Skip to content

Latest commit

 

History

History
37 lines (22 loc) · 1.41 KB

deep-packet-inspection.md

File metadata and controls

37 lines (22 loc) · 1.41 KB

Module 14: Deep packet inspection

Goal: Configure deep packet inspection for sensitive workloads to allow Calico inspect packets and alert on suspicious traffic.

Steps

  1. Configure deep packet inspection (DPI) resource.

    Navigate to demo/70-deep-packet-inspection and review YAML manifests that represent DPI resource definition. A DPI resource is usually deployed to watch traffic for entire namespace or specific pods within the namespace using label selectors.

    Deploy DPI resource definition to allow Calico inspect packets bound for dev/nginx pods.

    kubectl apply -f demo/70-deep-packet-inspection/nginx-dpi.yaml

    Once the DeepPacketInspection resource is deployed, Calico starts capturing packets for all endpoints configured in the selector field.

    Wait until all DPI pods become Ready

    watch kubectl get po -n tigera-dpi
  2. Simulate malicious request.

    Query dev/nginx application with payload that triggers a Snort rule alert.

    kubectl -n dev exec -t centos -- sh -c "curl http://nginx-svc/secid_canceltoken.cgi -H 'X-CMD: Test' -H 'X-KEY: Test' -XPOST"
  3. Review alerts.

    Navigate to the Alerts view in Tigera UI and review alerts triggered by DPI controller. Calico DPI controller uses Snort signatures to perform DPI checks.

Next -> Module 15