Installing DSG on Azure

This section provides information on launching a Data Security Gateway (DSG) virtual machine (VM) on the Microsoft Azure platform.

The Microsoft Azure platform is a set of cloud-based computing services, which include computing services, virtual machines, data storage, analytics, networking services, and so on.

Prerequisites

This section describes the prerequisites for launching the DSG on Azure. It also includes the details for the network prerequisites and hardware requirements for the DSG.

Ensure that the following prerequisites are met before launching the DSG on Azure:

  • Ensure that an ESA v10.1.x is installed.

    For more information about installing the ESA v10.1.x, refer to the sections Installing Appliance On-Premise and Installing Appliances on Cloud Platforms.

  • Ensure that Policy Management (PIM) has been initialized on the ESA. The initialization of PIM ensures that cryptographic keys for protecting data and the policy repository have been created.
    For more information about initializing the PIM, refer to section Initializing the Policy Management.

  • Ensure that the FIPS mode is disabled on the ESA.
    For more information about diabling the FIPS mode, refer to the section Disabling the FIPS Mode

  • Ensure that Analytics component is initialized on the ESA. The initialization of Analytics component is required for displaying the Audit Store information on Audit Store Dashboards.
    For more information about initializing Analytics, refer Initializing Analytics on the ESA.

  • An Azure account is available with the following information:

    • Sign in URL for the Azure account
    • Authentication credentials for the Azure account
  • Ensure that the DSG BLOB is available in the storage account that will be selected to create the disk and the VM.

Audience

This section contains information for stakeholders who are interested in understanding how to create, launch, and install a DSG instance on Azure.

It is recommended that you possess working knowledge of the Azure Platform and knowledge of related concepts.

For more information about Azure concepts, refer to the Azure documentation at: https://docs.microsoft.com/en-us/azure/

Hardware Requirements

This section describes the hardware and software requirements for the DSG.

As the DSG is hosted and run on Azure, the hardware requirements are dependent on the configurations provided by Azure.

For reference, the following list describes the minimum hardware requirements for the DSG:

  • CPU: 4 Cores
  • RAM: 16 GB
  • Disk Size: 64 GB
  • Network Interfaces: 2

The hardware configuration required might vary based on the actual usage or amount of data and logs expected.

Network Requirements

This section explains the network requirements for the DSG in Azure.

It is recommended that the DSG on Azure is provided with the Azure Virtual Network environment.
For more information about the Azure Virtual Network, refer to the Azure documentation at https://docs.microsoft.com/en-us/azure.

Ensure that two Network Interface Cards (NICs) are added during the DSG instance creation on Azure.
For more information about the network interface requirements, refer to the section Network Planning.

The Data Security Gateway must be configured with the following two network interfaces:

  • Management Interface - This interface is used for communication between the ESA and the DSG, and accessing the DSG Web UI.
  • Service Interface - This interface is used for handling the network traffic traversing through the DSG.

Installing the DSG on Azure

This section provides information for the steps required to launch and install the Data Security Gateway (DSG) instance from a BLOB provided by Protegrity.

Ensure that the installation order provided in the table is followed.

Order of installationDescriptionAffected ApplianceReference
1Apply the DSG v3.3.0.1 patch (ESA_PAP-ALL-64_x86-64_10.1.0.xxxx.DSGUP.3.3.0.1.x.pty) on the ESA v10.1.x.
Before applying a patch on the ESA, it is recommended to take a full OS backup from the ESA Web UI.
For more information about taking a full OS backup from the ESA Web UI, refer Backing up the Appliance OS.
ESAInstalling the DSG patch on ESA
2Create a Trusted Appliance Cluster (TAC) on the ESAESACreate a TAC on ESA
3Optional: Add the other ESA nodes to the existing Trusted Appliance Cluster from the TAC screen.ESAAdding a ESA node
4Create an image from a BLOB.DSGCreating an Image from the DSG BLOB
5Create a VM from an image.DSGCreate a VM from the Image
6Adding the Second Network Interface.DSGAdding the Second Network Interface
7Finalize the DSG Installation.DSGFinalize the DSG Installation
8Configuring the Second Network Interface.DSGConfiguring the Second Network Interface
9Configure the Default Gateway for the Management NIC using the DSG CLI Manager.DSGConfiguring Default Gateway for Management NIC (ethMNG) using the DSG CLI Manager
10Configure the Default Gateway for the Service NIC using the DSG CLI Manager.DSGConfiguring Default Gateway for Service NIC (ethSRV0) using the DSG CLI Manager
11Set ESA communication between the DSGs and ESA.DSGSet ESA communication
12Configure the DSG to forward the logs to Insight on the ESA.
Ensure that this step is performed on all DSG nodes.
DSGForwarding Logs to Insight
13Registering the DSG
Ensure that the primary DSG node is registered with all ESA nodes.
ESARegistering the DSG
14Optional: Add the other DSG nodes to the existing Trusted Appliance Cluster from the Cluster tab.ESAAdding a DSG node
15Perform the post-installation steps.ESAPost Installation Steps

Last modified : January 20, 2026