Prophaze
  • What is Prophaze AppSec Platform? How it works?
    • Performance
    • SSL Termination
    • Modes of Operation
  • Prophaze AppSec Best Practices
  • Application Onboarding
    • Account Creation
    • Deployment Models
      • Cloud
      • On-Premise
      • Kubernetes Deployment
    • Multi-Cloud Setup
  • DASHBOARD UI OVERVIEW
    • Dashboard
    • Traffic Analysis
    • API Security
    • Attack Analytics
    • DDOS Attacks
    • Rules Page
    • Bot Mitigation
    • Anomaly Detection
    • Reporting
    • Attack Types
    • Incidents
    • AppSec Toggle Mode
    • SSL Certificate
  • HTTP Support
    • Encoding Types
    • Protocol Validation
  • Protection Use Cases
    • HTTP Protocol Violation
    • Protocol Anomalies
    • Bot Detection
    • Injection Prevention
    • HTTP Request Smuggling
    • HTTP Response Splitting
    • XSS Prevention
    • LFI and RFI
    • Session Fixation
    • SQL Injection Prevention
    • Layer 7 Dos Attack Prevention
    • PHP Application Protection
  • Detection Techniques
    • Normalization
    • Negative Security Model
    • Signature and Rule Database
  • FAQ
    • Onboarding Process
    • Dashboard Terminology
    • Attack Section
    • Rule Set
    • Traffic 360: General Traffic Logs
    • ML Based Bot Mitigation
    • Generating Reports
    • Anomaly Detection
    • General
  • Software Updates
    • Release Notes v2.3.0
  • Release Notes v2.4.0
  • Release Notes v2.5.0
  • API Security Dashboard
    • API Security Features of Prophaze
    • API security scoring
    • Host-Based API Quality Score
    • How to Enable API Security and Dashboard
    • API Security Section
  • CVE
    • CVE-2024
    • CVE-2023
    • CVE-2022
    • CVE-2021
    • CVE-2020
    • CVE-2019
    • CVE-2018
    • CVE-2017
    • CVE-2012
    • CVE-2011
    • CVE-2009
    • CVE-2008
    • CVE-2001
Powered by GitBook
On this page

Was this helpful?

  1. Application Onboarding
  2. Deployment Models

Kubernetes Deployment

PreviousOn-PremiseNextMulti-Cloud Setup

Last updated 8 months ago

Was this helpful?

Set Up Kubernetes Cluster

Note: Kube-native WAF is available only for enterprise customers. Please contact Prophaze customer support to upgrade the plan.

Kube-native WAF installation

For Kubernetes native customers, we are providing Helm chart for setting up Prophaze ingress and after that traffic will be route through Prophaze ingress.

Step 1: Prophaze will provide private git repo.

git clone <private repo>

Note:Private repo will be provided after contacting Prophaze support team.

Port 6443 which is the kube-apiserver port used for the dashboard to communicate with the kubernetes cluster for the ip: Prophaze IP should be allowed

Step 2: Go to "Settings" page. Now, we need to connect your Kubernetes cluster to Prophaze.For that, click on the “Secure kubernetes cluster” tab on the left side of the page.Copy the command and paste it in your kubernetes cluster.

URL for login:

https://dash.prophaze.com/