Overview

Introduction

This Installation Guide provides step-by-step instructions for installing MetaDefender Core in your own Kubernetes cluster in whatever environment you have it deployed and what components will be installed using the MetaDefender K8S Script.

Organizations interested in protecting their solutions deployed in Kubernetes technology can leverage MetaDefender to analyze and sanitize files. MetaDefender can scan and either sanitize or check for known vulnerabilities, depending on the type of traffic it's seeing. Analyzing files before they are made accessible to the end-users is critical to ensure that no malicious content is allowed and distributed through the web application.

This guide is for IT infrastructure architects, administrators and DevOps professionals who are seeking to prevent potential malicious traffic being allowed in their environments. Threat Prevention is ensured for both productivity files that might be uploaded and for known vulnerabilities that can be identified for all running services/applications. The vulnerability scanning is checking known vulnerabilities for unpatched OS and running applications.

Guide Structure

  1. Kubernetes Components
  2. Using Existing Kubernetes Cluster
  3. Troubleshooting

Kubernetes Supported Versions

Kubernetes VersionKnown Limitations
1.22.17 and laterNone
Before 1.22.17When pod eviction, automation of core deactivation fails.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard