Install testing module in your Cloud
Introduction
API Security testing involves sending malicious API requests to your (staging) server. By default, these malicious testing requests are sent from the Testing module installed within Akto Cloud.
There could be multiple reasons why you'd want to install testing module within your Cloud.
Whitelisting Akto's IP in Security Group or WAF isn't an option
The staging server isn't reachable from public domain
The WAF would block most requests (or block Akto's IP)
The API domain isn't resolvable from public domain
The API is completely internal
Testing from Customer Cloud
Login to Akto dashboard at app.akto.io
Go to Quick Start > Hybrid Saas > Click on “Connect” button
Copy the JWT token (marked in red) [ Also referred as
Database Abstractor Tokenlater]
You can now use a Helm-chart to install Akto Security Testing module in your cloud or install manually
Terraform
To install using Terraform, use the Terraform script here.
Please make sure you install it in a private subnet from your application VPC.
This private subnet should also have network connectivity (typically via NAT).
For
Database Abstractor Service Tokeninput in the terraform script specify the JWT token copied in the earlier step.Once the terraform script has finished running, you should be able to see a new autoscaling group created with 1 Akto Testing EC2 instance running.
Helm-chart
Pre-requisites / Dependencies
If you don't need auto-scaling, skip this section.
Otherwise, if auto-scaling needs to be enabled to allow parallel test runs via multiple k8s pods, we need to install few dependencies via helm charts.
Install
kube-prometheus-stack
Install
keda
Upgrade
kedato setwatchNamespaceThis restricts keda to watch/control only specific namespace(s)
Its fine if you get this error -
Error: UPGRADE FAILED: no RoleBinding with the name "keda-operator" foundAs a fix, re-run the helm upgrade command mentioned below, as the first run would create the
keda-operatordeployment in k8s.
While installing / upgrading Akto's helm chart (covered in later sections) additionally set the following flag
Akto's helm chart installation
Add akto helm repository.
Note: If you've already added akto helm repository, update the helm repository using:
Using the dashboard abstractor token saved in the above steps, deploy the helm chart below.
Note: If you want to modify the helm chart according to your needs, you can clone the same from mini-testing-helm-chart
Linux VM
Create a new instance with the following requirements
Platform
Amazon Linux 2023
Spec
2 vCPU
4GB RAM
20GB Hard disk
Don’t use burstable instances
Network
Private subnet
connectivity to internet (typically via NAT)
connectivity to your staging service
Security groups
Inbound - Open only port 22 for SSH
Outbound - Open all
SSH into this new instance in your Cloud
Run
sudo su -Install docker and docker-compose.
Paste the following in
docker-compose-testing.ymlfile. Use token from step(3) for DATABASE_ABSTRACTOR_SERVICE_TOKEN valueRun
docker-compose -f docker-compose-testing.yml up -dRun
systemctl enable /usr/lib/systemd/system/docker.serviceto ensure Docker starts up in case of instance restarts
Get Support for your Akto setup
There are multiple ways to request support from Akto. We are 24X7 available on the following:
In-app
intercomsupport. Message us with your query on intercom in Akto dashboard and someone will reply.Join our discord channel for community support.
Contact
[email protected]for email support.Contact us here.
Last updated