Skip to main content

Installation

In order to grant Fluid Attacks access to your application resources, you need to:

  1. Fill out the following form in order to provide us with the required details for setting up the Connector connection. Once submitted, in less than 8 office hours you will receive a SECRET TOKEN that you will use in later steps.

  2. Provide a container or a server within your private network that satisfies the minimum requirements. This will be the pivot agent used by Fluid Attacks.

  3. Install cloudflared on the pivot agent.

    Deploy a service using the cloudflared Docker container on your container runtime system (AWS ECS, AWS EKS, Azure AKS, GCP GKE, etc).

    tip

    If you intend to share access to several servers within the same private network, you only need to install one pivot agent.

  4. Make sure the pivot agent has firewall egress permissions for the required traffic.

    tip

    If you intend to share access to several servers within the same private network, make sure your firewall rules allow the pivot agent to reach them.

  5. Run the following command using the SECRET TOKEN provided by Fluid Attacks.

    cloudflared tunnel --no-autoupdate run --token <SECRET TOKEN>
    caution

    Make sure you run this command as a System Administrator.

    If you're running a Docker container, being root within the container is enough.

Testing your connection

You can test your connection connectivity to make sure everything is working properly.

Additional support

If you require additional support, do not hesitate to contact us.