forked from jaydenaung/cloudguardk8s
-
Notifications
You must be signed in to change notification settings - Fork 0
/
onboardk8s_sh.sh
executable file
·34 lines (24 loc) · 1.74 KB
/
onboardk8s_sh.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
#!/bin/bash
read -p "Enter Your Cluster Name: " cluster_name
read -p "Enter Namespace: " namespace
read -p "Enter CloudGuard API Key: " api_key
read -p "Enter CloudGuard API Secret: " secret
dome9ApiUrl="https://api.dome9.com"
CREATION_RESPONSE=$(curl -s -X POST $dome9ApiUrl/v2/KubernetesAccount --header 'Content-Type: application/json' --header 'Accept: application/json' \
-d "{\"name\" : \"$cluster_name\"}" --user $api_key:$secret)
export cluster_id=$(echo $CREATION_RESPONSE | jq -r '.id')
echo "your CloudGuard cluster ID is $cluster_id"
echo "Hello, CloudGuarder! We are onboarding $cluster_name to CloudGuard. Give us a moment."
echo "Creating namespace.."
kubectl create namespace $namespace
echo "Creating CloudGuard Token.."
kubectl create secret generic dome9-creds --from-literal=username=$api_key --from-literal=secret=$secret --namespace $namespace
echo "Configuration map.."
kubectl create configmap cp-resource-management-configmap --from-literal=cluster.id=$cluster_id --namespace $namespace
echo "Finalising onboarding.."
kubectl create serviceaccount cp-resource-management --namespace $namespace
kubectl create clusterrole cp-resource-management --verb=get,list --resource=pods,nodes,services,nodes/proxy,networkpolicies.networking.k8s.io,ingresses.extensions,podsecuritypolicies.policy,roles,rolebindings,clusterroles,clusterrolebindings,serviceaccounts,namespaces
kubectl create clusterrolebinding cp-resource-management --clusterrole=cp-resource-management --serviceaccount=checkpoint:cp-resource-management
echo "Deploying CloudGuard agent.."
kubectl create -f https://secure.dome9.com/v2/assets/files/cp-resource-management.yaml --namespace $namespace
echo "Awesome, Cloudguarder! $cluster_name has been succcessfuly onboarded to CloudGuard!"