ESET PRIVATE Scanning Solution – Table of Contents

Manifest files

loadbalancer.yaml

Defines the Load Balancer component deployment as a single pod.


note

If using a private registry, include ServiceAccountName to enable image pulling.

scanner.yaml

Defines the Scanner deployment. The Scanner component supports horizontal scaling—any number of replicas can be specified based on demand. Currently, pods use the node’s ephemeral storage to temporarily hold archives during scanning.


note

The serviceAccountName field should be omitted if container images are not pulled from a private registry.

agents.yaml

Defines the deployment of Agent components. These pods are intended for use as CLI tools; as such, the container command is set to sleep to keep them active and accessible.


note

The serviceAccountName field should be omitted if container images are not pulled from a private registry.

containerregistry.yaml

Defined the Kubernetes resources needed to authenticate with a private container registry, so the cluster can pull container images securely.


note

If the container images are hosted in a private registry, authentication credentials must be provided to allow image pulling. A corresponding ServiceAccountName with a configured image pull secret must be created and referenced to enable access.

Creating a Credentials Secret for Private Container Registry Access

To securely pull container images from a private registry, Kubernetes needs access credentials stored as a Secret. This step is essential before referencing the Secret in your ServiceAccountName.