Installation
In order to grant Fluid Attacks access to your application resources, you need to:
-
Fill out the following form in order to provide us with the required details for setting up the Connector connection. Once submitted, in less than 8 office hours you will receive a SECRET TOKEN that you will use in later steps.
-
Provide a container or a server within your private network that satisfies the minimum requirements. This will be the
pivot agent
used by Fluid Attacks. -
Install cloudflared on the
pivot agent
.- Docker
- Windows, Linux & Mac
Deploy a service using the cloudflared Docker container on your container runtime system (AWS ECS, AWS EKS, Azure AKS, GCP GKE, etc).
Download and install cloudflared on your server.
tipIf you intend to share access to several servers within the same private network, you only need to install one
pivot agent
. -
Make sure the
pivot agent
has firewall egress permissions for the required traffic.tipIf you intend to share access to several servers within the same private network, make sure your firewall rules allow the
pivot agent
to reach them. -
Run the following command using the SECRET TOKEN provided by Fluid Attacks.
- Docker
- Windows
- Linux & Mac
cloudflared tunnel --no-autoupdate run --token <SECRET TOKEN>
cloudflared.exe service install <SECRET TOKEN>
cloudflared service install <SECRET TOKEN>
cautionMake sure you run this command as a System Administrator.
If you're running a Docker container, being root within the container is enough.
Testing your connection
You can test your connection connectivity to make sure everything is working properly.
- Docker: Review the logs of your container. Doing this will vary depending on the container runtime you're using (AWS ECS, AWS EKS, Azure AKS, GCP GKE, etc).
- Windows: Testing connectivity with Powershell
- Linux & Mac: Testing connectivity with dig
Additional support
If you require additional support, do not hesitate to contact us.