<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Deployment on EKS on</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/</link><description>Recent content in Deployment on EKS on</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 06 Apr 2026 12:09:12 +0000</lastBuildDate><atom:link href="https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/index.xml" rel="self" type="application/rss+xml"/><item><title>Architecture for EKS</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_arch/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_arch/</guid><description>&lt;p>The following architectural diagram illustrates the main components in the deployment of the product on EKS.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/data-discovery/1.0.0/docs/images/discover/dd_arch_eks.png" alt="">&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Component&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Ingress Controller&lt;/td>
 &lt;td>The Ingress controller acts as the single point of entry for the requests provided by a user.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Ingress rule&lt;/td>
 &lt;td>The Ingress rule routes the requests to the Classification service.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Classification pods&lt;/td>
 &lt;td>The classification service deployment contains the classification service pods. Based on the load of requests, the pods for the classification service will scale horizontally to meet the demand. New pods are created when a certain threshold is reached. The pods are fronted by a load balancer that directs requests from the Ingress controller. Based on the load and availability, the requests are distributed amongst the pods.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Service provider deployment&lt;/td>
 &lt;td>The Service deployment contain the images of the Presidio and the Roberta service providers. The requests sent by Classification service are received by these pods for the classification of data. Similar to the classification service deployment, these pods will scale horizontally to meet the request load demand.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title>Prerequisites</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_prereqs/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_prereqs/</guid><description>&lt;p>Ensure that the following points are completed before deploying the application.&lt;/p>
&lt;ul>
&lt;li>
&lt;p>The &lt;a href="https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_obtaining_package/">development package&lt;/a> provided by Protegrity is obtained from the portal and extracted.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>The following tools are required to install the product:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;a href="https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html">AWS CLI&lt;/a>: This must be configured with valid credentials. For more information, refer to &lt;a href="https://docs.aws.amazon.com/cli/v1/userguide/cli-chap-configure.html#configure-precedence">Configuration and credentials precedence&lt;/a>. The AWS account used must have the necessary permissions to create and manage EKS clusters and associated resources.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;a href="https://kubernetes.io/docs/tasks/tools/">kubectl&lt;/a>: This is used to manage the Kubernetes cluster.&lt;/p></description></item><item><title>Configuring Environment Variables</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_conf_env_vbles/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_conf_env_vbles/</guid><description>&lt;p>Run the following steps to configure the environment variables.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Navigate to the &lt;code>eks&lt;/code> directory.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Open the &lt;code>.env&lt;/code> file and configure the following variables:&lt;/p>
&lt;/li>
&lt;/ol>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Variable&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Mandatory&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>CLUSTER_NAME&lt;/td>
 &lt;td>Name for the cluster. Ensure that a unique name is provided to the cluster.&lt;/td>
 &lt;td>No&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CLASSIFICATION_DOCKER_IMAGE&lt;/td>
 &lt;td>Repository path where the docker image of Classification service is stored.&lt;/td>
 &lt;td>Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>ROBERTA_DOCKER_IMAGE&lt;/td>
 &lt;td>Repository path where the docker image of Roberta service is stored.&lt;/td>
 &lt;td>Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>PRESIDIO_DOCKER_IMAGE&lt;/td>
 &lt;td>Repository path where the docker image of Presidio service is stored.&lt;/td>
 &lt;td>Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>SUBNET_IDS&lt;/td>
 &lt;td>Subnetwork IDs. Provide a comma-separated list. For example,&lt;code>&amp;quot;subnet-YYYY\\,subnet-XXXXX&amp;quot;&lt;/code>&lt;/td>
 &lt;td>Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>AWS_REGION&lt;/td>
 &lt;td>Region of AWS infrastructure.&lt;/td>
 &lt;td>Yes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CLUSTER_IAM_ROLE_ARN&lt;/td>
 &lt;td>IAM role ARN for the cluster. If left blank, CloudFormation will automatically create the role.&lt;/td>
 &lt;td>No&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>NODE_IAM_ROLE_ARN&lt;/td>
 &lt;td>IAM role ARN for the nodes. If left blank, CloudFormation will automatically create the role.&lt;/td>
 &lt;td>No&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;ol start="3">
&lt;li>Save the changes.&lt;/li>
&lt;/ol></description></item><item><title>Deploying the Cluster and the Application</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_deploy_app/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_deploy_app/</guid><description>&lt;h2 id="deploying-the-application">Deploying the Application&lt;/h2>
&lt;p>Deploy the Data Discovery application on EKS.&lt;/p>
&lt;ol>
&lt;li>Navigate to the &lt;code>eks&lt;/code> directory.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>cd /eks
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;ol start="2">
&lt;li>Run the &lt;code>aws_deploy&lt;/code> script.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>./aws_deploy.sh 
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;br>
After the deployment is completed, the following message is displayed.
&lt;p>&lt;code>Service 'protegrity.classification-service is ready!&lt;/code>&lt;br>
&lt;code>Your Ingress Controller is available at {DNS address}&lt;/code>&lt;/p>
&lt;blockquote>
&lt;p>Note the DNS address of the Ingress controller.&lt;/p>&lt;/blockquote>
&lt;h2 id="verifying-the-installation">Verifying the Installation&lt;/h2>
&lt;p>Run the following cURL command to verify the installation.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span>curl -k https://&lt;span style="color:#ce5c00;font-weight:bold">{&lt;/span>Ingress Controller DNS address&lt;span style="color:#ce5c00;font-weight:bold">}&lt;/span>/readiness
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>curl -k -X POST https://&lt;span style="color:#ce5c00;font-weight:bold">{&lt;/span>Ingress Controller DNS address&lt;span style="color:#ce5c00;font-weight:bold">}&lt;/span>/pty/data-discovery/v1.0/classify -H &lt;span style="color:#4e9a06">&amp;#39;Content-Type: text/plain&amp;#39;&lt;/span> --data &lt;span style="color:#4e9a06">&amp;#39;Jake lives in 35, Hampden Street&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> 
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>The response generated will be similar to the following snippet.&lt;/p></description></item><item><title>Viewing the Logs</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_view_logs/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_view_logs/</guid><description>&lt;h2 id="viewing-logs">Viewing Logs&lt;/h2>
&lt;p>The application logs can be viewed using the following commands:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span> kubectl logs classification-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> kubectl logs roberta-provider-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> kubectl logs presidio-provider-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>Note: The version of the images can be obtained using the following command:
&lt;code>kubectl get pods -n &amp;lt;namespace-name&amp;gt;&lt;/code>&lt;/p>&lt;/blockquote>
&lt;h3 id="setting-the-log-level">Setting the Log Level&lt;/h3>
&lt;p>The log level can be updated in the &lt;code>value.yaml&lt;/code> file.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># Custom logging configuration for the application.&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic">#&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># EXAMPLE - default settings &lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># loggingConfig:&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># root:&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># level: DEBUG&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># loggers:&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># tornado.access:&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># level: WARNING&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#8f5902;font-style:italic"># &lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>To set the log level, run the following steps.&lt;/p></description></item><item><title>Removing the Application</title><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_undeploy/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/dd_eks_undeploy/</guid><description>&lt;p>To remove the cluster and application from EKS, run the following steps.&lt;/p>
&lt;ol>
&lt;li>Navigate to the &lt;code>eks&lt;/code> directory.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>cd /eks
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;ol start="2">
&lt;li>Run the &lt;code>aws_undeploy&lt;/code> script.&lt;/li>
&lt;/ol>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>./aws_undeploy.sh 
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>Note: To remove the application completely, ensure that the images uploaded to the image repository are also deleted.&lt;/p>&lt;/blockquote></description></item><item><title/><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/command_down/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/command_down/</guid><description>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span> ./aws_undeploy.sh
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title/><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/command_up/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/command_up/</guid><description>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-bash" data-lang="bash">&lt;span style="display:flex;">&lt;span> ./aws_deploy.sh &lt;span style="color:#ce5c00;font-weight:bold">[&lt;/span>cluster_name&lt;span style="color:#ce5c00;font-weight:bold">]&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title/><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/directory_down/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/directory_down/</guid><description>&lt;ol>
&lt;li>
&lt;p>Navigate to the &lt;code>/deployment/eks&lt;/code> directory.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Run the &lt;code>aws_undeploy.sh&lt;/code> file. &lt;br>&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title/><link>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/directory_up/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.0.0/docs/dd_deploy/dd_eks/commands/directory_up/</guid><description>&lt;ol>
&lt;li>
&lt;p>Navigate to the &lt;code>/deployment/eks&lt;/code> directory.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Run the &lt;code>aws_deploy.sh&lt;/code> script. &lt;br>&lt;/p>
&lt;/li>
&lt;/ol></description></item></channel></rss>