$ kubectl get service central-loadbalancer -n stackrox
Provides steps to verify that RHACS is properly installed.
After you complete the installation, run a few vulnerable applications and navigate to the RHACS portal to evaluate the results of security assessments and policy violations.
The sample applications listed in the following section contain critical vulnerabilities and they are specifically designed to verify the build and deploy-time assessment features of Red Hat Advanced Cluster Security for Kubernetes. |
To verify installation:
Find the address of the RHACS portal based on your exposure method:
For a load balancer:
$ kubectl get service central-loadbalancer -n stackrox
For port forward:
Run the following command:
$ kubectl port-forward svc/central 18443:443 -n stackrox
Navigate to https://localhost:18443/
.
Create a new namespace:
$ kubectl create namespace test
Start some applications with critical vulnerabilities:
$ kubectl run shell --labels=app=shellshock,team=test-team \
--image=quay.io/stackrox-io/docs:example-vulnerables-cve-2014-6271 -n test
$ kubectl run samba --labels=app=rce \
--image=quay.io/stackrox-io/docs:example-vulnerables-cve-2017-7494 -n test
Red Hat Advanced Cluster Security for Kubernetes automatically scans these deployments for security risks and policy violations as soon as they are submitted to the cluster. Navigate to the RHACS portal to view the violations. You can log in to the RHACS portal by using the default username admin and the generated password.