CAU 02 Conjur - Fundamentals Installation
CAU 02 Conjur - Fundamentals Installation
– 1 Leader
App LB
– 2 Standbys
– 1 or more Followers (at least two recommended)
RECOMMENDED: deploy 2 Standbys in the same
fault zone as the Leader, and DR Standbys in
another remote fault zone Follower Follower
AZ (DC) 1 AZ (DC) 2
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
DOMAIN NAMES:
• Create fully qualified domain names (FQDN) Purpose
Fully Qualified Domain
IP Address Description
Name
• Avoid functionality in names (i.e. Standby)
• DNS name must not contain an underscore ( _ ) Load Balancer Load Balancer
conjur-prod.domain.com
• Domain names must be 63 character or less in length VIP (Cluster)
IP
• Recommended to create third-party certificates
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
FOLLOWERS PURPOSE:
• Read-replica copy of Conjur Leader
• Server application secrets retrieval requests
• Based on “shared-nothing” architecture App conjur-follower1.corp.com
RECOMMENDATIONS:
• Start with minimum of 2 followers
• Multiple groups of followers can be deployed with separate load balancers based on fault zones
• Auto-scale followers based on load based on CPU utilization
Scale-up when CPU usage beyond threshold
8
Scale-down when CPU drops below threshold
cyberark.com
cyberark.com
This section describes how the Conjur components communicate with each other.
HTTPs response
Client / App Leader / Follower 10
LB
Web Web
App App
conjur-follower-aws.corp.com conjur-follower.corp.com
Application Requests Application Requests
TCP 443 TCP 443
11
Standby TCP 443, 5432 Leader (Master) DR Standby DR Standby
The main Conjur node: A single Conjur Server instance that performs read/write operations.
Leader
It is primarily used to update policies and secrets.
Standby An inactive replica of the Leader, it gets promoted to a Leader if the original Leader fails.
A read only replica of the Leader. Followers allow secret reads at scale.
Conjur Follower Followers are horizontally-scaling components that are typically configured behind a load balancer to
handle all types of read requests, including authentication, permission checks, and secret fetches.
Conjur Cluster A group of Leader and Standbys.
A subgroup of the Conjur cluster. Nodes share their states with one another and can automatically
Auto-failover cluster
promote a Standby to become the Leader if the original Leader fails.
Manual failover cluster A Conjur cluster where the Standbys can get promoted to a Leader manually only.
Disaster Recovery Standby A Standby in a site outside the auto-failover cluster. If this Standby needs to be promoted to Leader,
(DR Standby) this can only be done manually.
When an operation is written to the Leader, the transaction is not completed until it is also performed
Synchronous Standby
on the synchronous Standby. This way the synchronous Standby is always up to date with the Leader.
(Sync Standby)
There can be only one synchronous Standby.
Asynchronous Standbys replicate from the Leader in an eventual consistency mode. Meaning that
Asynchronous Standby
based on load, availability and size of changes, there might be a delay until the data finishes 12
(Async Standby)
replicating.
A region can be divided into one or more availability zones, An AZ is one or more data centers with
redundant power, networking, and connectivity. Compared with a single data center, AZs enable you
Availability zone (AZ) to operate production applications and databases that are better in terms of availability, fault
tolerance, and scalability. All AZs in a region are expected to be interconnected with high-bandwidth,
low latency networking.
Hardware security module A computing device that safeguards and manages digital keys, performs encryption and decryption
(HSM) functions for digital signatures, strong authentication, and other cryptographic functions.
An AWS service that supports creation and management of cryptographic keys and the control of
Key Management Service (KMS)
their usage.
A system that gives enterprise security professionals both insight into and a track record of the
Security Information and Event activities within their IT environment. A SIEM can collect and aggregate log data generated
Management (SIEM) throughout the organization’s technology infrastructure, from host systems and applications to
network and security devices.
13
14
16
• Load Image:
docker load -i conjur-
appliance_<version>.tar
• View / Verify Image Loaded:
docker images
22
docker ps
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
cyberark.com
• Must accept end user license agreement (EULA)
• Use --master-altnames to configure each node
(Leader/Standby) listed in comma-separated format
• Password must be 12-128 characters and include 2
upper/lower letters, 1 digit, and 1 special character
Create directory and copy all certificates into the Leader container:
docker exec <container-name> mkdir -p <path to be created in container>
docker cp <path on host> <container-name>:<path in container>
On the Leader container, import key file and certificate pairs of Follower load balancers:
docker exec <container-name> evoke ca import --no-restart --key <key-file-name> <server-cert-
name>
29
30
32
• Manual Method
1. (leader) docker exec <leader> evoke seed
standby <standby-dns> <leader-dns> >
/tmp/standby.tar
2. (leader) docker cp
<leader>:/tmp/standby.tar .
3. (standby) docker cp ./standby.tar
<standby>:/tmp 33
4. (standby) docker exec <standby> evoke
unpack /tmp/standby.tar
cyberark.com
cyberark.com
Configure Conjur Standby Servers
Command syntax varies depending on if server keys With Server Key Encryption
are encrypted or not
34
35
36
38
• Manual Method
1. (leader) docker exec <leader> evoke seed
follower <follower-dns> <leader-dns> >
/tmp/follower.tar
2. (leader) docker cp <leader>:/tmp/follower.tar .
3. (follower) docker cp ./follower.tar
<follower>:/tmp
40
4. (follower) docker exec <follower> evoke unpack
/tmp/follower.tar
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
cyberark.com
Configure Conjur Follower Servers
• No command syntax difference when using With or Without Server Key Encryption
server key encryption
Configure Follower:
docker exec <follower-container>
evoke configure follower
41
42
43
44
45
46
47