Single EC2

The single instance deployment is only recommended for small or test environments that do not need high availability. This deployment consist of a AWS EC2 instance using the MetaDefender Core AMI published in the marketplace that includes a Standalone MetaDefender Core where the PostgreSQL database is deployed in the same instance than MetaDefender Core.

Diagram

Orange flows

  • A: From a private subnet, client is getting the files and uploading them to MetaDefender Core using the private IP
  • B: From Internet, client is outside the VPC and is sending files to MetaDefender Core using the public IP

Blue flows

  • MetaDefender Core get activated and updates the modules installed on it after activation

This diagram show the standalone database option where the analysis results are stored.

Resources Inventory

Access Management

Service TypeResource NameDescription
IAM RoleLambdaAccessRoleRole for Lambdas
IAM RoleLambdaExecutionRoleRole with Policy for logging
IAM Instance ProfileLambdaInstanceProfileIAM InstanceProfile that is attached to the EC2 instance
IAM PolicylambdaaccessPolicy attached to LambdaAccessRole for allowing all lambda and and events actions.
AWS Lambda PermissionsPermissionForEventsToInvokeLambdaLambda Permission needed to invoke the DeactivateLambda function

Networking

Service TypeResource NameDescription
VPC<VPC Name> (parameter)Desired Virtual Private Cloud
Subnetterraform-${var.ENV_NAME}/SubnetPublicXDesired Public Subnet
Subnetterraform-${var.ENV_NAME}/SubnetPrivateXDesired PrivateSubnet
Internet Gatewayterraform-${var.ENV_NAME}/InternetGatewayInternet Gateway for VPC
Elastic IPterraform-${var.ENV_NAME}/NATIPPublic IP for NAT Gateway
NAT Gatewayterraform-${var.ENV_NAME}/NATGatewayNAT Gateway to give access to internet from private subnet
Route Tableterraform-${var.ENV_NAME}/PublicRouteTableRoute Table for Public Subnet
Route Tableterraform-${var.ENV_NAME}/PrivateRouteTableRoute Table for Private Subnet

Security

Service TypeResource NameDescription
Security GroupMetaDefenderSecurityGroupGenerated security group to allow traffic to MetaDefender REST API.

Compute

Service TypeResource NameDescription
EC2 Instance${var.ENV__NAME}-${var.APP_ _NAME}-instanceInstance to run MetaDefender Core AMI
Launch Template${var.APP_NAME}-templateLaunch Template for MetaDefender Instance
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard