Posture Host Analyzer (Non-Kubernetes)
Prerequisites
- Retrieve your access key to use for
ACCESS_KEY
. - Retrieve Sysdig Secure endpoint by region to use for
API_ENDPOINT
. - Docker installed.
- Supported Linux distributions:
- Ubuntu (22.04.2)
- Debian (11 - bullseye)
- RHEL 9.2
- Fedora CoreOS 37.2
- Supported CPU Architectures:
- x86_64
Installation
Run the following command to deploy the non-Kubernetes Posture Analyzer on a host as a container:
sudo docker run -d [-e TAGS=<TAGS> -v /:/host:ro -v /tmp:/host/tmp --privileged --network host --pid host --env ACCESS_KEY="xxx" --env API_ENDPOINT=secure.sysdig.com quay.io/sysdig/kspm-analyzer:latest
Replace
XXX
with your agent access key, and<sysdig-secure-endpoint>
with the URL for your Sysdig Secure endpoint by region.If proxy is used, pass the proxy settings by using the following flags:
-e HTTPS_PROXY=squid.yourdomain.com:PORT
-e HTTP_PROXY=squid.yourdomain.com:PORT
Options
Zones
To apply posture with specific zones, the agent and the KSPM components must be in the stand-alone Docker host. (Note that Inventory is based on CSPM resources.) Include the kspm-analyzer
container as part of the node-analyzer
pod while installing to add standalone Docker hosts in the Host list/ Zones.
Agent Tags
Optionally, add user-defined tags by adding environment variable: -e TAGS=AGENT_TAGS and AGENT_TAGS=myApp.Env:Production,host.name:MyHost
Results
Once the container is running, the analyzer will begin scanning your host for compliance violations and providing security recommendations. You can view the results in the Sysdig Secure UI.
Results will be shown within a few minutes of installation and scans are refreshed every 24 hours.
Next Steps
Use the Posture Host Analyzer in the Sysdig Secure UI
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.