Ensure your Agentless Vulnerability & Threat Detection deployment to your Oracle Cloud Infrastructure (OCI) compartment proceeds smoothly by completing steps prior to deployment.
OCI environments have provider-specific requirements you must satisfy to successfully
deploy Agentless Vulnerability & Threat Detection to your OCI compartment. Ensure the following steps are complete before deployment
to your connected OCI compartment.
Procedure
- Set up your Terraform environment.
- Make sure Docker is installed, open, and running. Agentless Vulnerability & Threat Detection requires Docker to execute the deployment script.
- If you are using Windows Subsystem for Linux (Windows WSL), make sure the jq tool is installed.
- Configure your OCI compartment for Agentless Vulnerability & Threat Detection deployment.
- Make sure you have added the Oracle required and granted permissions to your deployment environment.
- Replicate your home region identity domain to the regions containing the resources
you want Agentless Vulnerability & Threat Detection to scan. To learn more, see Oracle's documentation on replicating an identity domain to multiple regions.
Note
You only need to replicate your home region identity domain before the initial Agentless Vulnerability & Threat Detection deployment. The domain does not need to be replicated for subsequent deployments unless you are deploying to a new region.
- Verify that your OCI compartment has sufficient resource quotas to handle Agentless Vulnerability & Threat Detection deployment.
- Check the following static resource types and ensure your quotas meet or exceed the
numbers of resources deployed by Agentless Vulnerability & Threat Detection.
OCI static resource quota requirements
Resource typeQuota requirement: deployment to primary region onlyQuota requirements: deployment to primary region and non-primary regionoci_artifacts_container_images23oci_artifacts_container_repository12oci_core_default_security_list12oci_core_internet_gateway12oci_core_nat_gateway12oci_core_route_table36oci_core_security_list12oci_core_service_gateway12oci_core_services12oci_core_subnet24oci_core_vcn12oci_events_rule12oci_functions_application24oci_functions_function1628oci_identity_policy44oci_logging_log1934oci_logging_log_group24oci_monitoring_alarm36oci_objectstorage_bucket12oci_objectstorage_object12oci_objectstorage_object_lifecycle_policy12oci_ons_subscription816oci_queue_queue12oci_resource_scheduler_schedule1017oci_vault_secret33 - Ensure the resource limits set for your deployed region are sufficient to handle the
following dynamic resources created during Agentless Vulnerability & Threat Detection scans.
-
Block volumes
-
Block volume backups
-
Boot volumes
-
Boot volume backups
-
Compute instances
-
Container instances
Note
-
The Agentless Vulnerability & Threat Detection container instance scaler uses a two-tiered architecture to handle container image scanning. The requirements for dynamically created resources differ based on the container instance tier.
-
Agentless Vulnerability & Threat Detection automatically deletes dynamically created resources when a scan completes.
Dynamic resource requirements for Agentless Vulnerability & Threat Detection scans by container instance tier
Container instance tierPurposeRequired resourcesImage size scalingNormalScanning of images less than or equal to 5 GB in size-
16 GB RAM
-
1 OCPU
-
One instance required per 10 images scanned
-
Maximum of 100 instances created per scan
LargeScanning of images from 5 GB to 30 GB in size-
128 GB RAM
-
2 OCPUs
-
Memory-backed temporaty file system (tmfps) mounted at /tpm
-
One instance required per 10 images scanned
-
Maximum of 10 instances created per scan
Note
-
Limits for OCPUs are compartment-level limits shared with OCI compute instances. Administrators can set OCPU limits by region, with specific limits for different OCI compute shapes.
-
To learn more about making sure your compartment in the deployment region has sufficient resource limits to handle OCI container instance services used by Agentless Vulnerability & Threat Detection, see the Oracle documentation on viewing a tenancy's limits and usage and limits by service.
-
- Check the following static resource types and ensure your quotas meet or exceed the
numbers of resources deployed by Agentless Vulnerability & Threat Detection.