Title
Create new category
Edit page index title
Edit category
Edit link
Deploy using Google Compute Engines
The deployment options vary depending on what are the number of instances where MetaDefender ICAP Server will be installed.
Options:
- Single Instance deployment of MetaDefender Core and MetaDefender ICAP Server
- Multi-Instances with Autoscaling for MetaDefender Core and MetaDefender ICAP Server.
OPSWAT provides a terraform project as example to deploy MetaDefender ICAP Server and MetaDefender Core in different instances using Google services.
Prerequisites and Requirements
Google knowledge: This guide assumes familiarity with Google Services
Google project: needs permission to create Google Services represented in diagrams in Architecture Examples in CSPs for Google
Tools installation: Terraform
Single Instance Deployment
For a single deployment of MetaDefender Core in Google you can use this example to test this deployment type, besides the MetaDefender VM instance, additional resources are being generated and set up.
Deploy using Terraform
OPSWAT provides a terraform project to create the infrastructure needed to deploy
- Locally clone the metadefender-csp repository and go to GCP/single-vm-deployment
git clone git@github.com:OPSWAT/metadefender-csp.gitcd GCP/single-instanceModify terraform.tfvars with the desired options
- LICENSE__KEY_CORE_ required if wanted to have the MetaDefender Core instance activated automatically
- APIKEY_GENERATION=true to have the apikey generated by terraform
- There is one general section and one section for each product that is supported using this Terraform project
# General variablesMD_ENV_NAME = "metadefender-test-csp" # Prefix to add to all the resourcesMD_REGION = "us-central1" # REGION for all the resourcesPROJECT_ID = "metadefender-k8s" # GCP Project ID#GOOGLE_APPLICATION_CREDENTIALS = "" # To give access to terraform (Optional, can use other ways to authenticate)MD_VPC_CIDR = "192.168.0.0/16" # VPC CIDR where to create the MetaDefender productsPUBLIC_ENVIRONMENT = true # true for public deployment, false for private deployment# MetaDefender Core variablesDEPLOY_CORE = trueCORE_IMAGE_PROJECT = "mpi-opswat-public" # GCP Project ID containing the MDSS imageCORE_IMAGE_NAME = "metadefender-core-debian-5-16-0-20251001-054226" # Specific image name for MetaDefender Core. Windows image is "metadefender-core-windows-5-16-0-20251001-054247"CORE_INSTANCE_TYPE = "n2-standard-8" # Instance type for MetaDefender Core (equivalent to c5.2xlarge)LICENSE_KEY_CORE = ""# MetaDefender ICAP variablesDEPLOY_ICAP = true # true to deploy ICAP together with CoreICAP_IMAGE_PROJECT = "mpi-opswat-public" # GCP Project ID containing the MDSS imageICAP_IMAGE_NAME = "metadefender-icapsrv-linux-5-11-0" # Specific image name for MetaDefender ICAP Server. Windows image is "metadefender-icapsrv-windows-5-11-0"ICAP_INSTANCE_TYPE = "n2-standard-8" # Instance type for MetaDefender ICAP (equivalent to c5.2xlarge)LICENSE_KEY_ICAP = ""- Run terraform init and apply. Check the resource to be created, after that enter "y"
terraform initterraform applyManaged Instance Group Deployment
Deploy using Terraform
OPSWAT provides a terraform project to create the infrastructure needed to deploy
- Locally clone the metadefender-csp repository and go to GCP/single-vm-deployment
git clone git@github.com:OPSWAT/metadefender-csp.gitcd GCP/managed-instance-group-deploymentModify terraform.tfvars with the desired options
- LICENSE__KEY_CORE_ required if wanted to have the MetaDefender Core instance activated automatically
- APIKEY_GENERATION=true to have the apikey generated by terraform
- There is one general section and one section for each product that is supported using this Terraform project
# General variablesMD_ENV_NAME = "metadefender-test-csp" # Prefix to add to all the resourcesMD_REGION = "us-central1" # REGION for all the resourcesPROJECT_ID = "metadefender-k8s" # GCP Project ID#GOOGLE_APPLICATION_CREDENTIALS = "" # To give access to terraform (Optional, can use other ways to authenticate)MD_VPC_CIDR = "192.168.0.0/16" # VPC CIDR where to create the MetaDefender productsPUBLIC_ENVIRONMENT = true # true for public deployment, false for private deployment# MetaDefender Core variablesDEPLOY_CORE = trueCORE_IMAGE_PROJECT = "mpi-opswat-public" # GCP Project ID containing the MDSS imageCORE_IMAGE_NAME = "metadefender-core-debian-5-16-0-20251001-054226" # Specific image name for MetaDefender Core. Windows image is "metadefender-core-windows-5-16-0-20251001-054247"CORE_INSTANCE_TYPE = "n2-standard-8" # Instance type for MetaDefender Core (equivalent to c5.2xlarge)LICENSE_KEY_CORE = ""# MetaDefender ICAP variablesDEPLOY_ICAP = true # true to deploy ICAP together with CoreICAP_IMAGE_PROJECT = "mpi-opswat-public" # GCP Project ID containing the MDSS imageICAP_IMAGE_NAME = "metadefender-icapsrv-linux-5-11-0" # Specific image name for MetaDefender ICAP Server. Windows image is "metadefender-icapsrv-windows-5-11-0"ICAP_INSTANCE_TYPE = "n2-standard-8" # Instance type for MetaDefender ICAP (equivalent to c5.2xlarge)LICENSE_KEY_ICAP = ""- Run terraform init and apply. Check the resource to be created, after that enter "y"
terraform initterraform apply