The Cloud Native Security Platform


Aqua tames the complexity of securing Kubernetes deployments with policy-driven controls that leverage native K8s capabilities, while adding deeper image assurance, runtime protection, and network security controls.

Quick Start


Before you can get started you will need to contact Aqua Security to obtain the following:

  • Aqua username and password
  • Aqua CSP license token
  1. With the username and password you will be able to sign into Navigate to Licenses section where you will find the CSP license token.

    NOTE: All product specific `documentation links` in the following can only be reached if you are signed into

  2. Next we create the aqua namespace.

    kubectl create namespace aqua
  3. After that we create the csp-registry-secret with the username and passsword we got before. The secret is required to pull the Aqua container images from the private Aqua docker registry.

    kubectl create secret docker-registry csp-registry-secret  --docker-server="" --namespace aqua --docker-username="" --docker-password="Truckin" --docker-email=""
  4. Clone the aqua-helm github repository to get access to the helm charts.

    NOTE: We clone a specific Aqua version 4.2. The quick start is specific to that version.

    git clone -b 4.2
    cd aqua-helm

Temporary Workaround To Install The Aqua Container Images

NOTE: Konvoy is using containerd. There is currently an issue with the Aqua container registry when pulling private images. Thats why we need the additional steps described in this section until the issue gets resolved.

NOTE: In your Konvoy cluster.yaml file, remove the line - AlwaysPullImages before creating the cluster with konvoy up.

      - NodeRestriction
      - AlwaysPullImages
      disabled: []
  1. Use your Aqua credentials to login to the Aqua container registry.

    docker login
  2. Next execute the following script. It pulls the Aqua container images, saves them in a tarball, copies the tarball to every worker node, and imports it into containerd.

    NOTE: The script requires the aws cli and jq commands to be installed. On Mac OS X both can be installed using brew. You also have to login to your aws account using the aws cli.

    CLUSTER=... # name of your cluster, its the prefix used for worker nodes, check in ec2 console
    KEY_FILE=... # path to private key file in folder where you ran konvoy -up
    docker pull
    docker pull
    docker pull
    docker pull
    docker pull
    docker save > aqua.tar.gz
    IPS=$(aws --region=$REGION ec2 describe-instances |  jq --raw-output ".Reservations[].Instances[] | select((.Tags | length) > 0) | select(.Tags[].Value | test(\"$CLUSTER-worker\")) | select(.State.Name | test(\"running\")) | [.PublicIpAddress] | join(\" \")")
    for ip in $IPS; do
      echo $ip;
      scp -o StrictHostKeyChecking=no -i $KEY_FILE aqua.tar.gz centos@$ip:/tmp;
      ssh -o StrictHostKeyChecking=no -i $KEY_FILE centos@$ip sudo ctr -n image import /tmp/aqua.tar.gz;

Install The Aqua Server, Database, And Gateway

  1. Install the Aqua server, database, and gateway.

    helm upgrade --install --namespace aqua csp ./server --set scanner.enabled=true,imageCredentials.username=<>,imageCredentials.password=<>
  2. Next enable localhost access to Aqua.

    kubectl port-forward service/csp-console-svc 8080:8080 -n aqua
  3. Open the Aqua CSP console.

When you access the Aqua CSP console for the first time, you must enter and confirm the password for the administrator username. After the login a screen appears where you have to enter the Aqua CSP License Token. After that you have access to the Aqua dashboard.

Install The Aqua Enforcer

In the Aqua CSP console, navigate to the Enforcers section to create an Enforcer Group. Note that the Orchestrator must be set to Kubernetes.

  1. Copy the enforcer token; we will need it in the next step.

  2. Install the enforcer.

    helm upgrade --install --namespace aqua csp-enforcer ./enforcer --set enforcerToken=<aquasec-token>

Delete Aqua

Delete the CSP enforcer and CSP.

helm delete --purge csp-enforcer
helm delete --purge csp



Release Notes

Licensing & Support