<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Amazon EKS on</title><link>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/</link><description>Recent content in Amazon EKS on</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 06 Apr 2026 11:47:24 +0000</lastBuildDate><atom:link href="https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/index.xml" rel="self" type="application/rss+xml"/><item><title>Prerequisites</title><link>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/eks_prereqs/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/eks_prereqs/</guid><description>&lt;p>Before deploying Data Discovery on Amazon EKS, ensure that following requirements are met for a smooth deployment process.&lt;/p>
&lt;h2 id="tools-and-permissions">Tools and Permissions&lt;/h2>
&lt;p>The following tools must be installed and properly configured on your local machine:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;a href="https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html">AWS CLI&lt;/a> of version 2.28.3 is installed. It us a command-line interface for AWS services. Must be configured with valid credentials having EKS cluster creation and management permissions. For more information about the configuration details, refer to &lt;a href="https://docs.aws.amazon.com/cli/v1/userguide/cli-chap-configure.html#configure-precedence">Configuration and credentials precedence&lt;/a>.&lt;/p></description></item><item><title>EKS Deployment Architecture</title><link>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/eks_arch/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/eks_arch/</guid><description>&lt;p>The following architectural diagram illustrates the main components in the deployment of the product on EKS.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/data-discovery/1.1.0/docs/images/discover/dd_arch_eks.png" alt="">&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Component&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Ingress Controller&lt;/td>
 &lt;td>The Ingress controller acts as the single point of entry for the requests provided by a user.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Ingress rule&lt;/td>
 &lt;td>The Ingress rule routes the requests to the Classification service.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Classification pods&lt;/td>
 &lt;td>Classification service pods that act as the main entry point and the aggregator of the responses provided by the service providers.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Context and Pattern service providers&lt;/td>
 &lt;td>Pattern and the Context service providers pods that perform that task of identifying the sensitive data.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title>Viewing Application Logs</title><link>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/view_logs/</link><pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/data-discovery/1.1.0/docs/deploy/eks/view_logs/</guid><description>&lt;p>The application logs can be viewed using the following commands:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span> kubectl logs classification-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> kubectl logs roberta-provider-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> kubectl logs presidio-provider-deployment-{version} -n protegrity -f
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;blockquote>
&lt;p>Run the &lt;code>kubectl get pods -n &amp;lt;namespace-name&amp;gt;&lt;/code> command to obtain the version of the images.&lt;/p>&lt;/blockquote>
&lt;h2 id="setting-the-log-level-and-other-logging-configuration">Setting the Log Level and other Logging Configuration&lt;/h2>
&lt;p>Set the log level and other valid &lt;a href="https://docs.python.org/3/library/logging.html">Python Logging&lt;/a> configuration.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Navigate to the &lt;code>helm/data-discovery-classification&lt;/code> directory in your downloaded deployment package.&lt;/p></description></item></channel></rss>