📄️ Using Installation Script
[START]:#
📄️ Using the Lacework CLI
To analyze application, host, and user behavior, Lacework uses a lightweight agent that securely forwards collected metadata to the Lacework platform for analysis. The agent requires minimal system resources and runs on most Linux distributions.
📄️ From Package Repositories
Overview
📄️ Using a Package
For single host installations, you can install the Lacework agent using a .deb or .rpm package.
📄️ With Chef
[START]:#
📄️ With Ansible
Because Ansible is a flexible and extensible automation tool, you can use multiple strategies to install the Lacework agent. Use the following skeleton Debian and RPM playbooks as building blocks to create more advanced, environment-specific playbooks.
📄️ On AWS EC2 with Terraform and AWS Systems Manager
This article covers using Terraform to configure AWS Systems Manager to deploy the Lacework Agent to supported EC2 instances.
📄️ Using an AMI Created with Packer
You can use HashiCorp Packer to create a machine image with the Lacework agent pre-installed and configured. To learn more about HashiCorp Packer, see the Packer documentation.
📄️ On Alpine Linux
This topic describes functionality that is currently in beta.
📄️ With AWS Elastic Beanstalk
AWS Elastic Beanstalk allows users to easily deploy and scale their web applications. It supports multiple programming languages such as Python, Java, Node.js, and Go, and runs applications natively on an EC2 instance or as Docker containers.
📄️ On a GCE Host
You can install the Lacework agent on a Google Compute Engine (GCE) host instance to monitor workloads. The workload portion provides process-aware threat and intrusion detection for your GCE environment and notifies you of any events through your chosen method.
📄️ On CoreOS
CoreOS does not have a package manager. Hence, you can install the Lacework agent using the installation script or by manually installing a Docker image.