EKS Cluster

This guide explains how to use the provisioning script provided by OPSWAT to create an AWS EKS and generate all the Kubernetes components needed to run MetaDefender Core.

Deploy using Terraform

Bash
Copy
  • Modify variables/variables.tfvars file

    • PERSISTENT_DEPLOYMENT=true -> To create K8S cluster with EC2 Worker Nodes
    • DEPLOY_FARGATE_NODES=false -> To true if wanted to create a Fargate profile
    • DEPLOY_RDS_POSTGRES_DB=true -> To create RDS instance for PostgreSQL server
    • POSTGRES_USERNAME -> if DEPLOY_RDS_POSTGRES_DB=true, set up admin database username
    • POSTGRES_PASSWORD -> if DEPLOY_RDS_POSTGRES_DB=true, set up admin database password
variables/variables.tfvars
Copy
  • Run terraform init and apply. Check the resource to be created, after that enter "y"
Bash
Copy

MetaDefenderK8S script details

  • Script path: https://github.com/OPSWAT/metadefender-k8s/blob/main/metadefenderk8s.sh

  • Programming Language: Bash

  • Installation Pre-requisites for provisioning:

  • AWS Credentials

    • Set in your local environment credentials the IAM user credentials under AWS_ACCESS_KEY_ID& AWS_SECRET_ACCESS_KEY
  • MetaDefender Core License Key (Required with --mdcore parameter)

    • Set it in your local environment credentials under MDCORE_LICENSE_KEY

As security measure do not use the root user for any deployment or operation. Follow the principle of least privilege for all access granted. Keep in mind the resources listed in this page for your option selected: EKS Cluster Architecture

How to run the script

Only MD Core
MD Core + MDSS
MD Core + ICAP
Copy

Script Parameters

ParameterFlagsOptionsDefaultDescriptionRequired/Optional
Action
  • provision
  • install
Action to indicate the script if we want to provision (Create resources + install Core) or install (Install Core)Required
Location-l or --location
  • AWS
  • Azure
  • GCP
Where is going to be the K8S clusterRequired
MetaDefender Flag Installation

Combination of

  • --mdcore
  • --mdss
  • --icap
-Install MetaDefender Core in the cluster provisionedRequired
Image Version--image latestMetaDefender Core image version to installOptional
Region--regionAWS Regionseu-central-1AWS region where all the resources will be provisionedOptional
Cluster Name--nameNot uppercase allowedmd-k8sName of the cluster that will be used for naming all the resourcesOptional
Number of Replicas--replicas[0-9]*1Number of replicas for MetaDefender Core serviceOptional
Namespace--namespace[A-Za-z]{1,10}Namespace where MetaDefender products will be installed in the K8S ClusterOptional Max Characters: 10

Limitations using parameters

  • When using Fargate
    • the pods should be installed in the default namespace.
    • if using AWS Load Balancer controllers need a worker node to be installed in.

The script will deploy a single Worker Node for the cluster with enough space for 1 replica of MD Core. AWS EC2 Instance size is c5.2xlarge (8 vCPU & 16 GiB Memory). Each pod would request 7 vCPU and 8 GiB Memory. To change the request to adapt each pod to the specific case go to values.yml To change the node group go to the terraform file terraform/aws/eks_cluster_module

MetaDefender Core Flowchart Provisioning in AWS

The following flowchart represents how the provisioning script will configure the environment based on the options selected for provisioning AWS EKS.

Summary options to be selected

  1. EKS with EC2 or Fargate

  2. Access to the K8S cluster. Generate Ingress or provide own access.

    1. An Ingress will be create per each product flag added as parameter to the script
    2. Own Access, you decide how to access to the cluster so it won't generate any load balancer for accessing
  3. Have your own database or create new database

    1. Own database, will be asked if you want the script to set up the credentials and database host url for you or the script will just indicate the secrets to edit, later on by you, for connecting the MetaDefender Core with your database.
    2. Create new DB in K8S or external DB that for AWS we will provision a RDS instance
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard