LightBeam Documentation
Installer GuidesData SourcesPlaybooksInsightsPrivacyOpsGovernance
  • 💡What is LightBeam?
  • 🚀Getting Started
    • ⚙️Installer Guides
      • Pre-Requisites / Security Configurations
        • Firewall Requirements
        • Securing LightBeam on EKS with AWS Certificate Manager on Elastic Load Balancer
        • Configure HTTPS for LightBeam Endpoint FQDN Standalone deployment
        • Using Custom Certificates with LightBeam
        • Securing LightBeam on GKE with Google Certificate Manager and GCE Ingress
      • Core
        • LightBeam Deployment Instructions
        • LightBeam Installer
        • Web App Deployment
        • LightBeam Diagnostics
        • LightBeam Cluster Backup & Restore using Velero
      • Platform Specific
        • AWS
        • Microsoft Azure
        • Google Cloud (GKE)
        • Standalone Virtual Machine
        • Deployment on an Existing Managed Kubernetes Cluster
        • Azure Marketplace Deployment
      • Integration and Setup
        • Setting Up AWS PrivateLink for RDS-EKS Interaction
        • Twingate and LightBeam Integration Guide
        • Data Subject Request Web Application Server
        • Generate CSR for LightBeam
  • 🧠Core Features
    • 🔦Spectra AI
      • 🔗Data Sources
        • Cloud Platforms
          • AWS Auto Discovery
          • GCP Auto Discovery
        • Databases and Datalakes
          • PostgreSQL
          • Aurora (PostgreSQL)
          • Snowflake
          • MS SQL
          • MySQL
          • Aurora (MySQL)
          • BigQuery
          • AWS Redshift
          • Oracle
          • DynamoDB
          • MongoDB
          • CosmosDB (PostgreSQL)
          • CosmosDB (MongoDB)
          • CosmosDB (NoSQL)
          • Looker
          • AWS Glue
          • Databricks
          • SAP HANA
          • CSV Files as a Datasource
        • Messaging
          • Gmail
          • Slack
          • MS Teams
          • MS Outlook
        • Developer Tools
          • Zendesk
          • ServiceNow
          • Jira
          • GitHub
          • Confluence
        • File Repositories
          • NetDocuments
          • AWS S3
          • Azure Blob
          • Google Drive
          • OneDrive
          • SharePoint
          • Viva Engage
          • Dropbox
          • Box
          • SMB
        • CRM
          • Hubspot
          • Salesforce
          • Automated Data Processing (ADP)
          • Marketo
          • Iterable
          • MS Dynamics 365 Sales
          • Salesforce Marketing Cloud
      • 🔔PlayBooks
        • What is LightBeam Playbooks?
        • Policy and Alerts
          • Types of Policies
          • How to create a rule set
            • File Extension Filter
          • Configuring Retention Policies
          • Viewing Alerts
          • Sub Alerts
            • Reassigning Sub-Alerts
            • Sub-alert States
          • Levels of Actions on Alerts
          • User Roles and Permissions
            • Admin View
            • Alert Owner View
            • Onboarding New Users
              • User Management
              • Okta Integration
              • Alert Assignment Settings
              • Email Notifications
            • Planned Enhancements
          • Audit Logs
          • No Scan List
          • Permit List
          • Policy in read-only mode
      • 📊Insights
        • Entity Workflow
        • Document Classification
        • Attribute Management Overview
          • Attributes Page View
          • Attribute Sets
          • Creating Custom Attribute
          • Attributes List
        • Template Builder
        • Label Management
          • MIP Integration
          • Google Labels Integration
      • 🗃️Reporting
        • Delta Reporting
        • Executive Report
        • LightBeam Lens
      • Scanning and Redaction of Files
        • On-demand scanning
      • How-to Guides
        • Leveraging LightBeam insights for structured data sources
      • LightBeam Dashboard Outlay
      • Risk Score
    • 🏛️PrivacyOps
      • Data Subject Request (DSR)
        • What is DSR?
        • Accessing the DSR Module
        • DSR Form Builder (DPO View)
          • Creating a New DSR Form
            • Using a Predefined Template
            • Creating a Custom Form
          • Form Configuration
          • Form Preview and Publishing
          • Multi-Form Management
          • Messaging Templates
        • Form Submission & Email Verification (Data Subject View)
        • DSR Management Dashboard (DPO View)
        • Processing DSR Requests
          • Data Protection Officer (DPO) Workflow
          • Self Service Workflow (Direct Validation)
          • Data Source Owner (DSO) Workflow
        • DSR Report
      • 🚧Consent Management
        • Overview
        • Consent Logs
        • Preference Centre
        • Settings
      • 🍪Cookie Consent
        • Dashboard
        • Banners
        • Domains
        • Settings
        • CMP Deployment Guide for Google Tag Manager
        • FAQs
      • 🔏Privacy Impact Assessment (PIA)
        • PIA Templates
        • PIA Assessment Workflow
        • Collaborator View
        • Process Owner Login View (With Collaborator)
        • Filling questionnaire without collaborator
        • Submitting the assessment for DPO review
        • DPO review process
        • Marking the assessment as reviewed
        • Editing and resubmitting assessments after DPO review
        • Revoke review request
        • Edit Reviewer
        • PIA Reports
      • ⏺️Records of Processing Activity (RoPA)
        • Creating a RoPA Template
          • How to clone a template
          • How to use a template
        • How to create a process
          • Adding Process Details
          • Adding Data Elements
          • Adding Data Subjects
          • Adding Data Retention
          • Adding Safeguards
          • Adding Transfers
          • Adding a Custom Section
          • Setting a Review Schedule
          • Data Flow Diagram
        • How to add a collaborator
        • Overview Section
        • Generating a RoPA Report Using LightBeam
        • Collaborator working on a ticket
    • 🛡️Governance
      • Access
        • Dashboard
        • Users
        • Groups
        • Objects
        • Active Directory Settings
        • Access Governance at a Data Source Level
        • Policies and Alerting
        • Access Governance Statistics
        • Governance Module Dashboard
      • Privacy At Partners
  • 📊Tools & Resources
    • 🔀API Documentation
      • API to Create Reports for Structured Datasource
    • ❓Onboarding Assessments
      • Structured Datasource Onboarding Questionnaire
        • MongoDB/CosmosDB Questionnaire
        • Oracle Datasource Questionnaire
      • SMB Questionnaire
    • 🛠️Administration
      • Audit Logs
      • SMTP
        • Basic and oAuth Configuration
      • User Management
        • SAML Identity Providers
          • Okta
            • LightBeam Okta SAML Configuration Guide
          • Azure
            • Azure AD SAML Configuration for LightBeam
          • Google
            • Google IDP
        • Local User Management
          • Adding a User to the LightBeam Dashboard
          • Reset Default Admin Password
  • 📚Support & Reference
    • 📅Release Notes
      • LightBeam v2.2.0
      • Reporting Release Notes
      • Q1 2024 Key Enhancements
      • Q2 2024 Key Enhancements
      • Q3 2024 Key Enhancements
      • Q4 2024 Key Enhancements
    • 📖Glossary
Powered by GitBook
On this page
  • Overview
  • Twingate Components
  • Assumption:
  • Supported distributions
  • System Prerequisites
  • Installation and Setup
  • Installation of Twingate client on Jumpbox :
  • Usage notes
  • Steps to Start and Configure Twingate Client
  • Script to download and configure Envoy Proxy on LightBeam Jumpbox
  • Onboarding RDS to LightBeam on EKS
  • Onboarding RDS to LightBeam on EC2
  • Troubleshooting
  • About LightBeam
  1. Getting Started
  2. Installer Guides
  3. Integration and Setup

Twingate and LightBeam Integration Guide

PreviousSetting Up AWS PrivateLink for RDS-EKS InteractionNextData Subject Request Web Application Server

Last updated 1 year ago


Overview

The guide provides step-by-step instructions for deploying Twingate and integrating it with LightBeam. It will give insights into Twingate's core components, including the Twingate Client, Twingate Cloud, and Twingate Connectors, as well as the Twingate Admin Console for centralized management. Additionally, the guide covers onboarding RDS to LightBeam on both EKS and EC2 instances, along with troubleshooting tips for resolving potential issues. By following this guide, IT administrators can establish a robust and secure network, ensuring authorized access and privacy protection.


Twingate Components

  1. Twingate Client: The Twingate client is a lightweight application that runs on your local device and provides secure access to your organization's resources. The client communicates with the Twingate cloud to authenticate users and authorize access to specific resources.

  2. Twingate Cloud: The Twingate cloud is the central hub of the Twingate platform, managing access policies, user authentication, and traffic routing. It is a global network of high-performance edge nodes that route traffic between the Twingate client and your organization's resources.

  3. Twingate Connectors: The Twingate connector is a lightweight Docker container that runs in your organization's infrastructure and provides secure access to on-premises and cloud-based resources. The connector connects to the Twingate cloud to authenticate users and route traffic between the Twingate client and your organization's resources.

  4. Twingate Admin Console: The Twingate Admin Console is a web-based interface that allows administrators to manage and configure the Twingate platform. It provides a central location for configuring access policies, managing users and groups, and monitoring network activity.


Assumption:

  1. RDS is not in the same VPC as EKS/EC2 node.

  2. An ec2 VM is needed in the same VPC as RDS to deploy the Twingate Connector docker image.

Fig. 1 Twingate client setup on Ubuntu LightBeam jumpbox


Supported distributions

The Twingate Linux Client currently supports the following Linux distributions for x86/AMD64 and ARM64-based devices:

  • Ubuntu (18.04 LTS or later)

System Prerequisites

  • The Linux Client requires either systemd-resolved service to be enabled/running or NetworkManager service to be configured and enabled/running as the client DNS service.

  • A notification service is required for interactive user authentication. If a notification service is not available, the Client will provide instructions for receiving a console-based notification feed.


Installation and Setup

Installation of Twingate client on Jumpbox :

The following command will download and install the Twingate Client.

curl -s https://binaries.twingate.com/client/linux/install.sh | sudo bash

Usage notes

Command
Description

sudo twingate setup

Interactively configure the Twingate Client.

twingate start

Start the Twingate Client.

twingate status

Output Twingate Client status.

twingate stop

Stop the Twingate Client.

twingate help

Show usage information.

twingate resources

Show available Resources for the authenticated user.


Steps to Start and Configure Twingate Client

Step 1: Start the Twingate Service

root@ip:~# twingate start
Starting Twingate service
Please run "twingate setup" first to configure access to your Twingate network.
Starting UI notifications

Before starting the Twingate service, ensure you have completed the setup process for configuring access to your Twingate network.

Step 2: Configure Twingate Client

root@ip:~# twingate setup
Twingate Setup 1.0.80+75884 | 0.143.4
By continuing, you agree to the User Terms of Service (https://twingate.com/terms/user)
and acknowledge the Privacy Policy (https://twingate.com/privacy). [A]gree/[q]uit: A
Enter the name of your Twingate network (eg. "acme" for "acme.twingate.com"): lbai
checking...
lbai is a valid Twingate network
Do you want to automatically start the Twingate service at boot? [Y/n]: Y
Do you want the Twingate service to automatically login after restart?
This requires saving authentication data in /var/lib/twingate (accessible only to root) [y/N]: Y
Do you want to automatically share application error reports with Twingate? [Y/n]: N
Do you want to start Twingate now? [Y/n]: Y
Twingate has been started; user authentication is required for access to Resources
To start desktop notifications, run `twingate desktop-start`.
Alternatively, you can run `/usr/bin/twingate-notifier console` in order to receive Twingate authentication requests in the console.

Use the twingate setup command to configure the Twingate Client interactively. Provide the required details, such as your Twingate network name (e.g., "acme" for "acme.twingate.com") and preferences for automatic startup, automatic login after restart, and error report sharing.

Step 3: Check Twingate Client Status

root@ip:~# twingate status
authenticating
Visit the following URL to authenticate to your Twingate network:

https://xxx.twingate.com/client-node/login?redirect_uri=https%3A%2F%2Flbai.twingate.com%2Fapi%2Fv5%2Fclient%2Flogin%3Fdevice_hardware_id%0

Use the twingate status command to check the current status of the Twingate Client. The output will indicate that the client is authenticating, and you will receive a URL to authenticate to your Twingate network.

By following these steps, you can successfully start and configure the Twingate Client, allowing secure access to your organization's resources through the Twingate network.

Script to download and configure Envoy Proxy on LightBeam Jumpbox

#!/bin/bash
# Download Envoy Proxy
wget https://github.com/envoyproxy/envoy/releases/download/v1.24.1/envoy-contrib-1.24.1-linux-x86_64 -P /usr/local/bin
chmod +x /usr/local/bin/envoy-contrib-1.24.1-linux-x86_64


# Request user input for the address
read -p "Enter the address (e.g., clusterabc.us-west-2.rds.amazonaws.com): " address


# Create envoy-postgres.yaml
cat << EOF > /usr/local/bin/envoy-postgres.yaml
static_resources:
  listeners:
  - name: postgres_listener
    address:
      socket_address:
        address: 0.0.0.0
        port_value: 5433
    filter_chains:
    - filters:
      - name: envoy.filters.network.tcp_proxy
        typed_config:
          "@type": type.googleapis.com/envoy.extensions.filters.network.tcp_proxy.v3.TcpProxy
          stat_prefix: postgres_tcp
          cluster: postgres_cluster


  clusters:
  - name: postgres_cluster
    connect_timeout: 1s
    type: strict_dns
    load_assignment:
      cluster_name: postgres_cluster
      endpoints:
      - lb_endpoints:
        - endpoint:
            address:
              socket_address:
                address: $address
                port_value: 5432
EOF


# Configure systemd service
cat << EOF > /etc/systemd/system/envoy-proxy.service
[Unit]
Description=Envoy Proxy
After=network.target


[Service]
ExecStart=/usr/local/bin/envoy-contrib-1.24.1-linux-x86_64 --config-path /usr/local/bin/envoy-postgres.yaml
Restart=always
User=nobody


[Install]
WantedBy=multi-user.target
EOF


# Reload systemd daemon
sudo systemctl daemon-reload
# Enable automatic start on boot
sudo systemctl enable envoy-proxy
# Start the Envoy Proxy service
sudo systemctl start envoy-proxy
# Stop the Envoy Proxy service
# systemctl stop envoy-proxy
# Command to stop the Envoy Proxy service
echo "To stop the Envoy Proxy service, run: sudo systemctl stop envoy-proxy"

This script automates downloading and configuring Envoy Proxy on the LightBeam Jumpbox. It first fetches the Envoy Proxy binary from the official repository, sets appropriate permissions, and then prompts the user to input the address of the target (e.g., RDS endpoint). The script generates a envoy-postgres.yaml configuration file with the provided address, which specifies the listener and cluster settings for the TCP proxy. A systemd service unit file is created to manage the Envoy Proxy service, enabling automatic startup at boot and continuous operation. The script also provides instructions to stop the Envoy Proxy service if needed.


Onboarding RDS to LightBeam on EKS

  1. Install and authenticate the Twingate client on the jumpbox, and ensure Twingate status is online.

  2. Configure Envoy Proxy as per Script to download and configure Envoy Proxy on LightBeam Jumpbox

  3. Add the Postgres datasource to LightBeam. Specify the public IP address of the jumpbox as the host for the Postgres database.


Onboarding RDS to LightBeam on EC2

  1. Perform Twingate client setup and configure the client.

  2. After the Twingate client is online, find the IP assigned to RDS by Twingate running nslookup on the RDS endpoint.

  3. Go To LightBeam UI -> Datasources -> Add a Datasource Postgres

  4. Update the instance details and use the RDS nslookup IP address as the host and run Test Connection.

Note:

The IP address assigned to RDS by Twingate is dynamic and changes when the Twingate session is re-established. To ensure stable connectivity, it is not recommended to onboard the datasource with the dynamic IP address. Instead, consider using a static IP address or a domain name for the RDS instance. Always verify the address before adding it as a datasource in LightBeam.


Troubleshooting

  • Known Issue: After restarting the Twingate client, the session may not be automatically established, and the user might need to re-establish the session with Twingate status.

  • Default Authentication Requirement: Twingate requires user authentication at least once every 30 days.

Useful Commands:

  • Twingate Logs: To view Twingate logs, use the following command: sudo journalctl -u twingate -f

  • Envoy Service Status: Check the status of the Envoy Proxy service with: systemctl status envoy-proxy

  • Enable Debug Logging: To enable debug logging for Twingate, run: sudo twingate config log-level debug

If you encounter any issues or have trouble with the Twingate client or the Envoy Proxy integration, refer to the logs and enable debug logging if necessary to gain insights into the underlying processes and aid in troubleshooting.


About LightBeam

LightBeam automates Privacy, Security, and AI Governance, so businesses can accelerate their growth in new markets. Leveraging generative AI, LightBeam has rapidly gained customers’ trust by pioneering a unique privacy-centric and automation-first approach to security. Unlike siloed solutions, LightBeam ties together sensitive data cataloging, control, and compliance across structured and unstructured data applications providing 360-visibility, redaction, self-service DSRs, and automated ROPA reporting ensuring ultimate protection against ransomware and accidental exposures while meeting data privacy obligations efficiently. LightBeam is on a mission to create a secure privacy-first world helping customers automate compliance against a patchwork of existing and emerging regulations.

Fig.2 PostgreSQL Configuration
Fig.3 Authentication Mechanism

For any questions or suggestions, please get in touch with us at: .

🚀
⚙️
support@lightbeam.ai