc-aws-polsup/variables.tf | 0 resources/terraform/f5xc-aws-polsup/versions.tf | 0 5 files changed, 15 insertions(+) create mode 100644 resources/terraform/f5xc-aws-polsup/README.md create mode 100644 resources/terraform/f5xc-aws-polsup/main.tf create mode 100644 resources/terraform/f5xc-aws-polsup/outputs.tf create mode 100644 resources/terraform/f5xc-aws-polsup/variables.tf create mode 100644 resources/terraform/f5xc-aws-polsup/versions.tf diff --git a/resources/terraform/f5xc-aws-polsup/README.md b/resources/terraform/f5xc-aws-polsup/README.md new file mode 100644 index 0000000..c33de77 --- /dev/null +++ b/resources/terraform/f5xc-aws-polsup/README.md @@ -0,0 +1,15 @@ +[![license](https://img.shields.io/github/license/f5devcentral/adaptiveapps)](../../LICENSE) +[![standard-readme compliant](https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square)](https://github.com/RichardLitt/standard-readme) + +# DevSecOps with PolicySupervisor + +## Table of Contents + +
+Click to expand. + +
+ +## TODO + +- [ ] `README.md` diff --git a/resources/terraform/f5xc-aws-polsup/main.tf b/resources/terraform/f5xc-aws-polsup/main.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/f5xc-aws-polsup/outputs.tf b/resources/terraform/f5xc-aws-polsup/outputs.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/f5xc-aws-polsup/variables.tf b/resources/terraform/f5xc-aws-polsup/variables.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/f5xc-aws-polsup/versions.tf b/resources/terraform/f5xc-aws-polsup/versions.tf new file mode 100644 index 0000000..e69de29 -- GitLab From 1334df2190a2b59038994e1a35fddabe5dc61daa Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 14:11:40 +1000 Subject: [PATCH 02/14] updates for PolicySupervisor AWS EKS & BIG-IP CIS --- .../f5xc-aws-icap/aws-secrets.tfvars | 3 +++ ...es_system_f5xc-icap_kubeconfig_global.yaml | 20 +++++++++++++++++++ .../README.md | 0 .../main.tf | 0 .../outputs.tf | 0 .../variables.tf | 0 .../versions.tf | 0 7 files changed, 23 insertions(+) create mode 100644 resources/terraform/f5xc-aws-icap/aws-secrets.tfvars create mode 100644 resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml rename resources/terraform/{f5xc-aws-polsup => polsup-eks-cis}/README.md (100%) rename resources/terraform/{f5xc-aws-polsup => polsup-eks-cis}/main.tf (100%) rename resources/terraform/{f5xc-aws-polsup => polsup-eks-cis}/outputs.tf (100%) rename resources/terraform/{f5xc-aws-polsup => polsup-eks-cis}/variables.tf (100%) rename resources/terraform/{f5xc-aws-polsup => polsup-eks-cis}/versions.tf (100%) diff --git a/resources/terraform/f5xc-aws-icap/aws-secrets.tfvars b/resources/terraform/f5xc-aws-icap/aws-secrets.tfvars new file mode 100644 index 0000000..1c55247 --- /dev/null +++ b/resources/terraform/f5xc-aws-icap/aws-secrets.tfvars @@ -0,0 +1,3 @@ +aws_access_key = "AKIAUDDKQQFGCT25WQZC" +aws_secret_key = "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" +ssh_public_key = "ssh-rsa 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 m.kennedy@C02G20XKML85" \ No newline at end of file diff --git a/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml b/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml new file mode 100644 index 0000000..0e123cb --- /dev/null +++ b/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml @@ -0,0 +1,20 @@ +apiVersion: v1 +clusters: +- cluster: + certificate-authority-data: -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


 + server: https://f5-big-ip.console.ves.volterra.io/api/k8s/namespaces/system/site/f5xc-icap + name: f5xc-icap +contexts: +- context: + cluster: f5xc-icap + namespace: default + user: m.kennedy@f5.com + name: f5xc-icap +current-context: f5xc-icap +kind: Config +preferences: {} +users: +- user: + client-certificate-data: -----BEGIN CERTIFICATE-----
MIIFATCCAumgAwIBAgIQBVX5+Psa9ko8TcDfsN1V6DANBgkqhkiG9w0BAQsFADCB
tjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFDASBgNVBAcTC1Nh
bnRhIENsYXJhMR8wHQYDVQQKExZWb2x0ZXJyYSBFZGdlIFNlcnZpY2VzMSAwHgYD
VQQLExdJbmZyYXN0cnVjdHVyZSBTZWN1cml0eTE5MDcGA1UEAxMwUFJPRCAtIFRl
bmFudCBVc2VyIENlcnRpZmljYXRlIElzc3VpbmcgQ0EgLSB2Mi4xMB4XDTIzMDcx
MzA1MzA1OVoXDTIzMDczMTA1MzA1OVowLjERMA8GA1UEChMIdm9sdGVycmExGTAX
BgNVBAMTEFVTRVItQ0VSVElGSUNBVEUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
ggEKAoIBAQC4CiCiR99NzmXS3onkpHB2TlTgTvrewKKg6DbtodBImnebRePwRaO1
ZL7M2adSCbdrvK5jPiEBUGF+zJK0E/c5DDB7d6URgizffvs4PSqiXi4DlSuXmP4F
zrM/qDjPllO5RKstKEz2/VcZjl6840APGOQm+4EC67fCatG/ls9+rEu/AA+inbD6
xw9Yw7/Vd2h3u+Etfefd9adjuB3v2phqH6myFIx5ouMP1EK4pPHZ6qntUffCzy3J
RLdrJJhTxN3YioNCcJSJQuAN/KL7xHsBqe22/zFznRtA9UFNXAVsxk6tD6RFwo7O
JRccMJfepHzKNOKgkzmSBhUOgktpQNkzAgMBAAGjgZEwgY4wDgYDVR0PAQH/BAQD
AgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMCMB0GA1UdDgQWBBRYBAz1GVrhS0wan5Fz
STlx0gjAnjAiBgwrBgEEAYOhDgEBAQEEEgQQbS5rZW5uZWR5QGY1LmNvbTAkBgwr
BgEEAYOhDgEBAQIEFAQSZjUtYmlnLWlwLWdkeXhmbnVtMA0GCSqGSIb3DQEBCwUA
A4ICAQCHHOZiCODqST+gDBcUiOry9dCUcCB1r4tGhIZTuCavidUfCJIDHYzCY3A+
bGHKdV4mdd9vy9Xg6ruFEkTLjtodugzahsKQ1uFaZF3UA58cYiBQNqqcPasCu6Xr
idtYwINiTzV/f7j2ntEtreoA6uw33lpw9J9XOMIiKcPsxepR1XioN2IAGweTb1EN
Xz/JrftWas0/7S2drLTLrsgHJY+bkb6+fmXKxo8zjlmcMe3u0KuFTqRt2YdynIKy
FuzUs5z1CDtFDQYBMP2JbuPWq9bqvUAQOA3hUcXtPw4Evr3pMuKX/w2V9bx63Uma
DBaZBIr4+0CAbbH22wJLkFjmQquqhf8e6y/15idX4pV3cvs8/twXZdhn+DU6a6gE
HMbvzQMGiX60J+ZqMWR2Y2jFSWMPTmzoXGinQyPWcYZInAp1zEXILh63rJypnsdG
NBmvb/oi/RQRoObt4MTczgoYWCfDz05evSE6m41FxEwwR7dWn4EWprypUhUHe/Tn
3c0m07nqD9L6/CEQvT0638NS/oSjCWb4GBxyX6hLT82hjLZHUJcKLHKuhwxOrmjy
W3g/3etf9cPIW6iPr6ADkY4pHiNflJ+CLkDU99T9hG9oute5q5ZLTDi4B3ayc67+
F5arGUPFYfGa40CkQgOH8Eu37NX5t5HGXabtAtwqnJOHRPwJTA==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 + client-key-data: LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUV2UUlCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQktjd2dnU2pBZ0VBQW9JQkFRQzRDaUNpUjk5TnptWFMKM29ua3BIQjJUbFRnVHZyZXdLS2c2RGJ0b2RCSW1uZWJSZVB3UmFPMVpMN00yYWRTQ2JkcnZLNWpQaUVCVUdGKwp6SkswRS9jNUREQjdkNlVSZ2l6ZmZ2czRQU3FpWGk0RGxTdVhtUDRGenJNL3FEalBsbE81UktzdEtFejIvVmNaCmpsNjg0MEFQR09RbSs0RUM2N2ZDYXRHL2xzOStyRXUvQUEraW5iRDZ4dzlZdzcvVmQyaDN1K0V0ZmVmZDlhZGoKdUIzdjJwaHFINm15Rkl4NW91TVAxRUs0cFBIWjZxbnRVZmZDenkzSlJMZHJKSmhUeE4zWWlvTkNjSlNKUXVBTgovS0w3eEhzQnFlMjIvekZ6blJ0QTlVRk5YQVZzeGs2dEQ2UkZ3bzdPSlJjY01KZmVwSHpLTk9LZ2t6bVNCaFVPCmdrdHBRTmt6QWdNQkFBRUNnZ0VBSGhKa1BBckJHRFpEam0zdE1Pa1Z0SjhldGZyeHp5TEJtc2ZzUWNRUkErd0oKamR1aENvcGhNbFgxNmdSejdLOGR3NEwwZm5tUkZ3L2YvbXpGcnBzY2t4RWFLRWZuNGJFdG9vOWQxQUN2K0x2KwozM2hUdzlVQjhrZW1JOGxadWNITWlHeTBzN3BFRStVQzJIQXZyQm1qUnFtVjQ0WWJ2SWh4REZtUlVGeFUwZjVrCnZFTWs1bGpBaGRGRUN3WmpwUUZ0VjNrTmZZZHJENlR0MjIxaHc3SlUrek5wZmxWRGVUUFRRZ3FHSXEwVk9qaUcKZkZGTXkreDVBN0s1S3A0RWZ3QzhPWTh4S3RkalI3cTk1cEc4WUVsNWphVFR3dHBKVXpIL3JYbHNqN1dvc2VzUApZUndPN1h2cGU5YldKd3p2bDlPNGdaWVRaN0laNVFUN3c1SDVaekx0b1FLQmdRRHNwUEE0aVUrNm9xY05UbCsxCjBZUnpkV2hwQ2NtU3N5OXVSZG94cU0vNlZOaFNYQTZOMlVRbU4veXVCYWsyQmJqWnYrVGZ5UGVLdU85UzdIakEKMTFHbXZvL3pzVWl0NnRwUkNKVmdmRjl1WnFyK29yWkRzNjRCSThWWjJZWDVFVWxSSWZ0Zmo5MTRydEtPdHY3UwpiOTZiTVl0N3FyM3hHSHZkQ2QrRzBDRDlPd0tCZ1FESEY3Uy9QSzE0SjhyYnpOakRjWjZYeVZ0ZCtQaUx3alhUCjMrL2ZKcnYvc2FsV3NFNUdVU1dYZFNITDRJamtaK1FXRndZRVM4c09WVlVKaGx0SXduYitzVWowWnJPaXYwbFUKbkpPcmtrU2ExYWJZMXFlSEtIdUpQYmg0TXdldTRTejhmTVBaSVEyREUwZzR1a29MVUxNcHRvZTRFZ1doYlBYYgpMN1JhK0VzMGFRS0JnUURyUFZyL0dLQ0ZLME5jMnRnUjZlRDgxVzJoWFBWZ08zZWU2eGxuM0NSQytTekJVbm0xClVKR0tYSVYyaUhJWkhiOFAxczR5RjVqYjhkTVdYN1A2SHhFdjdLYzAzTHNmQ0NOV0FtNWJwOGRGL0JGbloyQkEKRk5HWW1IS0tTczMvTmN2b054dW5kMS8xby9Qem9yM1ZleGVTdHNHdGdhR25sV3NyNDdDc1Z5RTBHUUtCZ0VhSwowc016eDY4Y1FsZHhGSmpqaURMMTZJYTZjYTVyYU5FaXRvWlYzaVR5R1RNYkV4RDlMWm1scWd6b0NQa05DcGI5CkgyZWtSMVZUek9hc0VXb05aVVpISUxkZ01HUUk3UDJxNFBQWXhyQXA1WTFOT1Z5OWJsQXBhMVJEbUlSUlNyUkgKck1raFdmMUlkcjJLM0RONEs1TXJGcG1VNFNQYVRKNldINHhnRDUySkFvR0FiVFkyR3RXOHh3SnhwZ2VTUzZ5Mgoxdy9CZkY5clowQ0EwWm45MnFKZUwxL3l5Qi9POWxTdjdTeXZxZFI3QTNLUjZnSWd1enV1aU85OU8zVldDTDR3Cm5neGpraVZmRUZMYU0xVG9iOFdQL2NBTWpPZXd6WGpnTG1NekVTdFZlZUxRZlhua09FcmVqWWllbFBxNFVPMHkKV1NNSEtNT21WbW16R1FMQ2ovaVptTHM9Ci0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0K + name: m.kennedy@f5.com diff --git a/resources/terraform/f5xc-aws-polsup/README.md b/resources/terraform/polsup-eks-cis/README.md similarity index 100% rename from resources/terraform/f5xc-aws-polsup/README.md rename to resources/terraform/polsup-eks-cis/README.md diff --git a/resources/terraform/f5xc-aws-polsup/main.tf b/resources/terraform/polsup-eks-cis/main.tf similarity index 100% rename from resources/terraform/f5xc-aws-polsup/main.tf rename to resources/terraform/polsup-eks-cis/main.tf diff --git a/resources/terraform/f5xc-aws-polsup/outputs.tf b/resources/terraform/polsup-eks-cis/outputs.tf similarity index 100% rename from resources/terraform/f5xc-aws-polsup/outputs.tf rename to resources/terraform/polsup-eks-cis/outputs.tf diff --git a/resources/terraform/f5xc-aws-polsup/variables.tf b/resources/terraform/polsup-eks-cis/variables.tf similarity index 100% rename from resources/terraform/f5xc-aws-polsup/variables.tf rename to resources/terraform/polsup-eks-cis/variables.tf diff --git a/resources/terraform/f5xc-aws-polsup/versions.tf b/resources/terraform/polsup-eks-cis/versions.tf similarity index 100% rename from resources/terraform/f5xc-aws-polsup/versions.tf rename to resources/terraform/polsup-eks-cis/versions.tf -- GitLab From e1a03cc6c79a921b19d377ca200e76ae8e95efed Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:01:16 +1000 Subject: [PATCH 03/14] addtions of juice-shop manifests --- resources/k8s-manifests/f5xc-icap/notes.md | 16 +- .../juice-shop/juice-shop-deployment.yaml | 16 ++ .../juice-shop/juice-shop-service.yaml | 12 + .../terraform/aws-eks-cbip-cis/README.md | 2 +- resources/terraform/f5xc-aws-icap/as_built.md | 3 +- .../terraform/f5xc-aws-polsup/as_built.md | 0 resources/terraform/f5xc-aws-polsup/main.tf | 240 ++++++++++++++++++ .../f5xc-aws-polsup/min-iam-policy.json | 105 ++++++++ .../terraform/f5xc-aws-polsup/variables.tf | 66 +++++ .../terraform/f5xc-aws-polsup/versions.tf | 30 +++ 10 files changed, 485 insertions(+), 5 deletions(-) create mode 100644 resources/k8s-manifests/juice-shop/juice-shop-deployment.yaml create mode 100644 resources/k8s-manifests/juice-shop/juice-shop-service.yaml create mode 100644 resources/terraform/f5xc-aws-polsup/as_built.md create mode 100644 resources/terraform/f5xc-aws-polsup/min-iam-policy.json diff --git a/resources/k8s-manifests/f5xc-icap/notes.md b/resources/k8s-manifests/f5xc-icap/notes.md index 25969db..e00fa82 100644 --- a/resources/k8s-manifests/f5xc-icap/notes.md +++ b/resources/k8s-manifests/f5xc-icap/notes.md @@ -18,6 +18,15 @@ https://community.f5.com/t5/technical-forum/i-just-want-to-use-the-relative-uri- https://community.f5.com/t5/technical-articles/icap-204-response-frequently-asked-questions/ta-p/290391 https://f5-k8s-ctfd.docs.emea.f5se.com/en/latest/class7/module1/module1.html https://github.com/nergalex/f5-aks-kic-lab-admin/tree/master/playbooks/roles/poc-opswat +https://github.com/nakadaisuke/volterra-tutorial + + +## vmware references + +https://github.com/vmware/govmomi/tree/main +https://cloud-provider-vsphere.sigs.k8s.io/tutorials/deploying_cpi_with_multi_dc_vc_aka_zones.html +https://blah.cloud/kubernetes/creating-an-ubuntu-18-04-lts-cloud-image-for-cloning-on-vmware/ +https://rpi4cluster.com/ ## F5XC CE Deployment notes: @@ -51,17 +60,18 @@ docker push :/: - [Cisco-Talos](https://github.com/Cisco-Talos/clamav-docker) - [UKHomeOffice ClamAV (Legacy)](https://github.com/UKHomeOffice/docker-clamav/blob/master/Dockerfile) - [UKHomeOffice ClamAV](https://github.com/UKHomeOffice/clamav-http/blob/master/clamav/Dockerfile) - +- [ClamAV REST API k8s](https://github.com/benzino77/clamav-rest-api/tree/master) # TODO -- [ ] migrate `f5xc-icap` into two modules +- [x] migrate `f5xc-icap` into two modules * vk8s provisionin * clamav deployment -- [ ] declaritaive kubeconfig for k8s manifest +- [x] declaritaive kubeconfig for k8s manifest - [ ] add gitflow steps to readme for * image build/packer/docker * push to ghcr.io or private for edge clamav + # Random Thoughts diff --git a/resources/k8s-manifests/juice-shop/juice-shop-deployment.yaml b/resources/k8s-manifests/juice-shop/juice-shop-deployment.yaml new file mode 100644 index 0000000..992274c --- /dev/null +++ b/resources/k8s-manifests/juice-shop/juice-shop-deployment.yaml @@ -0,0 +1,16 @@ +kind: Deployment +apiVersion: apps/v1 +metadata: + name: juice-shop +spec: + template: + metadata: + labels: + app: juice-shop + spec: + containers: + - name: juice-shop + image: bkimminich/juice-shop + selector: + matchLabels: + app: juice-shop \ No newline at end of file diff --git a/resources/k8s-manifests/juice-shop/juice-shop-service.yaml b/resources/k8s-manifests/juice-shop/juice-shop-service.yaml new file mode 100644 index 0000000..f90f702 --- /dev/null +++ b/resources/k8s-manifests/juice-shop/juice-shop-service.yaml @@ -0,0 +1,12 @@ +kind: Service +apiVersion: v1 +metadata: + name: juice-shop +spec: + type: NodePort + selector: + app: juice-shop + ports: + - name: http + port: 8000 + targetPort: 3000 \ No newline at end of file diff --git a/resources/terraform/aws-eks-cbip-cis/README.md b/resources/terraform/aws-eks-cbip-cis/README.md index 426377a..af1388a 100644 --- a/resources/terraform/aws-eks-cbip-cis/README.md +++ b/resources/terraform/aws-eks-cbip-cis/README.md @@ -69,7 +69,7 @@ Ensure that you have installed the following tools in your Mac or Windows Laptop > **Note**: The policy resource is set as `*` to allow all resources, this is not a recommended practice. -You can find the policy [here](min-iam-policy.json) +You can find the policy [here](../f5xc-aws-polsup/min-iam-policy.json) ### Deployment Steps diff --git a/resources/terraform/f5xc-aws-icap/as_built.md b/resources/terraform/f5xc-aws-icap/as_built.md index e7ef805..1868bd3 100644 --- a/resources/terraform/f5xc-aws-icap/as_built.md +++ b/resources/terraform/f5xc-aws-icap/as_built.md @@ -65,4 +65,5 @@ k delete -f ukoffice-clamav.yaml -n aatt-solutions --kubeconfig ~/Downloads/ves_ ## TODO - [ ] deploy https/https application f5xc load balancer/nginx ingress -- [ ] validate auto-connet for appstack \ No newline at end of file +- [ ] validate auto-connet for appstack +- [ ] association with k8s api access for f5xc managed k8s local api access. \ No newline at end of file diff --git a/resources/terraform/f5xc-aws-polsup/as_built.md b/resources/terraform/f5xc-aws-polsup/as_built.md new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/f5xc-aws-polsup/main.tf b/resources/terraform/f5xc-aws-polsup/main.tf index e69de29..bce1d5e 100644 --- a/resources/terraform/f5xc-aws-polsup/main.tf +++ b/resources/terraform/f5xc-aws-polsup/main.tf @@ -0,0 +1,240 @@ +provider "aws" { + region = local.region +} + +provider "kubernetes" { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } +} + +provider "helm" { + kubernetes { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } + } +} + +data "aws_availability_zones" "available" { + filter { + name = "opt-in-status" + values = ["opt-in-not-required"] + } +} + +resource "random_id" "id" { + byte_length = 2 +} + +locals { + region = var.region + vpc_cidr = var.vpc_cidr + azs = slice(data.aws_availability_zones.available.names, 0, 3) + + build = random_id.id.hex + name = coalesce(var.name, local.build) + # var.cluster_name is for Terratest + cluster_name = coalesce(var.cluster_name, local.name) + + # Mapping + cluster_version = var.cluster_version + metrics_server = true + aws_load_balancer_controller = true + cert_manager = true + cloudwatch_metrics = true + vpa = true + kubecost = true + + tags = { + Owner = var.owner + Application = var.app + } +} + +#--------------------------------------------------------------- +# EKS Blueprints +#--------------------------------------------------------------- + +module "eks" { + source = "terraform-aws-modules/eks/aws" + version = "~> 19.13" + + cluster_name = local.cluster_name + cluster_version = local.cluster_version + cluster_endpoint_public_access = true + + vpc_id = module.vpc.vpc_id + subnet_ids = module.vpc.private_subnets + + cluster_addons = { + coredns = {} + kube-proxy = {} + vpc-cni = {} + } + + eks_managed_node_groups = { + (local.cluster_name) = { + node_group_name = "managed-ondemand" + instance_types = [var.instance] + min_size = 3 + max_size = 3 + desired_size = 3 + subnet_ids = module.vpc.private_subnets + } + } + + tags = local.tags +} + + +module "eks_blueprints_addons" { + source = "github.com/aws-ia/terraform-aws-eks-blueprints//modules/kubernetes-addons?ref=v4.32.1" + + eks_cluster_id = module.eks.cluster_name + eks_cluster_endpoint = module.eks.cluster_endpoint + eks_cluster_version = module.eks.cluster_version + eks_oidc_provider = module.eks.oidc_provider + eks_oidc_provider_arn = module.eks.oidc_provider_arn + + # Add-ons + enable_amazon_eks_aws_ebs_csi_driver = true + amazon_eks_aws_ebs_csi_driver_config = { + most_recent = true + kubernetes_version = local.cluster_version + resolve_conflicts = "OVERWRITE" + } + enable_aws_load_balancer_controller = true + aws_load_balancer_controller_helm_config = { + service_account = "aws-lb-sa" + } + enable_cert_manager = true + enable_metrics_server = true + + tags = local.tags +} + +module "ebs_csi_driver_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-ebs-csi-driver-" + + attach_ebs_csi_policy = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:ebs-csi-controller-sa"] + } + } + + tags = local.tags +} + +module "vpc_cni_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-vpc-cni-" + + attach_vpc_cni_policy = true + vpc_cni_enable_ipv4 = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:aws-node"] + } + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# Supporting Resources +#--------------------------------------------------------------- + +module "vpc" { + source = "terraform-aws-modules/vpc/aws" + version = "~> 5.0" + + name = local.name + cidr = local.vpc_cidr + + azs = local.azs + public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)] + private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 10)] + database_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 20)] + + enable_nat_gateway = true + single_nat_gateway = true + enable_dns_hostnames = true + + # using the database subnet method since it allows a public route + create_database_subnet_group = true + create_database_subnet_route_table = true + create_database_internet_gateway_route = true + + # Manage so we can name + manage_default_network_acl = true + default_network_acl_tags = { Name = "${local.name}-default" } + manage_default_route_table = true + default_route_table_tags = { Name = "${local.name}-default" } + manage_default_security_group = true + default_security_group_tags = { Name = "${local.name}-default" } + + public_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/elb" = 1 + } + + private_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/internal-elb" = 1 + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# F5/NGINX Resources +#--------------------------------------------------------------- + +module "jumphost" { + source = "../modules/jumphost" + + prefix = local.name + region = var.region + vpc_id = module.vpc.vpc_id + public_subnets = module.vpc.database_subnets + random = local.build + ec2_key = var.ec2_key +} + +module "big-ip" { + source = "../modules/bigip" + + projectPrefix = local.name + random = local.build + region = var.region + vpcId = module.vpc.vpc_id + mgmt_subnet_ids = module.vpc.database_subnets + f5_username = var.f5_username + f5_password = var.f5_password + ec2_key_name = var.ec2_key + eks_cluster_sg = module.eks.cluster_security_group_id + eks_node_sg = module.eks.node_security_group_id +} diff --git a/resources/terraform/f5xc-aws-polsup/min-iam-policy.json b/resources/terraform/f5xc-aws-polsup/min-iam-policy.json new file mode 100644 index 0000000..cf716ea --- /dev/null +++ b/resources/terraform/f5xc-aws-polsup/min-iam-policy.json @@ -0,0 +1,105 @@ +{ + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "ec2:AllocateAddress", + "ec2:AssociateRouteTable", + "ec2:AttachInternetGateway", + "ec2:AuthorizeSecurityGroupEgress", + "ec2:AuthorizeSecurityGroupIngress", + "ec2:CreateInternetGateway", + "ec2:CreateNatGateway", + "ec2:CreateNetworkAclEntry", + "ec2:CreateRoute", + "ec2:CreateRouteTable", + "ec2:CreateSecurityGroup", + "ec2:CreateSubnet", + "ec2:CreateTags", + "ec2:CreateVpc", + "ec2:DeleteInternetGateway", + "ec2:DeleteNatGateway", + "ec2:DeleteNetworkAclEntry", + "ec2:DeleteRoute", + "ec2:DeleteRouteTable", + "ec2:DeleteSecurityGroup", + "ec2:DeleteSubnet", + "ec2:DeleteTags", + "ec2:DeleteVpc", + "ec2:DescribeAccountAttributes", + "ec2:DescribeAddresses", + "ec2:DescribeAvailabilityZones", + "ec2:DescribeInternetGateways", + "ec2:DescribeNatGateways", + "ec2:DescribeNetworkAcls", + "ec2:DescribeNetworkInterfaces", + "ec2:DescribeRouteTables", + "ec2:DescribeSecurityGroups", + "ec2:DescribeSubnets", + "ec2:DescribeTags", + "ec2:DescribeVpcAttribute", + "ec2:DescribeVpcClassicLink", + "ec2:DescribeVpcClassicLinkDnsSupport", + "ec2:DescribeVpcs", + "ec2:DetachInternetGateway", + "ec2:DisassociateRouteTable", + "ec2:ModifySubnetAttribute", + "ec2:ModifyVpcAttribute", + "ec2:ReleaseAddress", + "ec2:RevokeSecurityGroupEgress", + "ec2:RevokeSecurityGroupIngress", + "eks:CreateAddon", + "eks:CreateCluster", + "eks:CreateNodegroup", + "eks:DeleteAddon", + "eks:DeleteCluster", + "eks:DeleteNodegroup", + "eks:DescribeAddon", + "eks:DescribeAddonVersions", + "eks:DescribeCluster", + "eks:DescribeNodegroup", + "iam:AddRoleToInstanceProfile", + "iam:AttachRolePolicy", + "iam:CreateInstanceProfile", + "iam:CreateOpenIDConnectProvider", + "iam:CreatePolicy", + "iam:CreateRole", + "iam:CreateServiceLinkedRole", + "iam:DeleteInstanceProfile", + "iam:DeleteOpenIDConnectProvider", + "iam:DeletePolicy", + "iam:DeleteRole", + "iam:DetachRolePolicy", + "iam:GetInstanceProfile", + "iam:GetOpenIDConnectProvider", + "iam:GetPolicy", + "iam:GetPolicyVersion", + "iam:GetRole", + "iam:ListAttachedRolePolicies", + "iam:ListInstanceProfilesForRole", + "iam:ListPolicyVersions", + "iam:ListRolePolicies", + "iam:PassRole", + "iam:RemoveRoleFromInstanceProfile", + "iam:TagInstanceProfile", + "kms:CreateAlias", + "kms:CreateKey", + "kms:DeleteAlias", + "kms:DescribeKey", + "kms:EnableKeyRotation", + "kms:GetKeyPolicy", + "kms:GetKeyRotationStatus", + "kms:ListAliases", + "kms:ListResourceTags", + "kms:PutKeyPolicy", + "kms:ScheduleKeyDeletion", + "kms:TagResource", + "s3:GetObject", + "s3:ListBucket", + "s3:PutObject" + ], + "Resource": "*" + } + ] +} diff --git a/resources/terraform/f5xc-aws-polsup/variables.tf b/resources/terraform/f5xc-aws-polsup/variables.tf index e69de29..7514748 100644 --- a/resources/terraform/f5xc-aws-polsup/variables.tf +++ b/resources/terraform/f5xc-aws-polsup/variables.tf @@ -0,0 +1,66 @@ +# tflint-ignore: terraform_unused_declarations +variable "cluster_name" { + description = "Name of cluster - used by Terratest for e2e test automation" + type = string + default = "f5xc-icap" +} + +variable "cluster_version" { + description = "The Version of Kubernetes to deploy" + type = string + default = "1.25" +} + +variable "region" { + description = "Name of AWS deployment region" + type = string + default = "ap-southeast-2" +} + +variable "vpc_cidr" { + description = "CIDR of deployment VPC" + type = string + default = "10.0.0.0/16" +} + +variable "name" { + description = "Name prefix of deployment" + type = string + default = "f5xc-icap" +} + +variable "owner" { + description = "Deployment owner" + type = string + default = "f5-aatt" +} + +variable "instance" { + description = "Deployment EC2 instance type" + type = string + default = "t3.xlarge" +} + +variable "app" { + description = "Deployment Application" + type = string + default = "OTel AstroShop" +} + +variable "ec2_key" { + description = "EC2 Deployment Keypair" + type = string + default = "mkennedy@f5" +} + +variable "f5_username" { + description = "User name for the BIG-IP (Note: currently not used. Defaults to 'admin' based on AMI" + type = string + default = "admin" +} + +variable "f5_password" { + description = "BIG-IP Password or Secret ARN (value should be ARN of secret when aws_secretmanager_auth = true, ex. arn:aws:secretsmanager:us-west-2:1234:secret:bigip-secret-abcd)" + type = string + default = "Default12345!" +} \ No newline at end of file diff --git a/resources/terraform/f5xc-aws-polsup/versions.tf b/resources/terraform/f5xc-aws-polsup/versions.tf index e69de29..df4e90b 100644 --- a/resources/terraform/f5xc-aws-polsup/versions.tf +++ b/resources/terraform/f5xc-aws-polsup/versions.tf @@ -0,0 +1,30 @@ +terraform { + required_version = ">= 1.0.0" + + required_providers { + aws = { + source = "hashicorp/aws" + version = ">= 3.72" + } + kubernetes = { + source = "hashicorp/kubernetes" + version = ">= 2.10" + } + helm = { + source = "hashicorp/helm" + version = ">= 2.4.1" + } + volterra = { + source = "volterraedge/volterra" + # version = "0.7.1" + version = ">= 0.7" + } + } + + # ## Used for end-to-end testing on project; update to suit your needs + # backend "s3" { + # bucket = "terraform-ssp-github-actions-state" + # region = "us-west-2" + # key = "e2e/eks-cluster-with-new-vpc/terraform.tfstate" + # } +} \ No newline at end of file -- GitLab From 2dfca15a2c80da65580da0b35967ff90b8a6cb0b Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:07:03 +1000 Subject: [PATCH 04/14] additions of juice-shop manifests --- resources/terraform/polsup-eks-cis/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/resources/terraform/polsup-eks-cis/README.md b/resources/terraform/polsup-eks-cis/README.md index c33de77..4b37458 100644 --- a/resources/terraform/polsup-eks-cis/README.md +++ b/resources/terraform/polsup-eks-cis/README.md @@ -1,7 +1,7 @@ [![license](https://img.shields.io/github/license/f5devcentral/adaptiveapps)](../../LICENSE) [![standard-readme compliant](https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square)](https://github.com/RichardLitt/standard-readme) -# DevSecOps with PolicySupervisor +# PolicySupervisor with F5 BIG-IP AWAF & AWS EKS ## Table of Contents -- GitLab From 1e9514597924205cf04b2c8dfa65799bad52cece Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:15:17 +1000 Subject: [PATCH 05/14] PolicySupervisor NGINX/NAP & AWS EKS --- resources/terraform/polsup-eks-nginx/README.md | 15 +++++++++++++++ resources/terraform/polsup-eks-nginx/main.tf | 0 resources/terraform/polsup-eks-nginx/outputs.tf | 0 resources/terraform/polsup-eks-nginx/variables.tf | 0 resources/terraform/polsup-eks-nginx/versions.tf | 0 5 files changed, 15 insertions(+) create mode 100644 resources/terraform/polsup-eks-nginx/README.md create mode 100644 resources/terraform/polsup-eks-nginx/main.tf create mode 100644 resources/terraform/polsup-eks-nginx/outputs.tf create mode 100644 resources/terraform/polsup-eks-nginx/variables.tf create mode 100644 resources/terraform/polsup-eks-nginx/versions.tf diff --git a/resources/terraform/polsup-eks-nginx/README.md b/resources/terraform/polsup-eks-nginx/README.md new file mode 100644 index 0000000..c33de77 --- /dev/null +++ b/resources/terraform/polsup-eks-nginx/README.md @@ -0,0 +1,15 @@ +[![license](https://img.shields.io/github/license/f5devcentral/adaptiveapps)](../../LICENSE) +[![standard-readme compliant](https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square)](https://github.com/RichardLitt/standard-readme) + +# DevSecOps with PolicySupervisor + +## Table of Contents + +
+Click to expand. + +
+ +## TODO + +- [ ] `README.md` diff --git a/resources/terraform/polsup-eks-nginx/main.tf b/resources/terraform/polsup-eks-nginx/main.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/polsup-eks-nginx/outputs.tf b/resources/terraform/polsup-eks-nginx/outputs.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/polsup-eks-nginx/variables.tf b/resources/terraform/polsup-eks-nginx/variables.tf new file mode 100644 index 0000000..e69de29 diff --git a/resources/terraform/polsup-eks-nginx/versions.tf b/resources/terraform/polsup-eks-nginx/versions.tf new file mode 100644 index 0000000..e69de29 -- GitLab From 38891ec0f1e4e1f31d38922583f9d6a6056abb4e Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:16:52 +1000 Subject: [PATCH 06/14] additions of juice-shop manifests --- resources/terraform/polsup-eks-cis/README.md | 80 +++++++++++++++++++ .../terraform/polsup-eks-cis/as_built.md | 61 ++++++++++++++ 2 files changed, 141 insertions(+) create mode 100644 resources/terraform/polsup-eks-cis/as_built.md diff --git a/resources/terraform/polsup-eks-cis/README.md b/resources/terraform/polsup-eks-cis/README.md index 4b37458..a6253d2 100644 --- a/resources/terraform/polsup-eks-cis/README.md +++ b/resources/terraform/polsup-eks-cis/README.md @@ -1,15 +1,95 @@ [![license](https://img.shields.io/github/license/f5devcentral/adaptiveapps)](../../LICENSE) [![standard-readme compliant](https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square)](https://github.com/RichardLitt/standard-readme) + # PolicySupervisor with F5 BIG-IP AWAF & AWS EKS + +___ ## Table of Contents
Click to expand. +- [Background](#background) +- [Value](#value) +- [Prerequisites](#prerequisites) +- [Installation](#installation) +- [Configuration](#configuration) +- [Decommission](#decommission) +- [TODO](#todo) +- [Contributing](#contributing) +- [License](#license) +- [Credits](#credits) +
+___ +## Background + + +___ +## Value + + +___ +## Prerequisites + + +___ +## Installation + + +___ +## Configuration + + +___ +## Decommission + + +___ ## TODO - [ ] `README.md` + + +___ +## Support + +The contents of this repository are meant to serve as examples and are not covered by F5 support. +If you come across a bug or other issue when using these recipes, please open a GitHub issue to help our team keep track +of content that needs improvement. +Note, the code in this repository is community supported and is not supported by F5 Inc. For a complete list of +supported projects please reference [SUPPORT.md](../../SUPPORT.md). + + +___ +## Community Code of Conduct + +Please refer to the [F5 DevCentral Community Code of Conduct](../../code_of_conduct.md). + + +___ +## License + +The contents of this repository are made available under two license. +All documentation, specifically any Markdown files, is licensed under +[CC BY-SA 4.0](https://creativecommons.org/licenses/by-sa/4.0/legalcode). +Everything else is licensed under [Apache 2.0](../../LICENSE). + + +___ +## Copyright + +Copyright 2014-2022 F5 Networks Inc. + + +___ +## Contributing + +See [the contributing file](../../CONTRIBUTING.md)! + + +___ +## Credits \ No newline at end of file diff --git a/resources/terraform/polsup-eks-cis/as_built.md b/resources/terraform/polsup-eks-cis/as_built.md new file mode 100644 index 0000000..e6bab7f --- /dev/null +++ b/resources/terraform/polsup-eks-cis/as_built.md @@ -0,0 +1,61 @@ +# AsBuilt Raw PolicySupervisor with cBIP/CIS/EKS + +## WorkFlow + +This is a quick how to for readme; + +### Deploy AWS EKS and BIG-IP EC2 Infrastructure + +1. Set `AWS_REGION` & `AWS_TOKEN` + +2. After GitClone/Get, update `TFVARS`, then +```shell +terraform init --upgrade +``` + +3. Validate; +```shell +terraform validate +``` + +4. Build; +```shell +terraform apply -auto-approve +``` + +5. Update `~/.kube/config`; +```shell +aws eks --region update-kubeconfig --name +``` + +6. Connect/Update BIG-IP admin password; +```shell +ssh -i ~/.ssh/id_rsa admin@ +tmsh modify auth password admin +``` + +7. Connect/Create CIS BIG-IP Partition; +```shell +tmsh create auth partition cispartition +tmsh save sys config +exit +``` + +8. Add CIS/k8s secret creds; +```shell +kubectl create secret generic f5-bigip-ctlr-login -n kube-system --from-literal=username=admin --from-literal=password= +``` + +9. Deploy RBAC for CIS/k8s with ServiceAccount; +```shell +kubectl create -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/master/docs/config_examples/rbac/clusterrole.yaml +``` + + +### `bigip-ctl-cis` Deployment Preparation + +10. Update `src/k8s-manifests/cis/as3.yaml` to reflect the *selfIP* of the BIG-IP Virtual Server; + * Replace `"virtualAddresses": ["{$selfIP}"],` with the VS IP. For single NIC, this is the self IP address. + +11. Update `src/k8s-manifests/cis/cis-deployment.yaml` to reflect the Public ManagementIP of the BIG-IP; + * Replace `"--bigip-url=https://{$mgmtPublicIP}:8443"` with the ManagementIP. For single NIC, this is the self IP address. \ No newline at end of file -- GitLab From 7e6a3d190981e09230480459dec9219432076cf2 Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:22:16 +1000 Subject: [PATCH 07/14] base commit for NAP & AWS EKS --- .../terraform/polsup-eks-nginx/README.md | 81 ++++++- .../terraform/polsup-eks-nginx/as_built.md | 29 +++ resources/terraform/polsup-eks-nginx/main.tf | 226 ++++++++++++++++++ .../polsup-eks-nginx/min-iam-policy.json | 105 ++++++++ .../terraform/polsup-eks-nginx/outputs.tf | 65 +++++ .../terraform/polsup-eks-nginx/variables.tf | 54 +++++ .../terraform/polsup-eks-nginx/versions.tf | 25 ++ 7 files changed, 584 insertions(+), 1 deletion(-) create mode 100644 resources/terraform/polsup-eks-nginx/as_built.md create mode 100644 resources/terraform/polsup-eks-nginx/min-iam-policy.json diff --git a/resources/terraform/polsup-eks-nginx/README.md b/resources/terraform/polsup-eks-nginx/README.md index c33de77..df9d97a 100644 --- a/resources/terraform/polsup-eks-nginx/README.md +++ b/resources/terraform/polsup-eks-nginx/README.md @@ -1,15 +1,94 @@ [![license](https://img.shields.io/github/license/f5devcentral/adaptiveapps)](../../LICENSE) [![standard-readme compliant](https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square)](https://github.com/RichardLitt/standard-readme) -# DevSecOps with PolicySupervisor +# PolicySupervisor with NGINX NAP & AWS EKS + +___ ## Table of Contents
Click to expand. +- [Background](#background) +- [Value](#value) +- [Prerequisites](#prerequisites) +- [Installation](#installation) +- [Configuration](#configuration) +- [Decommission](#decommission) +- [TODO](#todo) +- [Contributing](#contributing) +- [License](#license) +- [Credits](#credits) +
+___ +## Background + + +___ +## Value + + +___ +## Prerequisites + + +___ +## Installation + + +___ +## Configuration + + +___ +## Decommission + + +___ ## TODO - [ ] `README.md` + + +___ +## Support + +The contents of this repository are meant to serve as examples and are not covered by F5 support. +If you come across a bug or other issue when using these recipes, please open a GitHub issue to help our team keep track +of content that needs improvement. +Note, the code in this repository is community supported and is not supported by F5 Inc. For a complete list of +supported projects please reference [SUPPORT.md](../../SUPPORT.md). + + +___ +## Community Code of Conduct + +Please refer to the [F5 DevCentral Community Code of Conduct](../../code_of_conduct.md). + + +___ +## License + +The contents of this repository are made available under two license. +All documentation, specifically any Markdown files, is licensed under +[CC BY-SA 4.0](https://creativecommons.org/licenses/by-sa/4.0/legalcode). +Everything else is licensed under [Apache 2.0](../../LICENSE). + + +___ +## Copyright + +Copyright 2014-2022 F5 Networks Inc. + + +___ +## Contributing + +See [the contributing file](../../CONTRIBUTING.md)! + + +___ +## Credits \ No newline at end of file diff --git a/resources/terraform/polsup-eks-nginx/as_built.md b/resources/terraform/polsup-eks-nginx/as_built.md new file mode 100644 index 0000000..1077bfa --- /dev/null +++ b/resources/terraform/polsup-eks-nginx/as_built.md @@ -0,0 +1,29 @@ +# AsBuilt Raw PolicySupervisor with cBIP/CIS/EKS + +## WorkFlow + +This is a quick how to for readme; + +### Deploy AWS EKS and NGINX NAP Infrastructure + +1. Set `AWS_REGION` & `AWS_TOKEN` + +2. After GitClone/Get, update `TFVARS`, then +```shell +terraform init --upgrade +``` + +3. Validate; +```shell +terraform validate +``` + +4. Build; +```shell +terraform apply -auto-approve +``` + +5. Update `~/.kube/config`; +```shell +aws eks --region update-kubeconfig --name +``` \ No newline at end of file diff --git a/resources/terraform/polsup-eks-nginx/main.tf b/resources/terraform/polsup-eks-nginx/main.tf index e69de29..7eb4865 100644 --- a/resources/terraform/polsup-eks-nginx/main.tf +++ b/resources/terraform/polsup-eks-nginx/main.tf @@ -0,0 +1,226 @@ +provider "aws" { + region = local.region +} + +provider "kubernetes" { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } +} + +provider "helm" { + kubernetes { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } + } +} + +data "aws_availability_zones" "available" { + filter { + name = "opt-in-status" + values = ["opt-in-not-required"] + } +} + +resource "random_id" "id" { + byte_length = 2 +} + +locals { + region = var.region + vpc_cidr = var.vpc_cidr + azs = slice(data.aws_availability_zones.available.names, 0, 3) + + build = random_id.id.hex + name = coalesce(var.name, local.build) + # var.cluster_name is for Terratest + cluster_name = coalesce(var.cluster_name, local.name) + + # Mapping + cluster_version = var.cluster_version + metrics_server = true + aws_load_balancer_controller = true + cert_manager = true + cloudwatch_metrics = true + vpa = true + kubecost = true + + tags = { + Owner = var.owner + Application = var.app + } +} + + +#--------------------------------------------------------------- +# EKS Blueprints +#--------------------------------------------------------------- + +module "eks" { + source = "terraform-aws-modules/eks/aws" + version = "~> 19.13" + + cluster_name = local.cluster_name + cluster_version = local.cluster_version + cluster_endpoint_public_access = true + + vpc_id = module.vpc.vpc_id + subnet_ids = module.vpc.private_subnets + + cluster_addons = { + coredns = {} + kube-proxy = {} + vpc-cni = {} + } + + eks_managed_node_groups = { + (local.cluster_name) = { + node_group_name = "managed-ondemand" + instance_types = [var.instance] + min_size = 3 + max_size = 3 + desired_size = 3 + subnet_ids = module.vpc.private_subnets + } + } + + tags = local.tags +} + + +module "eks_blueprints_addons" { + source = "github.com/aws-ia/terraform-aws-eks-blueprints//modules/kubernetes-addons?ref=v4.32.1" + + eks_cluster_id = module.eks.cluster_name + eks_cluster_endpoint = module.eks.cluster_endpoint + eks_cluster_version = module.eks.cluster_version + eks_oidc_provider = module.eks.oidc_provider + eks_oidc_provider_arn = module.eks.oidc_provider_arn + + # Add-ons + enable_amazon_eks_aws_ebs_csi_driver = true + amazon_eks_aws_ebs_csi_driver_config = { + most_recent = true + kubernetes_version = local.cluster_version + resolve_conflicts = "OVERWRITE" + } + enable_aws_load_balancer_controller = true + aws_load_balancer_controller_helm_config = { + service_account = "aws-lb-sa" + } + enable_cert_manager = true + enable_metrics_server = true + + tags = local.tags +} + +module "ebs_csi_driver_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-ebs-csi-driver-" + + attach_ebs_csi_policy = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:ebs-csi-controller-sa"] + } + } + + tags = local.tags +} + +module "vpc_cni_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-vpc-cni-" + + attach_vpc_cni_policy = true + vpc_cni_enable_ipv4 = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:aws-node"] + } + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# Supporting Resources +#--------------------------------------------------------------- + +module "vpc" { + source = "terraform-aws-modules/vpc/aws" + version = "~> 5.0" + + name = local.name + cidr = local.vpc_cidr + + azs = local.azs + public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)] + private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 10)] + database_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 20)] + + enable_nat_gateway = true + single_nat_gateway = true + enable_dns_hostnames = true + + # using the database subnet method since it allows a public route + create_database_subnet_group = true + create_database_subnet_route_table = true + create_database_internet_gateway_route = true + + # Manage so we can name + manage_default_network_acl = true + default_network_acl_tags = { Name = "${local.name}-default" } + manage_default_route_table = true + default_route_table_tags = { Name = "${local.name}-default" } + manage_default_security_group = true + default_security_group_tags = { Name = "${local.name}-default" } + + public_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/elb" = 1 + } + + private_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/internal-elb" = 1 + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# F5/NGINX Resources +#--------------------------------------------------------------- + +module "jumphost" { + source = "../modules/jumphost" + + prefix = local.name + region = var.region + vpc_id = module.vpc.vpc_id + public_subnets = module.vpc.database_subnets + random = local.build + ec2_key = var.ec2_key +} \ No newline at end of file diff --git a/resources/terraform/polsup-eks-nginx/min-iam-policy.json b/resources/terraform/polsup-eks-nginx/min-iam-policy.json new file mode 100644 index 0000000..cf716ea --- /dev/null +++ b/resources/terraform/polsup-eks-nginx/min-iam-policy.json @@ -0,0 +1,105 @@ +{ + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "ec2:AllocateAddress", + "ec2:AssociateRouteTable", + "ec2:AttachInternetGateway", + "ec2:AuthorizeSecurityGroupEgress", + "ec2:AuthorizeSecurityGroupIngress", + "ec2:CreateInternetGateway", + "ec2:CreateNatGateway", + "ec2:CreateNetworkAclEntry", + "ec2:CreateRoute", + "ec2:CreateRouteTable", + "ec2:CreateSecurityGroup", + "ec2:CreateSubnet", + "ec2:CreateTags", + "ec2:CreateVpc", + "ec2:DeleteInternetGateway", + "ec2:DeleteNatGateway", + "ec2:DeleteNetworkAclEntry", + "ec2:DeleteRoute", + "ec2:DeleteRouteTable", + "ec2:DeleteSecurityGroup", + "ec2:DeleteSubnet", + "ec2:DeleteTags", + "ec2:DeleteVpc", + "ec2:DescribeAccountAttributes", + "ec2:DescribeAddresses", + "ec2:DescribeAvailabilityZones", + "ec2:DescribeInternetGateways", + "ec2:DescribeNatGateways", + "ec2:DescribeNetworkAcls", + "ec2:DescribeNetworkInterfaces", + "ec2:DescribeRouteTables", + "ec2:DescribeSecurityGroups", + "ec2:DescribeSubnets", + "ec2:DescribeTags", + "ec2:DescribeVpcAttribute", + "ec2:DescribeVpcClassicLink", + "ec2:DescribeVpcClassicLinkDnsSupport", + "ec2:DescribeVpcs", + "ec2:DetachInternetGateway", + "ec2:DisassociateRouteTable", + "ec2:ModifySubnetAttribute", + "ec2:ModifyVpcAttribute", + "ec2:ReleaseAddress", + "ec2:RevokeSecurityGroupEgress", + "ec2:RevokeSecurityGroupIngress", + "eks:CreateAddon", + "eks:CreateCluster", + "eks:CreateNodegroup", + "eks:DeleteAddon", + "eks:DeleteCluster", + "eks:DeleteNodegroup", + "eks:DescribeAddon", + "eks:DescribeAddonVersions", + "eks:DescribeCluster", + "eks:DescribeNodegroup", + "iam:AddRoleToInstanceProfile", + "iam:AttachRolePolicy", + "iam:CreateInstanceProfile", + "iam:CreateOpenIDConnectProvider", + "iam:CreatePolicy", + "iam:CreateRole", + "iam:CreateServiceLinkedRole", + "iam:DeleteInstanceProfile", + "iam:DeleteOpenIDConnectProvider", + "iam:DeletePolicy", + "iam:DeleteRole", + "iam:DetachRolePolicy", + "iam:GetInstanceProfile", + "iam:GetOpenIDConnectProvider", + "iam:GetPolicy", + "iam:GetPolicyVersion", + "iam:GetRole", + "iam:ListAttachedRolePolicies", + "iam:ListInstanceProfilesForRole", + "iam:ListPolicyVersions", + "iam:ListRolePolicies", + "iam:PassRole", + "iam:RemoveRoleFromInstanceProfile", + "iam:TagInstanceProfile", + "kms:CreateAlias", + "kms:CreateKey", + "kms:DeleteAlias", + "kms:DescribeKey", + "kms:EnableKeyRotation", + "kms:GetKeyPolicy", + "kms:GetKeyRotationStatus", + "kms:ListAliases", + "kms:ListResourceTags", + "kms:PutKeyPolicy", + "kms:ScheduleKeyDeletion", + "kms:TagResource", + "s3:GetObject", + "s3:ListBucket", + "s3:PutObject" + ], + "Resource": "*" + } + ] +} diff --git a/resources/terraform/polsup-eks-nginx/outputs.tf b/resources/terraform/polsup-eks-nginx/outputs.tf index e69de29..40ca997 100644 --- a/resources/terraform/polsup-eks-nginx/outputs.tf +++ b/resources/terraform/polsup-eks-nginx/outputs.tf @@ -0,0 +1,65 @@ +output "vpc_private_subnet_cidr" { + description = "VPC private subnet CIDR" + value = module.vpc.private_subnets_cidr_blocks +} + +output "vpc_public_subnet_cidr" { + description = "VPC public subnet CIDR" + value = module.vpc.public_subnets_cidr_blocks +} + +output "vpc_management_subnet_cidr" { + description = "VPC Management subnet CIDR" + value = module.vpc.database_subnets_cidr_blocks +} + +output "vpc_cidr" { + description = "VPC CIDR" + value = module.vpc.vpc_cidr_block +} +/* +output "eks_cluster_name" { + description = "EKS cluster ID" + value = module.eks_blueprints_addons.eks_cluster_name +} + +output "eks_managed_nodegroups" { + description = "EKS managed node groups" + value = module.eks_blueprints.managed_node_groups +} + +output "eks_managed_nodegroup_ids" { + description = "EKS managed node group ids" + value = module.eks_blueprints.managed_node_groups_id +} + +output "eks_managed_nodegroup_arns" { + description = "EKS managed node group arns" + value = module.eks_blueprints.managed_node_group_arn +} + +output "eks_managed_nodegroup_role_name" { + description = "EKS managed node group role name" + value = module.eks_blueprints.managed_node_group_iam_role_names +} + +output "eks_managed_nodegroup_status" { + description = "EKS managed node group status" + value = module.eks_blueprints.managed_node_groups_status +} + +output "configure_kubectl" { + description = "Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig" + value = module.eks_blueprints.configure_kubectl +} +*/ +# Region used for Terratest +output "region" { + description = "AWS region" + value = local.region +} + +output "jumpbox_public_dns" { + description = "Public DNS address of Jumpbox" + value = module.jumphost.public_dns +} diff --git a/resources/terraform/polsup-eks-nginx/variables.tf b/resources/terraform/polsup-eks-nginx/variables.tf index e69de29..10af7f0 100644 --- a/resources/terraform/polsup-eks-nginx/variables.tf +++ b/resources/terraform/polsup-eks-nginx/variables.tf @@ -0,0 +1,54 @@ +# tflint-ignore: terraform_unused_declarations +variable "cluster_name" { + description = "Name of cluster - used by Terratest for e2e test automation" + type = string + default = "polsup-nap" +} + +variable "cluster_version" { + description = "The Version of Kubernetes to deploy" + type = string + default = "1.25" +} + +variable "region" { + description = "Name of AWS deployment region" + type = string + default = "ap-southeast-2" +} + +variable "vpc_cidr" { + description = "CIDR of deployment VPC" + type = string + default = "10.0.0.0/16" +} + +variable "name" { + description = "Name prefix of deployment" + type = string + default = "polsup-nap" +} + +variable "owner" { + description = "Deployment owner" + type = string + default = "f5-aatt" +} + +variable "instance" { + description = "Deployment EC2 instance type" + type = string + default = "t3.xlarge" +} + +variable "app" { + description = "Deployment Application" + type = string + default = "OTel AstroShop" +} + +variable "ec2_key" { + description = "EC2 Deployment Keypair" + type = string + default = "mjk-aatt-fy23q2" +} diff --git a/resources/terraform/polsup-eks-nginx/versions.tf b/resources/terraform/polsup-eks-nginx/versions.tf index e69de29..a967321 100644 --- a/resources/terraform/polsup-eks-nginx/versions.tf +++ b/resources/terraform/polsup-eks-nginx/versions.tf @@ -0,0 +1,25 @@ +terraform { + required_version = ">= 1.0.0" + + required_providers { + aws = { + source = "hashicorp/aws" + version = ">= 3.72" + } + kubernetes = { + source = "hashicorp/kubernetes" + version = ">= 2.10" + } + helm = { + source = "hashicorp/helm" + version = ">= 2.4.1" + } + } + + # ## Used for end-to-end testing on project; update to suit your needs + # backend "s3" { + # bucket = "terraform-ssp-github-actions-state" + # region = "us-west-2" + # key = "e2e/eks-cluster-with-new-vpc/terraform.tfstate" + # } +} -- GitLab From b3128c890e1f4ba24bc6b713d2c2ada3f4bc30ac Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:27:40 +1000 Subject: [PATCH 08/14] housekeeping on README.md --- resources/README.md | 3 ++- resources/terraform/README.md | 5 ++++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/resources/README.md b/resources/README.md index 8e022ae..0acd568 100644 --- a/resources/README.md +++ b/resources/README.md @@ -23,7 +23,8 @@ * [`cis`](./k8s-manifests/cis/) are the required kubectl manifests files for BIG-IP CIS installation * [`ingresslink`](./k8s-manifests/ingresslink/) are the required kubectl manifest files for CIS/IngressLink installation * [`datadog`](./k8s-manifests/datadog/) are the datadog agent manifest files. -* [`f5xc-icap`](./k8s-manifests/f5xc-icap/) is a F5XC ICAP deployment based upon clamAV from [UKHomeOffice](https://github.com/UKHomeOffice/clamav-http) +* [`f5xc-icap`](./k8s-manifests/f5xc-icap/) is a F5XC ICAP deployment based upon clamAV +* [`juice-shop`](./k8s-manifests/juice-shop) are service and deployment manifests for OWASP JuiceShop [`docker-builds`](./docker) contains the various `dockerbuild` files for demostacks diff --git a/resources/terraform/README.md b/resources/terraform/README.md index 6b1c028..fa57a0b 100644 --- a/resources/terraform/README.md +++ b/resources/terraform/README.md @@ -8,4 +8,7 @@ Located in this path are the terraform modules used for AATT Resources; * [`f5-shop-demo`](./f5xc-shop-demo/) is the Online vK8s shop demo * [`modules`](./modules/) are a WIP for supporting modules to simplify stacks * [`aws-microservices`](./aws-microservices/) is a WIP for turnkey ModernApplication (microservices) workloads - * [`f5xc-icap`](./f5xc-icap/) is a vk8s clamAV http/api deployment \ No newline at end of file + * [`f5xc-icap`](./f5xc-icap/) is a vk8s clamAV http/api deployment for F5XC Regional Edges (RE) + * [`f5xc-aws-icap`](./f5xc-aws-icap/) is a vk8s clamAV http/api deployment for F5XC Customer Edges (CE) in AWS + * [`polsup-eks-cis`](./polsup-eks-cis/) is a JuiceShop deployment using AWS EKS and BIG-IP AWAF & CIS for PolicySupervisor + * [`polsup-eks-nap`](./polsup-eks-nap/) is a JuiceShop deployment using AWS EKS and NGINX KIC & NAP for PolicySupervisor \ No newline at end of file -- GitLab From 50f6a6ae12afc677073bb2c38389634954f2c4e7 Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:28:53 +1000 Subject: [PATCH 09/14] housekeeping on README.md --- resources/README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/resources/README.md b/resources/README.md index 0acd568..4fc2b11 100644 --- a/resources/README.md +++ b/resources/README.md @@ -11,6 +11,9 @@ * [`modules`](./terraform/modules/) are a WIP for supporting modules to simplify stacks * [`aws-microservices`](./terraform/aws-microservices/) is a WIP for turnkey ModernApplication (microservices) workloads * [`f5xc-icap`](./terraform/f5xc-icap/) is a vk8s clamAV http/api deployment + * [`f5xc-aws-icap`](./terraform/f5xc-aws-icap/) is a vk8s clamAV http/api deployment for F5XC Customer Edges (CE) in AWS + * [`polsup-eks-cis`](./terraform/polsup-eks-cis/) is a JuiceShop deployment using AWS EKS and BIG-IP AWAF & CIS for PolicySupervisor + * [`polsup-eks-nap`](./terraform/polsup-eks-nap/) is a JuiceShop deployment using AWS EKS and NGINX KIC & NAP for PolicySupervisor [`helm-values`](./helm-values/) is the required helm values for the OTel/NGINX IngressController Astro demostack -- GitLab From f080c9bde0a2b37949cdf7454d60b684d047b32f Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Mon, 17 Jul 2023 15:38:57 +1000 Subject: [PATCH 10/14] housekeeping on README.md --- README.md | 20 ++++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index a707d91..11e33fd 100644 --- a/README.md +++ b/README.md @@ -29,14 +29,18 @@ Find out more about adaptive applications on [F5's Website](https://www.f5.com/c ## Resource Inventory -| Resource | Description | Used By | -|---------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------| -| [F5 NGINX Management Suite](resources/f5-nginx-management-suite) | Terraform and Ansible artifacts to deploy F5 NGINX Management Suite to virtual machines | [Deploy API to NGINX Management Suite](solutions/deploy-api-to-f5-nginx-management-suite) | -| [F5 DistributedCloud & AWS EKS](resources/f5xc-vk8s-mk8s-nlb/) | Deployment instructions and artifacts to demonstrate Kubernetes multi-cluster resiliency | [Multi-Cluster Application Resilience](solutions/k8s-mutlicluster-resilency/) | -| [F5 NGINX & AWS EKS](resources/terraform/aws-eks-nginx-kic/) | Deployment instructions and artifacts to demonstrate OpenTelemetry using NGINX & EKS | TBA | -| [F5 BIG-IP CIS & AWS EKS](resources/terraform/aws-eks-cbip-cis/) | Deployment instructions and artifacts to demonstrate OpenTelemetry using F5 BIG-IP CIS & EKS | TBA | -| [F5 IngressLink & AWS EKS](resources/terraform/aws-eks-cbip-ingresslink/) | Deployment instructions and artifacts to demonstrate OpenTelemetry using F5 BIG-IP/NGINX IngressLink & EKS | TBA | -| [F5 DistributedCloud](resources/terraform/f5xc-icap/) | Deployment instructions and artifacts to demonstrate clamAV ICAP vk8s deployment to F5XC | TBA | +| Resource | Description | Used By | +|---------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------| +| [F5 NGINX Management Suite](resources/f5-nginx-management-suite) | Terraform & Ansible artifacts to deploy F5 NGINX Management Suite to virtual machines | [Deploy API to NGINX Management Suite](solutions/deploy-api-to-f5-nginx-management-suite) | +| [F5 DistributedCloud & AWS EKS](resources/f5xc-vk8s-mk8s-nlb/) | Deployment instructions & artifacts to deploy Kubernetes multi-cluster resiliency | [Multi-Cluster Application Resilience](solutions/k8s-mutlicluster-resilency/) | +| [F5 NGINX & AWS EKS](resources/terraform/aws-eks-nginx-kic/) | Deployment instructions & artifacts to deploy OpenTelemetry using NGINX & EKS | TBA | +| [F5 BIG-IP CIS & AWS EKS](resources/terraform/aws-eks-cbip-cis/) | Deployment instructions & artifacts to deploy OpenTelemetry using F5 BIG-IP CIS & EKS | TBA | +| [F5 IngressLink & AWS EKS](resources/terraform/aws-eks-cbip-ingresslink/) | Deployment instructions & artifacts to deploy OpenTelemetry using F5 BIG-IP/NGINX IngressLink & EKS | TBA | +| [F5 DistributedCloud RE's](resources/terraform/f5xc-icap/) | Deployment instructions & artifacts to deploy clamAV ICAP vk8s deployment to F5XC for RE's | TBA | +| [F5 DistributedCloud CE's](resources/terraform/f5xc-aws-icap/) | Deployment instructions & artifacts to deploy clamAV ICAP vk8s deployment to F5XC for CE's | TBA | +| [F5 PolicySupervisor (AWAF)](resources/terraform/polsup-eks-cis/) | Deployment instructions & artifacts to deploy PolicySupervisor with JuiceShop using AWS EKS & BIG-IP AWAF | TBA | +| [F5 PolicySupervisor (NAP)](resources/terraform/polsup-eks-nap/) | Deployment instructions & artifacts to deploy PolicySupervisor with JuiceShop using AWS EKS & NGINX NAP | TBA | + ## Support -- GitLab From 71cd2dd3dc629b1b80c50ffeb4cb80a69360cc3d Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Tue, 18 Jul 2023 11:52:35 +1000 Subject: [PATCH 11/14] updates to CIS PolSup --- ...es_system_f5xc-icap_kubeconfig_global.yaml | 20 -- resources/terraform/polsup-eks-cis/main.tf | 241 ++++++++++++++++++ .../polsup-eks-cis/min-iam-policy.json | 105 ++++++++ resources/terraform/polsup-eks-cis/outputs.tf | 80 ++++++ .../terraform/polsup-eks-cis/variables.tf | 66 +++++ .../terraform/polsup-eks-cis/versions.tf | 29 +++ 6 files changed, 521 insertions(+), 20 deletions(-) delete mode 100644 resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml create mode 100644 resources/terraform/polsup-eks-cis/min-iam-policy.json diff --git a/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml b/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml deleted file mode 100644 index 0e123cb..0000000 --- a/resources/terraform/f5xc-aws-icap/ves_system_f5xc-icap_kubeconfig_global.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - certificate-authority-data: -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


 - server: https://f5-big-ip.console.ves.volterra.io/api/k8s/namespaces/system/site/f5xc-icap - name: f5xc-icap -contexts: -- context: - cluster: f5xc-icap - namespace: default - user: m.kennedy@f5.com - name: f5xc-icap -current-context: f5xc-icap -kind: Config -preferences: {} -users: -- user: - client-certificate-data: -----BEGIN CERTIFICATE-----
MIIFATCCAumgAwIBAgIQBVX5+Psa9ko8TcDfsN1V6DANBgkqhkiG9w0BAQsFADCB
tjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFDASBgNVBAcTC1Nh
bnRhIENsYXJhMR8wHQYDVQQKExZWb2x0ZXJyYSBFZGdlIFNlcnZpY2VzMSAwHgYD
VQQLExdJbmZyYXN0cnVjdHVyZSBTZWN1cml0eTE5MDcGA1UEAxMwUFJPRCAtIFRl
bmFudCBVc2VyIENlcnRpZmljYXRlIElzc3VpbmcgQ0EgLSB2Mi4xMB4XDTIzMDcx
MzA1MzA1OVoXDTIzMDczMTA1MzA1OVowLjERMA8GA1UEChMIdm9sdGVycmExGTAX
BgNVBAMTEFVTRVItQ0VSVElGSUNBVEUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
ggEKAoIBAQC4CiCiR99NzmXS3onkpHB2TlTgTvrewKKg6DbtodBImnebRePwRaO1
ZL7M2adSCbdrvK5jPiEBUGF+zJK0E/c5DDB7d6URgizffvs4PSqiXi4DlSuXmP4F
zrM/qDjPllO5RKstKEz2/VcZjl6840APGOQm+4EC67fCatG/ls9+rEu/AA+inbD6
xw9Yw7/Vd2h3u+Etfefd9adjuB3v2phqH6myFIx5ouMP1EK4pPHZ6qntUffCzy3J
RLdrJJhTxN3YioNCcJSJQuAN/KL7xHsBqe22/zFznRtA9UFNXAVsxk6tD6RFwo7O
JRccMJfepHzKNOKgkzmSBhUOgktpQNkzAgMBAAGjgZEwgY4wDgYDVR0PAQH/BAQD
AgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMCMB0GA1UdDgQWBBRYBAz1GVrhS0wan5Fz
STlx0gjAnjAiBgwrBgEEAYOhDgEBAQEEEgQQbS5rZW5uZWR5QGY1LmNvbTAkBgwr
BgEEAYOhDgEBAQIEFAQSZjUtYmlnLWlwLWdkeXhmbnVtMA0GCSqGSIb3DQEBCwUA
A4ICAQCHHOZiCODqST+gDBcUiOry9dCUcCB1r4tGhIZTuCavidUfCJIDHYzCY3A+
bGHKdV4mdd9vy9Xg6ruFEkTLjtodugzahsKQ1uFaZF3UA58cYiBQNqqcPasCu6Xr
idtYwINiTzV/f7j2ntEtreoA6uw33lpw9J9XOMIiKcPsxepR1XioN2IAGweTb1EN
Xz/JrftWas0/7S2drLTLrsgHJY+bkb6+fmXKxo8zjlmcMe3u0KuFTqRt2YdynIKy
FuzUs5z1CDtFDQYBMP2JbuPWq9bqvUAQOA3hUcXtPw4Evr3pMuKX/w2V9bx63Uma
DBaZBIr4+0CAbbH22wJLkFjmQquqhf8e6y/15idX4pV3cvs8/twXZdhn+DU6a6gE
HMbvzQMGiX60J+ZqMWR2Y2jFSWMPTmzoXGinQyPWcYZInAp1zEXILh63rJypnsdG
NBmvb/oi/RQRoObt4MTczgoYWCfDz05evSE6m41FxEwwR7dWn4EWprypUhUHe/Tn
3c0m07nqD9L6/CEQvT0638NS/oSjCWb4GBxyX6hLT82hjLZHUJcKLHKuhwxOrmjy
W3g/3etf9cPIW6iPr6ADkY4pHiNflJ+CLkDU99T9hG9oute5q5ZLTDi4B3ayc67+
F5arGUPFYfGa40CkQgOH8Eu37NX5t5HGXabtAtwqnJOHRPwJTA==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 - client-key-data: LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUV2UUlCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQktjd2dnU2pBZ0VBQW9JQkFRQzRDaUNpUjk5TnptWFMKM29ua3BIQjJUbFRnVHZyZXdLS2c2RGJ0b2RCSW1uZWJSZVB3UmFPMVpMN00yYWRTQ2JkcnZLNWpQaUVCVUdGKwp6SkswRS9jNUREQjdkNlVSZ2l6ZmZ2czRQU3FpWGk0RGxTdVhtUDRGenJNL3FEalBsbE81UktzdEtFejIvVmNaCmpsNjg0MEFQR09RbSs0RUM2N2ZDYXRHL2xzOStyRXUvQUEraW5iRDZ4dzlZdzcvVmQyaDN1K0V0ZmVmZDlhZGoKdUIzdjJwaHFINm15Rkl4NW91TVAxRUs0cFBIWjZxbnRVZmZDenkzSlJMZHJKSmhUeE4zWWlvTkNjSlNKUXVBTgovS0w3eEhzQnFlMjIvekZ6blJ0QTlVRk5YQVZzeGs2dEQ2UkZ3bzdPSlJjY01KZmVwSHpLTk9LZ2t6bVNCaFVPCmdrdHBRTmt6QWdNQkFBRUNnZ0VBSGhKa1BBckJHRFpEam0zdE1Pa1Z0SjhldGZyeHp5TEJtc2ZzUWNRUkErd0oKamR1aENvcGhNbFgxNmdSejdLOGR3NEwwZm5tUkZ3L2YvbXpGcnBzY2t4RWFLRWZuNGJFdG9vOWQxQUN2K0x2KwozM2hUdzlVQjhrZW1JOGxadWNITWlHeTBzN3BFRStVQzJIQXZyQm1qUnFtVjQ0WWJ2SWh4REZtUlVGeFUwZjVrCnZFTWs1bGpBaGRGRUN3WmpwUUZ0VjNrTmZZZHJENlR0MjIxaHc3SlUrek5wZmxWRGVUUFRRZ3FHSXEwVk9qaUcKZkZGTXkreDVBN0s1S3A0RWZ3QzhPWTh4S3RkalI3cTk1cEc4WUVsNWphVFR3dHBKVXpIL3JYbHNqN1dvc2VzUApZUndPN1h2cGU5YldKd3p2bDlPNGdaWVRaN0laNVFUN3c1SDVaekx0b1FLQmdRRHNwUEE0aVUrNm9xY05UbCsxCjBZUnpkV2hwQ2NtU3N5OXVSZG94cU0vNlZOaFNYQTZOMlVRbU4veXVCYWsyQmJqWnYrVGZ5UGVLdU85UzdIakEKMTFHbXZvL3pzVWl0NnRwUkNKVmdmRjl1WnFyK29yWkRzNjRCSThWWjJZWDVFVWxSSWZ0Zmo5MTRydEtPdHY3UwpiOTZiTVl0N3FyM3hHSHZkQ2QrRzBDRDlPd0tCZ1FESEY3Uy9QSzE0SjhyYnpOakRjWjZYeVZ0ZCtQaUx3alhUCjMrL2ZKcnYvc2FsV3NFNUdVU1dYZFNITDRJamtaK1FXRndZRVM4c09WVlVKaGx0SXduYitzVWowWnJPaXYwbFUKbkpPcmtrU2ExYWJZMXFlSEtIdUpQYmg0TXdldTRTejhmTVBaSVEyREUwZzR1a29MVUxNcHRvZTRFZ1doYlBYYgpMN1JhK0VzMGFRS0JnUURyUFZyL0dLQ0ZLME5jMnRnUjZlRDgxVzJoWFBWZ08zZWU2eGxuM0NSQytTekJVbm0xClVKR0tYSVYyaUhJWkhiOFAxczR5RjVqYjhkTVdYN1A2SHhFdjdLYzAzTHNmQ0NOV0FtNWJwOGRGL0JGbloyQkEKRk5HWW1IS0tTczMvTmN2b054dW5kMS8xby9Qem9yM1ZleGVTdHNHdGdhR25sV3NyNDdDc1Z5RTBHUUtCZ0VhSwowc016eDY4Y1FsZHhGSmpqaURMMTZJYTZjYTVyYU5FaXRvWlYzaVR5R1RNYkV4RDlMWm1scWd6b0NQa05DcGI5CkgyZWtSMVZUek9hc0VXb05aVVpISUxkZ01HUUk3UDJxNFBQWXhyQXA1WTFOT1Z5OWJsQXBhMVJEbUlSUlNyUkgKck1raFdmMUlkcjJLM0RONEs1TXJGcG1VNFNQYVRKNldINHhnRDUySkFvR0FiVFkyR3RXOHh3SnhwZ2VTUzZ5Mgoxdy9CZkY5clowQ0EwWm45MnFKZUwxL3l5Qi9POWxTdjdTeXZxZFI3QTNLUjZnSWd1enV1aU85OU8zVldDTDR3Cm5neGpraVZmRUZMYU0xVG9iOFdQL2NBTWpPZXd6WGpnTG1NekVTdFZlZUxRZlhua09FcmVqWWllbFBxNFVPMHkKV1NNSEtNT21WbW16R1FMQ2ovaVptTHM9Ci0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0K - name: m.kennedy@f5.com diff --git a/resources/terraform/polsup-eks-cis/main.tf b/resources/terraform/polsup-eks-cis/main.tf index e69de29..a498cc6 100644 --- a/resources/terraform/polsup-eks-cis/main.tf +++ b/resources/terraform/polsup-eks-cis/main.tf @@ -0,0 +1,241 @@ +provider "aws" { + region = local.region +} + +provider "kubernetes" { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } +} + +provider "helm" { + kubernetes { + host = module.eks.cluster_endpoint + cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) + + exec { + api_version = "client.authentication.k8s.io/v1beta1" + command = "aws" + # This requires the awscli to be installed locally where Terraform is executed + args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] + } + } +} + +data "aws_availability_zones" "available" { + filter { + name = "opt-in-status" + values = ["opt-in-not-required"] + } +} + +resource "random_id" "id" { + byte_length = 2 +} + +locals { + region = var.region + vpc_cidr = var.vpc_cidr + azs = slice(data.aws_availability_zones.available.names, 0, 3) + + build = random_id.id.hex + name = coalesce(var.name, local.build) + # var.cluster_name is for Terratest + cluster_name = coalesce(var.cluster_name, local.name) + + # Mapping + cluster_version = var.cluster_version + metrics_server = true + aws_load_balancer_controller = true + cert_manager = true + cloudwatch_metrics = true + vpa = true + kubecost = true + + tags = { + Owner = var.owner + Application = var.app + } +} + +#--------------------------------------------------------------- +# EKS Blueprints +#--------------------------------------------------------------- + +module "eks" { + source = "terraform-aws-modules/eks/aws" + version = "~> 19.13" + + cluster_name = local.cluster_name + cluster_version = local.cluster_version + cluster_endpoint_public_access = true + + vpc_id = module.vpc.vpc_id + subnet_ids = module.vpc.private_subnets + + cluster_addons = { + coredns = {} + kube-proxy = {} + vpc-cni = {} + } + + eks_managed_node_groups = { + (local.cluster_name) = { + node_group_name = "managed-ondemand" + instance_types = [var.instance] + min_size = 3 + max_size = 3 + desired_size = 3 + subnet_ids = module.vpc.private_subnets + } + } + + tags = local.tags +} + + +module "eks_blueprints_addons" { + source = "github.com/aws-ia/terraform-aws-eks-blueprints//modules/kubernetes-addons?ref=v4.32.1" + + eks_cluster_id = module.eks.cluster_name + eks_cluster_endpoint = module.eks.cluster_endpoint + eks_cluster_version = module.eks.cluster_version + eks_oidc_provider = module.eks.oidc_provider + eks_oidc_provider_arn = module.eks.oidc_provider_arn + + # Add-ons + enable_amazon_eks_aws_ebs_csi_driver = true + amazon_eks_aws_ebs_csi_driver_config = { + most_recent = true + kubernetes_version = local.cluster_version + resolve_conflicts = "OVERWRITE" + } + enable_aws_load_balancer_controller = true + aws_load_balancer_controller_helm_config = { + service_account = "aws-lb-sa" + } + enable_cert_manager = true + enable_metrics_server = true + + tags = local.tags +} + +module "ebs_csi_driver_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-ebs-csi-driver-" + + attach_ebs_csi_policy = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:ebs-csi-controller-sa"] + } + } + + tags = local.tags +} + +module "vpc_cni_irsa" { + source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" + version = "~> 5.20" + + role_name_prefix = "${module.eks.cluster_name}-vpc-cni-" + + attach_vpc_cni_policy = true + vpc_cni_enable_ipv4 = true + + oidc_providers = { + main = { + provider_arn = module.eks.oidc_provider_arn + namespace_service_accounts = ["kube-system:aws-node"] + } + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# Supporting Resources +#--------------------------------------------------------------- + +module "vpc" { + source = "terraform-aws-modules/vpc/aws" + version = "~> 5.0" + + name = local.name + cidr = local.vpc_cidr + + azs = local.azs + public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)] + private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 10)] + database_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 20)] + + enable_nat_gateway = true + single_nat_gateway = true + enable_dns_hostnames = true + + # using the database subnet method since it allows a public route + create_database_subnet_group = true + create_database_subnet_route_table = true + create_database_internet_gateway_route = true + + # Manage so we can name + manage_default_network_acl = true + default_network_acl_tags = { Name = "${local.name}-default" } + manage_default_route_table = true + default_route_table_tags = { Name = "${local.name}-default" } + manage_default_security_group = true + default_security_group_tags = { Name = "${local.name}-default" } + + public_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/elb" = 1 + } + + private_subnet_tags = { + "kubernetes.io/cluster/${local.cluster_name}" = "shared" + "kubernetes.io/role/internal-elb" = 1 + } + + tags = local.tags +} + +#--------------------------------------------------------------- +# F5/NGINX Resources +#--------------------------------------------------------------- + +module "jumphost" { + source = "../modules/jumphost" + + prefix = local.name + region = var.region + vpc_id = module.vpc.vpc_id + public_subnets = module.vpc.database_subnets + random = local.build + ec2_key = var.ec2_key +} + +module "big-ip" { + source = "../modules/bigip" + + projectPrefix = local.name + random = local.build + region = var.region + vpcId = module.vpc.vpc_id + mgmt_subnet_ids = module.vpc.database_subnets + f5_username = var.f5_username + f5_password = var.f5_password + ec2_key_name = var.ec2_key + eks_cluster_sg = module.eks.cluster_security_group_id + eks_node_sg = module.eks.node_security_group_id +} + diff --git a/resources/terraform/polsup-eks-cis/min-iam-policy.json b/resources/terraform/polsup-eks-cis/min-iam-policy.json new file mode 100644 index 0000000..cf716ea --- /dev/null +++ b/resources/terraform/polsup-eks-cis/min-iam-policy.json @@ -0,0 +1,105 @@ +{ + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "ec2:AllocateAddress", + "ec2:AssociateRouteTable", + "ec2:AttachInternetGateway", + "ec2:AuthorizeSecurityGroupEgress", + "ec2:AuthorizeSecurityGroupIngress", + "ec2:CreateInternetGateway", + "ec2:CreateNatGateway", + "ec2:CreateNetworkAclEntry", + "ec2:CreateRoute", + "ec2:CreateRouteTable", + "ec2:CreateSecurityGroup", + "ec2:CreateSubnet", + "ec2:CreateTags", + "ec2:CreateVpc", + "ec2:DeleteInternetGateway", + "ec2:DeleteNatGateway", + "ec2:DeleteNetworkAclEntry", + "ec2:DeleteRoute", + "ec2:DeleteRouteTable", + "ec2:DeleteSecurityGroup", + "ec2:DeleteSubnet", + "ec2:DeleteTags", + "ec2:DeleteVpc", + "ec2:DescribeAccountAttributes", + "ec2:DescribeAddresses", + "ec2:DescribeAvailabilityZones", + "ec2:DescribeInternetGateways", + "ec2:DescribeNatGateways", + "ec2:DescribeNetworkAcls", + "ec2:DescribeNetworkInterfaces", + "ec2:DescribeRouteTables", + "ec2:DescribeSecurityGroups", + "ec2:DescribeSubnets", + "ec2:DescribeTags", + "ec2:DescribeVpcAttribute", + "ec2:DescribeVpcClassicLink", + "ec2:DescribeVpcClassicLinkDnsSupport", + "ec2:DescribeVpcs", + "ec2:DetachInternetGateway", + "ec2:DisassociateRouteTable", + "ec2:ModifySubnetAttribute", + "ec2:ModifyVpcAttribute", + "ec2:ReleaseAddress", + "ec2:RevokeSecurityGroupEgress", + "ec2:RevokeSecurityGroupIngress", + "eks:CreateAddon", + "eks:CreateCluster", + "eks:CreateNodegroup", + "eks:DeleteAddon", + "eks:DeleteCluster", + "eks:DeleteNodegroup", + "eks:DescribeAddon", + "eks:DescribeAddonVersions", + "eks:DescribeCluster", + "eks:DescribeNodegroup", + "iam:AddRoleToInstanceProfile", + "iam:AttachRolePolicy", + "iam:CreateInstanceProfile", + "iam:CreateOpenIDConnectProvider", + "iam:CreatePolicy", + "iam:CreateRole", + "iam:CreateServiceLinkedRole", + "iam:DeleteInstanceProfile", + "iam:DeleteOpenIDConnectProvider", + "iam:DeletePolicy", + "iam:DeleteRole", + "iam:DetachRolePolicy", + "iam:GetInstanceProfile", + "iam:GetOpenIDConnectProvider", + "iam:GetPolicy", + "iam:GetPolicyVersion", + "iam:GetRole", + "iam:ListAttachedRolePolicies", + "iam:ListInstanceProfilesForRole", + "iam:ListPolicyVersions", + "iam:ListRolePolicies", + "iam:PassRole", + "iam:RemoveRoleFromInstanceProfile", + "iam:TagInstanceProfile", + "kms:CreateAlias", + "kms:CreateKey", + "kms:DeleteAlias", + "kms:DescribeKey", + "kms:EnableKeyRotation", + "kms:GetKeyPolicy", + "kms:GetKeyRotationStatus", + "kms:ListAliases", + "kms:ListResourceTags", + "kms:PutKeyPolicy", + "kms:ScheduleKeyDeletion", + "kms:TagResource", + "s3:GetObject", + "s3:ListBucket", + "s3:PutObject" + ], + "Resource": "*" + } + ] +} diff --git a/resources/terraform/polsup-eks-cis/outputs.tf b/resources/terraform/polsup-eks-cis/outputs.tf index e69de29..26a88f3 100644 --- a/resources/terraform/polsup-eks-cis/outputs.tf +++ b/resources/terraform/polsup-eks-cis/outputs.tf @@ -0,0 +1,80 @@ +output "vpc_private_subnet_cidr" { + description = "VPC private subnet CIDR" + value = module.vpc.private_subnets_cidr_blocks +} + +output "vpc_public_subnet_cidr" { + description = "VPC public subnet CIDR" + value = module.vpc.public_subnets_cidr_blocks +} + +output "vpc_management_subnet_cidr" { + description = "VPC Management subnet CIDR" + value = module.vpc.database_subnets_cidr_blocks +} + +output "vpc_cidr" { + description = "VPC CIDR" + value = module.vpc.vpc_cidr_block +} + +output "eks_cluster_name" { + description = "EKS cluster ID" + value = module.eks.cluster_name +} +/* +output "eks_managed_nodegroups" { + description = "EKS managed node groups" + value = module.eks.node_groups +} + +output "eks_managed_nodegroup_ids" { + description = "EKS managed node group ids" + value = module.eks.managed_node_groups_id +} + +output "eks_managed_nodegroup_arns" { + description = "EKS managed node group arns" + value = module.eks.managed_node_group_arn +} + +output "eks_managed_nodegroup_role_name" { + description = "EKS managed node group role name" + value = module.eks.managed_node_group_iam_role_names +} + +output "eks_managed_nodegroup_status" { + description = "EKS managed node group status" + value = module.eks.managed_node_groups_status +} + +output "configure_kubectl" { + description = "Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig" + value = module.eks.configure_kubectl +} +*/ +# Region used for Terratest +output "region" { + description = "AWS region" + value = local.region +} + +output "jumpbox_public_dns" { + description = "Public DNS address of Jumpbox" + value = module.jumphost.public_dns +} + +output "f5vm01_mgmt_private_ip" { + description = "f5vm01 management private IP address" + value = module.big-ip.f5vm01_mgmt_private_ip +} + +output "f5vm01_mgmt_public_ip" { + description = "f5vm01 management public IP address" + value = module.big-ip.f5vm01_mgmt_public_ip +} + +output "f5vm01_mgmt_pip_url" { + description = "f5vm01 management public URL" + value = "https://${module.big-ip.f5vm01_mgmt_public_ip}:8443" +} \ No newline at end of file diff --git a/resources/terraform/polsup-eks-cis/variables.tf b/resources/terraform/polsup-eks-cis/variables.tf index e69de29..9efb921 100644 --- a/resources/terraform/polsup-eks-cis/variables.tf +++ b/resources/terraform/polsup-eks-cis/variables.tf @@ -0,0 +1,66 @@ +# tflint-ignore: terraform_unused_declarations +variable "cluster_name" { + description = "Name of cluster - used by Terratest for e2e test automation" + type = string + default = "polsup-cis" +} + +variable "cluster_version" { + description = "The Version of Kubernetes to deploy" + type = string + default = "1.25" +} + +variable "region" { + description = "Name of AWS deployment region" + type = string + default = "ap-southeast-2" +} + +variable "vpc_cidr" { + description = "CIDR of deployment VPC" + type = string + default = "10.0.0.0/16" +} + +variable "name" { + description = "Name prefix of deployment" + type = string + default = "polsup-cis" +} + +variable "owner" { + description = "Deployment owner" + type = string + default = "f5-aatt" +} + +variable "instance" { + description = "Deployment EC2 instance type" + type = string + default = "t3.xlarge" +} + +variable "app" { + description = "Deployment Application" + type = string + default = "OWASP JuiceShop" +} + +variable "ec2_key" { + description = "EC2 Deployment Keypair" + type = string + default = "mkennedy@f5" +} + +variable "f5_username" { + description = "User name for the BIG-IP (Note: currently not used. Defaults to 'admin' based on AMI" + type = string + default = "admin" +} + +variable "f5_password" { + description = "BIG-IP Password or Secret ARN (value should be ARN of secret when aws_secretmanager_auth = true, ex. arn:aws:secretsmanager:us-west-2:1234:secret:bigip-secret-abcd)" + type = string + default = "Default12345!" +} diff --git a/resources/terraform/polsup-eks-cis/versions.tf b/resources/terraform/polsup-eks-cis/versions.tf index e69de29..62c74d3 100644 --- a/resources/terraform/polsup-eks-cis/versions.tf +++ b/resources/terraform/polsup-eks-cis/versions.tf @@ -0,0 +1,29 @@ +terraform { + required_version = ">= 1.0.0" + + required_providers { + aws = { + source = "hashicorp/aws" + version = ">= 3.72" + } + kubernetes = { + source = "hashicorp/kubernetes" + version = ">= 2.10" + } + helm = { + source = "hashicorp/helm" + version = ">= 2.4.1" + } + volterra = { + source = "volterraedge/volterra" + version = ">= 0.7" + } + } + + # ## Used for end-to-end testing on project; update to suit your needs + # backend "s3" { + # bucket = "terraform-ssp-github-actions-state" + # region = "us-west-2" + # key = "e2e/eks-cluster-with-new-vpc/terraform.tfstate" + # } +} -- GitLab From bfe0c968df79fdd1d83dfae01bd6aac99bfc9e26 Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Tue, 18 Jul 2023 12:07:17 +1000 Subject: [PATCH 12/14] k8s manifests for cis/juice --- .../k8s-manifests/cis/{ => otel}/as3.yaml | 0 .../cis/{ => otel}/cis-deployment.yaml | 0 .../cis/{ => otel}/opentelemetry-demo.yaml | 0 .../cis/polsup/cis-deployment.yaml | 56 +++++++++++++++++++ .../cis/polsup/juice-shop-deployment.yaml | 16 ++++++ .../cis/polsup/juice-shop-service.yaml | 12 ++++ .../k8s-manifests/cis/polsup/polsup-as3.yaml | 48 ++++++++++++++++ 7 files changed, 132 insertions(+) rename resources/k8s-manifests/cis/{ => otel}/as3.yaml (100%) rename resources/k8s-manifests/cis/{ => otel}/cis-deployment.yaml (100%) rename resources/k8s-manifests/cis/{ => otel}/opentelemetry-demo.yaml (100%) create mode 100644 resources/k8s-manifests/cis/polsup/cis-deployment.yaml create mode 100644 resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml create mode 100644 resources/k8s-manifests/cis/polsup/juice-shop-service.yaml create mode 100644 resources/k8s-manifests/cis/polsup/polsup-as3.yaml diff --git a/resources/k8s-manifests/cis/as3.yaml b/resources/k8s-manifests/cis/otel/as3.yaml similarity index 100% rename from resources/k8s-manifests/cis/as3.yaml rename to resources/k8s-manifests/cis/otel/as3.yaml diff --git a/resources/k8s-manifests/cis/cis-deployment.yaml b/resources/k8s-manifests/cis/otel/cis-deployment.yaml similarity index 100% rename from resources/k8s-manifests/cis/cis-deployment.yaml rename to resources/k8s-manifests/cis/otel/cis-deployment.yaml diff --git a/resources/k8s-manifests/cis/opentelemetry-demo.yaml b/resources/k8s-manifests/cis/otel/opentelemetry-demo.yaml similarity index 100% rename from resources/k8s-manifests/cis/opentelemetry-demo.yaml rename to resources/k8s-manifests/cis/otel/opentelemetry-demo.yaml diff --git a/resources/k8s-manifests/cis/polsup/cis-deployment.yaml b/resources/k8s-manifests/cis/polsup/cis-deployment.yaml new file mode 100644 index 0000000..6f3f3ab --- /dev/null +++ b/resources/k8s-manifests/cis/polsup/cis-deployment.yaml @@ -0,0 +1,56 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: k8s-bigip-ctlr-deployment + namespace: kube-system +spec: +# DO NOT INCREASE REPLICA COUNT + replicas: 1 + selector: + matchLabels: + app: k8s-bigip-ctlr-deployment + template: + metadata: + labels: + app: k8s-bigip-ctlr-deployment + spec: + # Name of the Service Account bound to a Cluster Role with the required + # permissions + containers: + - name: k8s-bigip-ctlr + image: "f5networks/k8s-bigip-ctlr:2.7.1" + env: + - name: BIGIP_USERNAME + valueFrom: + secretKeyRef: + # Replace with the name of the Secret containing your login + # credentials + name: f5-bigip-ctlr-login + key: username + - name: BIGIP_PASSWORD + valueFrom: + secretKeyRef: + # Replace with the name of the Secret containing your login + # credentials + name: f5-bigip-ctlr-login + key: password + command: ["/app/bin/k8s-bigip-ctlr"] + args: [ + # See the k8s-bigip-ctlr documentation for information about + # all config options + # https://clouddocs.f5.com/containers/latest/ + "--bigip-username=$(BIGIP_USERNAME)", + "--bigip-password=$(BIGIP_PASSWORD)", + "--bigip-url=https://{$mgmtPublicIP}:8443", #Fill this with the BIG-IP's self IP address. Use https://IP:8443 for single NIC. + "--bigip-partition=cispartition", #Fill this with the name of the "create auth partition " you created previously. + "--pool-member-type=cluster", #Fill this with "cluster" if running in ClusterIP mode + #"--flannel-name=/Common/k8s-tunnel", #Uncomment this only when using ClusterIP mode. Replace k8s-tunnel with the name you created. + #"--custom-resource-mode=true", #Uncomment this only when deploying F5 ingresslink and as3 will not work + "--insecure", + "--log-as3-response=true", + "--log-level=DEBUG", + # for secure communication provide the internal ca certificates using config-map with below option and remove insecure parameter + #"--trusted-certs-cfgmap=", + ] + serviceAccount: bigip-ctlr + serviceAccountName: bigip-ctlr diff --git a/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml b/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml new file mode 100644 index 0000000..992274c --- /dev/null +++ b/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml @@ -0,0 +1,16 @@ +kind: Deployment +apiVersion: apps/v1 +metadata: + name: juice-shop +spec: + template: + metadata: + labels: + app: juice-shop + spec: + containers: + - name: juice-shop + image: bkimminich/juice-shop + selector: + matchLabels: + app: juice-shop \ No newline at end of file diff --git a/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml b/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml new file mode 100644 index 0000000..f90f702 --- /dev/null +++ b/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml @@ -0,0 +1,12 @@ +kind: Service +apiVersion: v1 +metadata: + name: juice-shop +spec: + type: NodePort + selector: + app: juice-shop + ports: + - name: http + port: 8000 + targetPort: 3000 \ No newline at end of file diff --git a/resources/k8s-manifests/cis/polsup/polsup-as3.yaml b/resources/k8s-manifests/cis/polsup/polsup-as3.yaml new file mode 100644 index 0000000..3dd4b64 --- /dev/null +++ b/resources/k8s-manifests/cis/polsup/polsup-as3.yaml @@ -0,0 +1,48 @@ +kind: ConfigMap +apiVersion: v1 +metadata: + name: f5-cis-policysupervisor-demo + namespace: polsup-demo + labels: + #Note that mypartition-name, myhttp-vs, and web_pool names below must match the label in the k8 service yaml file. + f5type: virtual-server + as3: "true" +data: + template: | + { + "class": "AS3", + "declaration": { + "class": "ADC", + "schemaVersion": "3.20.0", + "label": "http", + "remark": "JuiceShop Microservices", + "polsup-demo": { + "class": "Tenant", + "frontendproxy": { + "class": "Application", + "template": "generic", + "vs-fep": { + "class": "Service_HTTP", + "remark": "OpenTelemetry Frontend Proxy Service", + "virtualPort": 80, + "virtualAddresses": [ + "{$selfIP}" + ], + "pool": "pl-fep" + }, + "pl-fep": { + "class": "Pool", + "monitors": [ + "http" + ], + "members": [ + { + "servicePort": 8000, + "serverAddresses": [] + } + ] + } + } + } + } + } -- GitLab From c5354769786c97538f2d7236fc0ba5e3fe524a6d Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Tue, 18 Jul 2023 13:14:04 +1000 Subject: [PATCH 13/14] validated eks/cbip deployment --- resources/terraform/polsup-eks-cis/README.md | 35 +++++++++++++++++++ .../terraform/polsup-eks-cis/as_built.md | 2 +- resources/terraform/polsup-eks-cis/outputs.tf | 2 +- .../terraform/polsup-eks-cis/variables.tf | 2 +- 4 files changed, 38 insertions(+), 3 deletions(-) diff --git a/resources/terraform/polsup-eks-cis/README.md b/resources/terraform/polsup-eks-cis/README.md index a6253d2..fcc1f12 100644 --- a/resources/terraform/polsup-eks-cis/README.md +++ b/resources/terraform/polsup-eks-cis/README.md @@ -44,6 +44,41 @@ ___ ## Configuration +The following *Inputs* are `defauls` that may be superseeded when `TFVARS` files are provided; + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [app](#input\_app) | Deployment Application | `string` | `"OWASP JuiceShop"` | no | +| [cluster\_name](#input\_cluster\_name) | Name of cluster - used by Terratest for e2e test automation | `string` | `"polsup-cis"` | no | +| [cluster\_version](#input\_cluster\_version) | The Version of Kubernetes to deploy | `string` | `"1.25"` | no | +| [ec2\_key](#input\_ec2\_key) | EC2 Deployment Keypair | `string` | `"mkennedy@f5"` | no | +| [f5\_password](#input\_f5\_password) | BIG-IP Password or Secret ARN (value should be ARN of secret when aws\_secretmanager\_auth = true, ex. arn:aws:secretsmanager:us-west-2:1234:secret:bigip-secret-abcd) | `string` | `"Default12345!"` | no | +| [f5\_username](#input\_f5\_username) | User name for the BIG-IP (Note: currently not used. Defaults to 'admin' based on AMI | `string` | `"admin"` | no | +| [instance](#input\_instance) | Deployment EC2 instance type | `string` | `"t3.xlarge"` | no | +| [name](#input\_name) | Name prefix of deployment | `string` | `"polsup-cis"` | no | +| [owner](#input\_owner) | Deployment owner | `string` | `"f5-aatt"` | no | +| [region](#input\_region) | Name of AWS deployment region | `string` | `"ap-southeast-2"` | no | +| [vpc\_cidr](#input\_vpc\_cidr) | CIDR of deployment VPC | `string` | `"10.0.0.0/16"` | no | + + +## Outputs + +| Name | Description | +|------|-------------| +| [eks\_cluster\_name](#output\_eks\_cluster\_name) | EKS cluster ID | +| [f5vm01\_mgmt\_pip\_url](#output\_f5vm01\_mgmt\_pip\_url) | f5vm01 management public URL | +| [f5vm01\_mgmt\_private\_ip](#output\_f5vm01\_mgmt\_private\_ip) | f5vm01 management private IP address | +| [f5vm01\_mgmt\_public\_ip](#output\_f5vm01\_mgmt\_public\_ip) | f5vm01 management public IP address | +| [jumpbox\_public\_dns](#output\_jumpbox\_public\_dns) | Public DNS address of Jumpbox | +| [region](#output\_region) | AWS region | +| [vpc\_cidr](#output\_vpc\_cidr) | VPC CIDR | +| [vpc\_management\_subnet\_cidr](#output\_vpc\_management\_subnet\_cidr) | VPC Management subnet CIDR | +| [vpc\_private\_subnet\_cidr](#output\_vpc\_private\_subnet\_cidr) | VPC private subnet CIDR | +| [vpc\_public\_subnet\_cidr](#output\_vpc\_public\_subnet\_cidr) | VPC public subnet CIDR | + + ___ ## Decommission diff --git a/resources/terraform/polsup-eks-cis/as_built.md b/resources/terraform/polsup-eks-cis/as_built.md index e6bab7f..81d1ef7 100644 --- a/resources/terraform/polsup-eks-cis/as_built.md +++ b/resources/terraform/polsup-eks-cis/as_built.md @@ -54,7 +54,7 @@ kubectl create -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/ma ### `bigip-ctl-cis` Deployment Preparation -10. Update `src/k8s-manifests/cis/as3.yaml` to reflect the *selfIP* of the BIG-IP Virtual Server; +10. Update `src/k8s-manifests/cis/polsup/polsup-as3.yaml` to reflect the *selfIP* of the BIG-IP Virtual Server; * Replace `"virtualAddresses": ["{$selfIP}"],` with the VS IP. For single NIC, this is the self IP address. 11. Update `src/k8s-manifests/cis/cis-deployment.yaml` to reflect the Public ManagementIP of the BIG-IP; diff --git a/resources/terraform/polsup-eks-cis/outputs.tf b/resources/terraform/polsup-eks-cis/outputs.tf index 26a88f3..b4156d2 100644 --- a/resources/terraform/polsup-eks-cis/outputs.tf +++ b/resources/terraform/polsup-eks-cis/outputs.tf @@ -61,7 +61,7 @@ output "region" { output "jumpbox_public_dns" { description = "Public DNS address of Jumpbox" - value = module.jumphost.public_dns + value = module.jumphost.public_dns[0] } output "f5vm01_mgmt_private_ip" { diff --git a/resources/terraform/polsup-eks-cis/variables.tf b/resources/terraform/polsup-eks-cis/variables.tf index 9efb921..ea78f63 100644 --- a/resources/terraform/polsup-eks-cis/variables.tf +++ b/resources/terraform/polsup-eks-cis/variables.tf @@ -50,7 +50,7 @@ variable "app" { variable "ec2_key" { description = "EC2 Deployment Keypair" type = string - default = "mkennedy@f5" + default = "mjk-aatt-fy23q3" } variable "f5_username" { -- GitLab From b2c2d1331577f3a0c2dc09d46b93b7375fbfea76 Mon Sep 17 00:00:00 2001 From: Michael Kennedy Date: Tue, 18 Jul 2023 13:58:22 +1000 Subject: [PATCH 14/14] e2e cBIP/CIS/JuiceShop w/- AWAF --- .../cis/polsup/juice-shop-deployment.yaml | 16 --------- .../cis/polsup/juice-shop-service.yaml | 12 ------- .../k8s-manifests/cis/polsup/juiceshop.yaml | 35 +++++++++++++++++++ .../k8s-manifests/cis/polsup/polsup-as3.yaml | 13 ++++--- .../terraform/polsup-eks-cis/as_built.md | 17 ++++++++- 5 files changed, 57 insertions(+), 36 deletions(-) delete mode 100644 resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml delete mode 100644 resources/k8s-manifests/cis/polsup/juice-shop-service.yaml create mode 100644 resources/k8s-manifests/cis/polsup/juiceshop.yaml diff --git a/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml b/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml deleted file mode 100644 index 992274c..0000000 --- a/resources/k8s-manifests/cis/polsup/juice-shop-deployment.yaml +++ /dev/null @@ -1,16 +0,0 @@ -kind: Deployment -apiVersion: apps/v1 -metadata: - name: juice-shop -spec: - template: - metadata: - labels: - app: juice-shop - spec: - containers: - - name: juice-shop - image: bkimminich/juice-shop - selector: - matchLabels: - app: juice-shop \ No newline at end of file diff --git a/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml b/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml deleted file mode 100644 index f90f702..0000000 --- a/resources/k8s-manifests/cis/polsup/juice-shop-service.yaml +++ /dev/null @@ -1,12 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: juice-shop -spec: - type: NodePort - selector: - app: juice-shop - ports: - - name: http - port: 8000 - targetPort: 3000 \ No newline at end of file diff --git a/resources/k8s-manifests/cis/polsup/juiceshop.yaml b/resources/k8s-manifests/cis/polsup/juiceshop.yaml new file mode 100644 index 0000000..178fec9 --- /dev/null +++ b/resources/k8s-manifests/cis/polsup/juiceshop.yaml @@ -0,0 +1,35 @@ +--- +kind: Deployment +apiVersion: apps/v1 +metadata: + name: juice-shop +spec: + template: + metadata: + labels: + app: juice-shop + spec: + containers: + - name: juice-shop + image: bkimminich/juice-shop + selector: + matchLabels: + app: juice-shop +--- +kind: Service +apiVersion: v1 +metadata: + name: juice-shop + labels: + cis.f5.com/as3-tenant: polsup-demo #The following 3 labels need to match the AS3 declaration. + cis.f5.com/as3-app: juice-shop + cis.f5.com/as3-pool: pl-js +spec: + type: NodePort + selector: + app: juice-shop + ports: + - name: http + port: 3000 + targetPort: 3000 +--- \ No newline at end of file diff --git a/resources/k8s-manifests/cis/polsup/polsup-as3.yaml b/resources/k8s-manifests/cis/polsup/polsup-as3.yaml index 3dd4b64..7905f9d 100644 --- a/resources/k8s-manifests/cis/polsup/polsup-as3.yaml +++ b/resources/k8s-manifests/cis/polsup/polsup-as3.yaml @@ -2,7 +2,6 @@ kind: ConfigMap apiVersion: v1 metadata: name: f5-cis-policysupervisor-demo - namespace: polsup-demo labels: #Note that mypartition-name, myhttp-vs, and web_pool names below must match the label in the k8 service yaml file. f5type: virtual-server @@ -18,26 +17,26 @@ data: "remark": "JuiceShop Microservices", "polsup-demo": { "class": "Tenant", - "frontendproxy": { + "juice-shop": { "class": "Application", "template": "generic", - "vs-fep": { + "vs-js": { "class": "Service_HTTP", - "remark": "OpenTelemetry Frontend Proxy Service", + "remark": "JuiceShop Service", "virtualPort": 80, "virtualAddresses": [ "{$selfIP}" ], - "pool": "pl-fep" + "pool": "pl-js" }, - "pl-fep": { + "pl-js": { "class": "Pool", "monitors": [ "http" ], "members": [ { - "servicePort": 8000, + "servicePort": 3000, "serverAddresses": [] } ] diff --git a/resources/terraform/polsup-eks-cis/as_built.md b/resources/terraform/polsup-eks-cis/as_built.md index 81d1ef7..25e571e 100644 --- a/resources/terraform/polsup-eks-cis/as_built.md +++ b/resources/terraform/polsup-eks-cis/as_built.md @@ -58,4 +58,19 @@ kubectl create -f https://raw.githubusercontent.com/F5Networks/k8s-bigip-ctlr/ma * Replace `"virtualAddresses": ["{$selfIP}"],` with the VS IP. For single NIC, this is the self IP address. 11. Update `src/k8s-manifests/cis/cis-deployment.yaml` to reflect the Public ManagementIP of the BIG-IP; - * Replace `"--bigip-url=https://{$mgmtPublicIP}:8443"` with the ManagementIP. For single NIC, this is the self IP address. \ No newline at end of file + * Replace `"--bigip-url=https://{$mgmtPublicIP}:8443"` with the ManagementIP. For single NIC, this is the self IP address. + + +### Deploy JuiceShop & BIG-IP CIS Definitions + +12. Create namespace & deploy Astro OTel microservices; +```shell +kubectl apply -f ../../k8s-manifests/cis/polsup/juiceshop.yaml +``` + +13. Create and deploy BIG-IP Container Ingress Service and application pods with `as3` definition; +```shell +kubectl create -f ../../k8s-manifests/cis/polsup/cis-deployment.yaml +sleep 10; +kubectl create -f ../../k8s-manifests/cis/polsup/polsup-as3.yaml +``` \ No newline at end of file -- GitLab