ESET PRIVATE Scanning Solution – Table of Contents

Deployment in ECS

This section guides deploying ESET PRIVATE Static Scanning Engine on an AWS Fargate ECS cluster exposed via Network Load Balancer (NLB), with validation using a one-off scanner agent task for end-to-end testing.


note

The variable values (e.g., AWS account ID via $(aws sts get-caller-identity ...), ECR image tags, cluster names, regions) shown here are for demonstration purposes only. Update the values based on your specific customer requirements, AWS account details, and ESET image availability before running these commands.

1.Variables

Define environment variables for ECS cluster, AWS account (auto-detected), IAM policy, and ESET container images to ensure consistent referencing across deployment steps.


note

Customize all variables to match your environment, including the ECS cluster name, AWS region, IAM policy name, and container image URIs, before running the subsequent deployment steps.

2.Create Cluster

Provision a basic ECS cluster to host Fargate tasks; no node provisioning needed as Fargate is serverless.

3.Create License Manager IAM Policy

Create custom IAM policy for license-manager:ListReceivedLicenses to enable subscription eligibility verification, following least privilege.

4.Create IAM Roles

Provision task role (ecs-scanner-task-role) for AWS API access (Metering + License Manager) and execution role (ecs-scanner-execution-role) for ECR pulls and CloudWatch logging.

5.Register Task Definition

Define Fargate-compatible task for scanner with gRPC ports, logging to CloudWatch, resource allocation (in this example deployment 1 vCPU, 2GB), and IAM roles for secure operation.

6.Create NLB and Target Group

Set up Network Load Balancer with TCP listener on port 50051 and IP target group for external access to scanner service using default VPC subnets.

7.Create Service

Launch Fargate service with 1 task, integrated with NLB target group, public IP assignment, and security group allowing inbound TCP/50051 from anywhere.

8.Confirm Scanner is Running

Retrieve running task ID and tail CloudWatch logs to verify scanner startup, license checks, and operational readiness.

9.Get NLB Endpoint

Extract NLB DNS name for external access and agent validation targeting.

10.Validate — Run Scanner Agent

Register and run one-off Fargate task with agent image targeting NLB endpoint, then check logs to confirm successful connection and scanning handshake.

11.Cleanup

Scale down service, deregister tasks, delete cluster/NLB/TG/SG/roles/policy/log group to eliminate cost-relevant resources.