ESET PRIVATE Scanning Solution – Table of Contents

Deployment in EKS

This section guides the deployment of ESET PRIVATE Static Scanning Engine on a managed single-node Amazon EKS cluster with IRSA for AWS Marketplace metering integration, including validation via scanner agent.


note

The variable values (e.g., AWS account ID, ECR image tags, cluster names, regions) shown here are for demonstration purposes only. Update them based on your specific customer requirements, AWS account details, and ESET image availability before running these commands.

1.Variables

Define reusable environment variables for cluster details, AWS resources, images, IAM policy, and kubeconfig to streamline the deployment process and ensure consistency across commands.


note

Customize all variables to match your environment, including the EKS cluster name, AWS region, AWS account ID, Kubernetes namespace, service account, container image tags, IAM policy name, and kubeconfig path before running the subsequent commands.

2.Create Cluster

Provision a managed EKS cluster with one t3.xlarge node and OIDC provider enabled, required for IRSA integration with AWS services like License Manager.

3.Connect kubectl

Update or create a dedicated kubeconfig file to securely connect kubectl to the new EKS cluster for subsequent namespace and workload management.

4.Create Namespace

Set up an isolated Kubernetes namespace for the scanner deployment to organize resources and enable network policies or RBAC scoping.

5.Create License Manager IAM Policy

Create a custom IAM policy granting permission to list received licenses from AWS License Manager, essential for subscription eligibility verification in the scanner.

6.Create IRSA Service Account

Provision an IAM Roles for Service Accounts (IRSA) with Marketplace Metering and custom License Manager policies, allowing pods to securely call AWS APIs without long-term credentials.

7.Deploy Scanner

Deploy the Cloud Scanner as a Deployment with ClusterIP Service exposing gRPC ports, configured with the IRSA service account for AWS API access and optimized resource limits.

8.Validate – Run Scanner Agent

Launch a Scanner Agent pod to test connectivity and scanning functionality against the deployed scanner service on port 50051, verifying end-to-end operation interactively.

9.Cleanup

Safely remove all provisioned resources including the EKS cluster (which cascades to VPC/nodegroup), IAM policy, and temporary kubeconfig to avoid lingering costs and permissions.