<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Anonymizing Using Amazon Elastic Kubernetes Service (EKS) on</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/</link><description>Recent content in Anonymizing Using Amazon Elastic Kubernetes Service (EKS) on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/index.xml" rel="self" type="application/rss+xml"/><item><title>Verifying the Prerequisites</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/verify_prereq/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/verify_prereq/</guid><description>&lt;p>Ensure that the following prerequisites are met:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Base machine&lt;/strong> - This might be a Linux machine instance that is used to communicate with the Kubernetes cluster. This instance can be on-premise or on AWS. Ensure that Helm is installed on this Linux instance. You must also install Docker on this Linux instance to communicate with the Container Registry, where you want to upload the Docker images.&lt;/p>
&lt;p>For more information about the minimum hardware requirements, refer to the section &lt;a href="https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_api_prereqs/">Prerequisites for Deploying the Protegrity Anonymization API&lt;/a>.&lt;/p></description></item><item><title>Preparing the Base Machine</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/prep_base_machine/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/prep_base_machine/</guid><description>&lt;p>The steps provided here installs the software required for running the various EKS commands for setting up and working with the Protegrity Anonymization API cluster.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Log in to your system as an administrator.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Open a command prompt with administrator.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Install the following tools to get started with creating the EKS cluster.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Install AWS CLI 2, which provides a set of command line tools for the AWS Cloud Platform.&lt;/p>
&lt;p>For more information about installing the AWS CLI 2, refer to &lt;a href="https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2-linux.html">Installing or updating to the latest version of the AWS CLI&lt;/a>.&lt;/p></description></item><item><title>Creating the EKS Cluster</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/create_eks_cluster/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/create_eks_cluster/</guid><description>&lt;p>Complete the steps provided here to create the EKS cluster by running commands on the machine for the Protegrity Anonymization API.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note:&lt;/strong> The steps listed in this procedure for creating the EKS cluster are for reference use. If you have an existing EKS cluster or want to create an EKS cluster based on your own requirements, then you can directly navigate to the section &lt;a href="https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/access_eks_cluster/">Accessing the EKS Cluster&lt;/a> to connect your EKS cluster and the Linux instance.&lt;/p></description></item><item><title>Accessing the EKS Cluster</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/access_eks_cluster/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/access_eks_cluster/</guid><description>&lt;p>Connect to the cloud service using the steps in this section.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Run the following command to connect your Linux instance to the Kubernetes cluster.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>aws eks update-kubeconfig --name &amp;lt;Name of Kubernetes cluster&amp;gt; --region &amp;lt;Region in which the cluster is created&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/li>
&lt;li>
&lt;p>Run the following command to verify that the nodes are deployed.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>kubectl get nodes
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: You can also verify that the nodes are deployed in AWS from the &lt;strong>EKS Kubernetes Cluster&lt;/strong> dashboard.&lt;/p></description></item><item><title>Uploading the Image to AWS Container Registry (ECR)</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/upload_image_ecr/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/upload_image_ecr/</guid><description>&lt;p>Use the information in this section to upload the Protegrity Anonymization API image to the AWS container registry (ECR) for running the Protegrity Anonymization API in EKS.&lt;/p>
&lt;p>Ensure that you have set up your Container Registry.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: The steps listed in this section for uploading the container images to the Amazon Elastic Container Repository (ECR) are for reference use. You can choose to use a different Container Registry for uploading the container images.&lt;/p></description></item><item><title>Setting up NGINX Ingress Controller</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/setup_inginix_ingress_cntrl/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/setup_inginix_ingress_cntrl/</guid><description>&lt;p>Complete the steps provided here for installing the NGINX Ingress Controller on the base machine.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Login to the base machine and open a command prompt.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Create a namespace where the NGINX Ingress Controller needs to be deployed using the following command.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>kubectl create namespace &amp;lt;Namespace name&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>For example,&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>kubectl create namespace nginx
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/li>
&lt;li>
&lt;p>Add the repository from where the Helm charts for installing the NGINX Ingress Controller must be fetched using the following command.&lt;/p></description></item><item><title>Using Custom Certificates in Ingress</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/use_custom_cert_ingress/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/use_custom_cert_ingress/</guid><description>&lt;p>Protegrity Anonymization API uses certificates for secure communication with the client. You can use the certificates provided by Protegrity or use your own certificates. Complete the configurations provided in this section to use your custom certificates with the Ingress Controller.&lt;/p>
&lt;p>Ensure that the certificates and keys are in the &lt;code>.pem&lt;/code> format.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: Skip the steps provided in this section if you want to use the default Protegrity certificates for the Protegrity Anonymization API.&lt;/p></description></item><item><title>Updating the Configuration Files</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/update_config_file/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/update_config_file/</guid><description>&lt;p>Use the template files provided to specify the EKS settings for the Protegrity Anonymization API.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Extract and update the files in the &lt;code>ANON-API_HELM_1.4.0.x.tgz&lt;/code> package.&lt;/p>
&lt;p>The &lt;code>ANON-API_HELM_1.4.0.x.tgz&lt;/code> package contains the &lt;code>values.yaml&lt;/code> file that must be modified as per your requirements. It also contains the &lt;strong>templates&lt;/strong> directory with &lt;code>yaml&lt;/code> files.&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: Ensure that the necessary permissions for updating the files are assigned to the &lt;code>.yaml&lt;/code> files.&lt;/p>&lt;/blockquote>
&lt;/li>
&lt;li>
&lt;p>Navigate to the &lt;code>&amp;lt;path_to_helm&amp;gt;/templates&lt;/code> directory and delete the &lt;code>anon-db-storage-aws.yaml&lt;/code> file.&lt;/p></description></item><item><title>Deploying the Protegrity Anonymization API to the EKS Cluster</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/deploy_api_eks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/deploy_api_eks/</guid><description>&lt;p>Complete the following steps to deploy the Protegrity Anonymization API on the EKS cluster.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Navigate to the &lt;code>&amp;lt;path_to_helm&amp;gt;/templates&lt;/code> directory and delete the &lt;code>anon-dbpvc-azure.yaml&lt;/code> and the &lt;code>anon-storagepvc-azure.yaml&lt;/code> files.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Create the Protegrity Anonymization API namespace using the following command.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>kubectl create namespace &amp;lt;name&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: Update and use the &lt;name> from the &lt;code>values.yaml&lt;/code> file that is present in the Helm chart that you used in the previous section.&lt;/p>&lt;/blockquote>
&lt;/li>
&lt;li>
&lt;p>Run the following command to deploy the pods.&lt;/p></description></item><item><title>Viewing Protegrity Anonymization API Using REST</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/view_anon_api_rest/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/view_anon_api_rest/</guid><description>&lt;p>Use the URLs provided here for viewing the Protegrity Anonymization API service and pod details after you have successfully deployed the Protegrity Anonymization API.&lt;/p>
&lt;p>You need to map the IP address of Ingress in the &lt;code>hosts&lt;/code> file with the host name set in the Ingress configuration.&lt;/p>
&lt;p>For more information about updating the &lt;code>hosts&lt;/code> file, refer to &lt;strong>step 2&lt;/strong> of the section &lt;a href="https://docs.protegrity.com/anonymization/1.4.0/docs/additional_info/setup_custom_certs_sdk/">Enabling Custom Certificates From SDK&lt;/a>.&lt;/p>
&lt;p>Optionally, update the hostname of the Elastic Load Balancer (ELB) that is created by the NGINX Ingress Controller using the section &lt;a href="https://docs.protegrity.com/anonymization/1.4.0/docs/additional_info/create_dns_entry_elb_hostname_route53/">Creating a DNS Entry for the ELB Hostname in Route53&lt;/a>.&lt;/p></description></item><item><title>Creating Kubernetes Service Accounts and Kubeconfigs for Anonymization Cluster</title><link>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/create_kub_acc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/anonymization/1.4.0/docs/install-anonymization/anon_cloud/eks/create_kub_acc/</guid><description>&lt;p>A service account in the anonymization cluster namespace has access to the anonymization namespace. It might also have access to the whole cluster. These permissions for the service account allow the user to create, read, update, and delete objects in the anonymization Kubernetes cluster or the namespace. Additionally, the kubeconfig is required to access the service account using a token.&lt;/p>
&lt;p>In this section, you create a Kubernetes service account and the role-based access control (RBAC) configuration manually using &lt;code>kubectl&lt;/code>.&lt;/p></description></item></channel></rss>