Deploy on Docker
Learn how to deploy a TrapEye instance using Docker. This guide covers deployment using the standard Docker CLI as well as Docker Compose.
The Docker image allows for rapid deployment on any Linux host, but requires specific network configurations to enable full detection capabilities.
Deployment Steps
Section titled “Deployment Steps”Retrieve Configuration
Navigate to Management → Installation in the TrapEye Platform. Select the Docker tab to view your specific installation command. This command is pre-populated with the necessary authentication tokens and UUIDs for your entity.
Run with Docker CLI
Execute the command retrieved from the platform in your terminal. Below is an example of the command structure:
Terminal window docker run -d \--restart unless-stopped \--network host \-e INGESTION_URL="INGESTION-URL" \-e ENTITY_UUID="YOUR-ENTITY-UUID" \-e ENTITY_TOKEN="YOUR-ENTITY-TOKEN" \-e TRAPEYE_UUID="YOUR-TRAPEYE-UUID" \ghcr.io/anantis-security/trapeye:x.x.xAlternative: Docker Compose
If you prefer to manage your deployment via Docker Compose, you can use the configuration below. Create a
docker-compose.ymlfile and paste the following content, replacing the environment variables with the values from Step 1.services:trapeye:image: ghcr.io/anantis-security/trapeye:x.x.xcontainer_name: trapeye-sensornetwork_mode: hostrestart: unless-stoppedenvironment:- INGESTION_URL=INGESTION-URL- ENTITY_UUID=YOUR-ENTITY-UUID- ENTITY_TOKEN=YOUR-ENTITY-TOKEN- TRAPEYE_UUID=YOUR-TRAPEYE-UUIDRun the container using:
Terminal window docker-compose up -d
Important Limitations
Section titled “Important Limitations”When deploying via Docker, please be aware of the following limitation regarding service availability:
Setup complete
Section titled “Setup complete”Your TrapEye container is now running. It will appear in the Devices section of the TrapEye Deception Platform, and you will begin receiving real-time alerts as soon as activity is detected.