<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Protegrity Policy Manager on</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/</link><description>Recent content in Protegrity Policy Manager on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/index.xml" rel="self" type="application/rss+xml"/><item><title>Prerequisites for Installing the Policy Workbench</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_prereq/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_prereq/</guid><description>&lt;p>Ensure that the jumpbox can connect to the required repositories. If not already authenticated, then log in to the required repository.&lt;/p>
&lt;ul>
&lt;li>For connecting and deploying from the Protegrity Container Registry (PCR), use the following command and the credentials obtained from the My.Protegrity portal during &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/obtainingcreds/">account creation&lt;/a>:&lt;/li>
&lt;/ul>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>helm registry login registry.protegrity.com:9443
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;ul>
&lt;li>For connecting and deploying to the local repository, use your local credentials and local repository endpoint as required.&lt;/li>
&lt;/ul>
&lt;p>Ensure that the PPC Cluster is installed and accessible, before installing Policy Workbench on PPC.&lt;/p></description></item><item><title>Uninstalling the Protegrity Policy Manager</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_uninstallation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_uninstallation/</guid><description>&lt;p>To uninstall the deployment:&lt;/p>
&lt;ol>
&lt;li>Run the following command to uninstall the Policy Workbench.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>helm uninstall policy-workbench -n policy-workbench
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;ol start="2">
&lt;li>Run the following command to clean up the AWS resources.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-gdscript3" data-lang="gdscript3">&lt;span style="display:flex;">&lt;span>&lt;span style="color:#000">tofu&lt;/span> &lt;span style="color:#000">destroy&lt;/span> &lt;span style="color:#ce5c00;font-weight:bold">-&lt;/span>&lt;span style="color:#204a87;font-weight:bold">var&lt;/span>&lt;span style="color:#ce5c00;font-weight:bold">=&lt;/span>&lt;span style="color:#4e9a06">&amp;#39;cluster_name=&amp;lt;PPC cluster name&amp;gt;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title>Backing up the Policy Workbench</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_backup/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_backup/</guid><description>&lt;p>By default, the Policy Workbench data is backed up on a daily basis using a scheduled backup, after the Policy Workbench has been installed. The backed-up data includes the Kubernetes object state and the persistent volume data. The backed-up data is automatically stored in the encrypted AWS S3 bucket that you created when you deployed PPC.&lt;/p>
&lt;p>For more information about the AWS S3 bucket, refer to the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/ppc/install/prerequisites/#creating-aws-kms-key-and-s3-bucket">Creating AWS KMS Key and S3 Bucket&lt;/a>.&lt;/p></description></item><item><title>Restoring the Policy Workbench</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_restore./</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_restore./</guid><description>&lt;h2 id="before-you-begin">Before you begin&lt;/h2>
&lt;p>Before starting a restore, ensure that the following prerequisites are met:&lt;/p>
&lt;ul>
&lt;li>Ensure that an existing backup is available. Backups are taken automatically as part of the default installation of the Policy Workbench using scheduled backup mechanisms. The backups are available in the encrypted AWS S3 bucket that you created when you deployed PPC. You can also choose to manually back up the data.&lt;/li>
&lt;/ul>
&lt;p>For more information about the AWS S3 bucket, refer to the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/ppc/install/prerequisites/#creating-aws-kms-key-and-s3-bucket">Creating AWS KMS Key and S3 Bucket&lt;/a>.&lt;/p></description></item><item><title>Workbench Roles and Permissions</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/pmg_roles_permissions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/pmg_roles_permissions/</guid><description>&lt;p>Roles are templates that include permissions and users can be assigned to one or more roles. All users in the appliance must be associated with a role.&lt;/p>
&lt;p>The roles packaged with Policy Workbench are as follows:&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Roles&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Permissions&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>workbench_administrator&lt;/td>
 &lt;td>Full administrative access to workbench.&lt;/td>
 &lt;td>workbench_management_policy_write, workbench_deployment_immutablepackage_export, workbench_deployment_certificate_export&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>workbench_viewer&lt;/td>
 &lt;td>Read-only access to workbench.&lt;/td>
 &lt;td>workbench_management_policy_read&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>workbench_deployment_administrator&lt;/td>
 &lt;td>Administrative access to workbench deployments.&lt;/td>
 &lt;td>workbench_deployment_immutablepackage_export, workbench_deployment_certificate_export&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>The capabilities of a role are defined by the permissions attached to the role. Though roles can be created, modified, or deleted from the appliance, permissions cannot be edited. The permissions that are available to map with a user and packaged with Policy Workbench as default permissions are as follows:&lt;/p></description></item><item><title>Troubleshooting the Protegrity Policy Manager</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_trblsht/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/workbench_trblsht/</guid><description>&lt;h2 id="helm-upgrade-fails-due-to-existing-kubernetes-jobs">Helm upgrade fails due to existing Kubernetes jobs&lt;/h2>
&lt;p>&lt;strong>Issue&lt;/strong>: Helm upgrade fails because existing jobs, such as &lt;code>hubcontroller-init&lt;/code> and &lt;code>kmgw-create-keystore&lt;/code>, cannot be patched.&lt;/p>
&lt;p>&lt;strong>Description&lt;/strong>: Helm upgrade cannot modify or replace existing Kubernetes jobs if fields such as image registry, environment variables, args, and volumes are changed. This happens because the pod template of a job is immutable. So, the existing pods cannot be replaced when their template changes. As a result, the Helm upgrade fails.&lt;/p></description></item></channel></rss>