Overview
The Uptycs collector provides end to end visibility and risk management for the Kubernetes control plane including the ability to surface up network exposure of containers and misconfigured RBAC. It can also perform admission controls to only allow secure deployments of images and other Kubernetes resources.
Highlights
- Discover end to end risk for every container in your environment with correlated insights across runtime, internet exposure, RBAC, audit log detections, and more.
- Block insecure deployments of Kubernetes resources via Gatekeeper admission controls.
- Triage your full Kubernetes inventory including network policies, service accounts and more.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
All fees are non-cancellable and non-refundable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Uptycs Collector EKS Add-On
- Amazon EKS
EKS add-on
An add-on is software that provides supporting operational capabilities to Kubernetes applications but isn't specific to the application. This includes software like observability agents or Kubernetes drivers that allow the cluster to interact with underlying AWS resources for networking, compute, and storage. Add-on software is typically built and maintained by the Kubernetes community, cloud providers like AWS, or third-party vendors. Amazon EKS add-ons provide installation and management of a curated set of add-ons for Amazon EKS clusters. All Amazon EKS add-ons include the latest security patches and bug fixes, and are validated by AWS to work with Amazon EKS. Amazon EKS add-ons allow you to consistently ensure that your Amazon EKS clusters are secure and stable and reduce the amount of work that you need to do to install, configure, and update add-ons.
Version release notes
Added support for Kubernetes Version 1.31
Additional details
Usage instructions
NOTE: An Uptycs account is required to use the Uptycs Collector EKS add-on.
- Login to the Uptycs UI/tenant.
- Click the three dots in the top right corner & select "Integrations & Downloads".
- On the Integrations & Downloads page click on the "Add Cluster" button under "Kubernetes & Containers" section.
- From the dialog box select "Amazon EKS" as Cluster & "EKS Add-on" as Integration Method. Then click next to download the package.
- Unzip the downloaded package.
- Login to the "AWS Management Console" & head to the "Elastic Kubernetes Service" console.
- On the EKS page, click the cluster on which you want to install the add-on.
- Click "Add-ons" & then click on "Get more add-ons".
- Search for "Uptycs Collector". Check the box and click "Next".
- Expand the "Optional configuration settings" section & paste the contents of "uptycs-collector-values.yaml" file.
- Click "Next" & then "Create" to install the add-on.
- Finally, create the Kubernetes secrets required by Uptycs Collector to operate correctly by running this command: "kubectl apply -f uptycs-collector-secrets.yaml".
- After creating the secret, allow some time for the collector to detect the secrets and start running successfully.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

Customer reviews
A unified solution to improve IT management and operations – all in one.
Uptycs – an advanced security monitoring tool, albeit expensive.
Excellent lightweight EDR with full Mac support
Uptycs OS Query
A common search bar would be easy for analyst to search Hostnames/IP
If Thread Adversaries try to evade detections Defender/Falcon Uptycs was able to capture those events