Provides steps to verify that RHACS is properly installed.

Verifying installation

After you complete the installation, run a few vulnerable applications and go to the RHACS portal to evaluate the results of security assessments and policy violations.

The sample applications listed in the following section contain critical vulnerabilities and they are specifically designed to verify the build and deploy-time assessment features of Red Hat Advanced Cluster Security for Kubernetes.

To verify installation:

  1. Find the address of the RHACS portal based on your exposure method:

    1. For a load balancer:

      $ kubectl get service central-loadbalancer -n stackrox
    2. For port forward:

      1. Run the following command:

        $ kubectl port-forward svc/central 18443:443 -n stackrox
      2. Go to https://localhost:18443/.

  2. Create a new namespace:

    $ kubectl create namespace test
  3. Start some applications with critical vulnerabilities:

    $ kubectl run shell --labels=app=shellshock,team=test-team \
      --image=quay.io/stackrox-io/docs:example-vulnerables-cve-2014-6271 -n test
    $ kubectl run samba --labels=app=rce \
      --image=quay.io/stackrox-io/docs:example-vulnerables-cve-2017-7494 -n test

Red Hat Advanced Cluster Security for Kubernetes automatically scans these deployments for security risks and policy violations as soon as they are submitted to the cluster. Go to the RHACS portal to view the violations. You can log in to the RHACS portal by using the default username admin and the generated password.