Azure Cloud Resources¶
Overview¶
Before installing the Privacera Manager software, the following Azure Cloud resources need to be created:
| Prerequisite | Description |
|---|---|
| Azure Virtual Machine | A virtual machine to run the Privacera Manager software. Refer here for more details. |
| Azure AKS cluster | AKS cluster to run the Privacera software. Refer here for more details. |
| Azure Postgre SQL | Azure PostgreSQL server for the Privacera database. Refer here for more details. |
| Wildcard certificate and Key | A wildcard certificate for the domain name used for the Privacera service endpoints, along with the private key, is required. Refer to here for more details. |
Appendix¶
Azure Virtual Machine for running Privacera Manager¶
Virtual Machine
Privacera Manager runs on a Virtual Machine that has access to the Kubernetes cluster and can create and manage cloud resources.
Tip
The Privacera Manager installation on this Virtual Machine will contain signed certificates necessary for subsequent upgrades. Therefore, it is recommended that this Virtual Machine is not deleted and is protected from termination. It is also strongly advised to backup the contents of the Privacera Manager folder on regular basis.
You don't need to run this Virtual Machine 24x7. You can stop the Virtual Machine when it is not in use.
Vitrual Machine configuration
The Vitrual Machine needs to be provisioned to run the Privacera Manager software. At a minimum, the instance should have the following specifications:
- Ubuntu 20.04
- Minimum 1 vCPUs
- Minimum 4 GB RAM
- Minimum 100 GB disk space
- SELinux should be disabled
User Configuration
Privacera Manager requires a dedicated user account with sudo privileges to run properly. This user must be configured with NOPASSWD sudo access to ensure automated operations can execute without manual intervention.
To create and configure the user:
-
Create a dedicated user (e.g.,
privacera-admin):Bash -
Add the user to the sudo group:
Bash -
Configure
NOPASSWDsudo access by adding the following line to/etc/sudoersusingvisudo:Bash
Following software should be installed on the virtual machine:
Packages
- ssh, curl, tar, wget, gcc*,
- Openssl (v1.01, build 16 or later)
- Python3 (with python-devel*)
- User account with sudo permissions
docker
kubectl
Follow the instructions on this link.
helm
Follow the instructions on this link.
Azure AKS cluster for running Privacera Software¶
Azure AKS
Azure AKS cluster with the following specifications:
- Kubernetes version - For supported version check Compatibility and Versions.
- Node type - D4s v3 or similar
- Auto-scaling node group - min 3 to max 10 nodes
- Kubernetes Metrics Server - Required for monitoring and autoscaling. See installation instructions below
Kubernetes Metrics Server
The Kubernetes Metrics Server is required for Privacera to function properly. It provides resource metrics for pods and nodes, which are essential for monitoring and autoscaling.
Check if Metrics Server is already installed:
| Bash | |
|---|---|
If the Metrics Server is not installed, follow these steps:
Option 1: Install via YAML (Recommended)
For Azure AKS, you can install Metrics Server with the standard command:
| Bash | |
|---|---|
If you encounter TLS certificate issues, patch the deployment with additional flags:
| Bash | |
|---|---|
Option 2: Install via Helm
Troubleshooting TLS Certificate Errors
Azure AKS kubelets use certificates that are signed by the cluster CA and recognized by the Metrics Server automatically. You typically don't need the --kubelet-insecure-tls flag.
However, if you encounter an error like:
| Text Only | |
|---|---|
Then re-run the Helm installation with the insecure TLS flag:
Verify Installation:
| Bash | |
|---|---|
For more information, refer to the official Kubernetes Metrics Server documentation.
Azure PostgreSQL Server¶
Azure PostgreSQL Server
Azure PostgreSQL Server with the following specifications:
- PostgreSQL Server.
- create privacera_db as the database by following these commands
SQL
Wildcard certificate and Private Key¶
Wildcard certificate and Private Key
A wildcard certificate for the domain name used for the Privacera service endpoints, along with the private key. This should one of these:
- Wild-card certificate. The certificate requirements are given in TLS Certificate.
- Certificate with specific host names generated by Privacera Manager
- Certificate with specific host names generated by you for the service endpoints.
- Prev Prerequisites
- Next Setup