...
Tip |
---|
Tip Download the Azure Installation Files folder and keep all the requisite files handy during deployment. |
Supported only with premium workspace.
Supported only with Personal Access Token authentication.
On storage, Storage Blob Data Contributor rights are required for the logged-in user.
You must have permission to create (and map) Storage credentials and External Locations for the Unity Catalog.
Resource Group for all Kyvos resources. We recommend you keep an empty resource group that will only be used for deploying Kyvos resources. The deployment user must have Owner rights on this resource group.
If your network resources (for deploying Kyvos) are available in a separate Resource Group (other than the one mentioned in Point 1), create a Custom role for the user deploying the cluster with the following permissions. Refer to the Configuring Roles for Deployment User section for details on creating and assigning roles.
NOTE: This is not required if you are creating network resources using the Kyvos provided template.Microsoft.Network/virtualNetworks/subnets/read
Microsoft.Network/virtualNetworks/read
Microsoft.Network/networkSecurityGroups/read
Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action
Microsoft.Network/virtualNetworks/subnets/write
Microsoft.Network/virtualNetworks/subnets/join/action
Microsoft.Network/networkSecurityGroups/join/action
Managed Identity for Kyvos resources with the following information:
NOTE: As mentioned in the attached Prerequisites sheet, this is optional. It will be created if the value for Enable Managed Identity Creation is set as True in the ARM.If you want to use your existing Managed Identity, you will need these details:
Managed Identity Name
Managed Identity Resource Group Name
NOTE: If using an existing Managed Identity, ensure that NO permissions are assigned to it.
Valid License file for Kyvos.
Secret Key to access the Kyvos bundle.
Service Endpoints required on Subnet :
Azure Storage (Microsoft.Storage): This model enables you to secure and control the level of access to your storage accounts so that only applications requesting data over the specified set of networks or through the specified set of Azure resources can access a storage account.
Azure Key Vault (Microsoft.KeyVault): The virtual network service endpoints for Azure Key Vault allow you to restrict access to a specified virtual network. The endpoints also allow you to restrict access to a list of IPv4 (internet protocol version 4) address ranges.
Azure App Service (Microsoft.Web): By setting up access restrictions, you can define a priority-ordered allow/deny list that controls network access to your app.
Azure SQL Database (Microsoft.Sql): Security feature that controls whether the server for your databases and elastic pools in Azure SQL Database or for your dedicated SQL pool (formerly SQL DW) databases in Azure Synapse Analytics accepts communications that are sent from particular subnets in virtual networks.
Key Vault URL
If this is not provided, Kyvos will automatically create a new Key Vault for Azure passwords.
NOTE: You can create your own Key Vault for use with Kyvos.
If using an existing Key vault, ensure that the Soft Delete property is enabled, or you can enable it later.Permissions needed on Key Vault: Assigned managed identity should have permission Secret Permissions (GET, LIST, and SET)
In case of Automated deployment, Wizard-based deployment, and/or if using an existing Azure Database for Postgres Flexible Server, ensure that a separate subnet attached to it with delegation (Microsoft.DBforPostgreSWL/flexibleServers and service endpoints Storage, KeyVault, SQL and Web).
To use externally created Flexible Server in deployments, use ARM template (FlexibleServerKyvosManagerRepository and FlexibleServerKyvosRepository available in Azure Installation files folder) to create Flexible Server that can be used in the deployments directly. OR, if you create Flexible Server through Microsoft, then you need to complete the following steps. For more information about how to create Flexible Server, refer to Microsoft documentation.
For Kyvos repository
Database name must be delverepo.
Username must be Postgres
Following tags are expected on the external repository:
UsedBy - Kyvos
ROLE - DATABASE
LAYER - Metadata_Storage
For Kyvos Manager repository
Database name must be kmrepo.
Username must be kmdbuser
Following tags are expected on the external repository:
UsedBy - Kyvos
ROLE - DATABASE_KM
LAYER - Metadata_Storage
The Azure logged-in user should have the following rights to create Kyvos resources using ARM templates.
Owner Access on Resource group being used for deployment of Kyvos resources.
Key and Secret Management rights on the Key vault if using an existing Key vault.
Networking: Kyvos ARM template will need information about Vnet, Subnet, Network Interface/Security Group that will be used by Kyvos Machines.
Create a Network Interface/Security Group with the following ports opened in Inbound rules.
6602, 6903, 6703, 45450, 45460, 6603, 6803, 45440, 6605, 8081, 8080, 45421, 45564, 4000, 7009, 22, 8443, 8444. 9443, 9444.
To enable Web Portal High Availability,If using Session Management, you will need 45564 and 4000 ports opened in Inbound rules
If using Azure Load Balancer, you will need port 80.
See Ports required for Kyvos for details.
SSH Key pair consisting of a private key and a public key.
Storage account permission and recommendations:
Managed identity attached to the storage/container should have storage blob data contributor permission.
If the storage account is in a separate Resource Group (different from the one in which the Managed Identity exists), then the Managed Identity should have a Reader role assigned to it at the Storage Account level. This permission is needed by the Kyvos Manager validation framework to check if the Storage Account is accessible or not.
Service principle attached to the Databricks cluster should have storage blob data contributor permission on the storage/container.
Soft deletion property must be disabled.
Storage account must be of type ADLS GEN 2.
To access the Usage Dashboard, you need to provide permissions after completing the deployment.
For Automated Azure deployment,
Newly created Flexible Server: User provided password will be used for repository. No password change is required.
Existing Flexible Server: Password of the existing repository needs to be provided. No password change is required.
If you use an existing Virtual Network, a subnet with at least a /23 mask is required.
IP Address requirements
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Important Please save the details for future reference, as deployment will fail if you provide wrong details. |
Kubernetes node pool requirements: Kyvos requires the following two node pools in the AKS (Azure Kubernetes Service) Cluster:
agentpool
The mode for this pool will be System.
This agent pool will be used to run the kyvos-monitoring-server
The Managed identity attached to this node pool must have permissions to access the Kyvos Storage account.
This node pool must have taint defined as:
key: "CriticalAddonsOnly”
operator: "Equal"
value: "true"
effect: "NoSchedule"
userpool
The mode for this pool will be User.
This agent pool will be used to run the kyvos-compute-server
The managed identity attached to this node pool must have permissions to access on the Kyvos Storage account.
This node must have taint defined as:
key: " ComputeWorkerOnly”
operator: "Equal"
value: "true"
effect: "NoSchedule"
Kubernetes network policy requirements: Kyvos requires two namespaces: kyvos-monitoring and kyvos-compute. The following ports are required for interactions with important services in these namespaces.
kyvos-monitoring
Within this namespace, only monitoring services will be operational on the associated pods. The required labels for this service have been applied, specifically kyvos-monitoring-server.
The network policy for pods with the label kyvos-monitoring-server includes:
**Ingress:** Ports 80, 443
**Egress: ** All ports
kyvos-compute
Within this namespace, compute workers will be operational on the associated pods. The labels required for this service have been applied, specifically kyvos-compute-worker.
The network policy for pods with the label kyvos-compute-worker includes:
**Ingress: ** Ports 80, 443, 6903
**Egress: ** All ports
VPC Requirements: The Kyvos and Kubernetes clusters must be in the same VPC.
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note If Kyvos and Kubernetes clusters are in different VPCs, they must be peered. |
CIDR Range for Kubernetes: A subnet with a minimum of a /23 mask is required, and it should have approximately.
IP Address Planning
IP Address Planning | Number of required Node(s) |
---|---|
Max Number of agentpool |
...
nodes | 1 |
Max Number of userpool |
...
nodes | 10 |
Max |
...
Surge | 10 |
...
% = 2 |
...
nodes |
Total |
...
nodes | Max Number of agentpool nodes + Max Number of userpool nodes + Max |
...
Surge |
...
1 + 10 + 2 = 13 |
...
nodes |
Max Pods per |
...
node |
...
) |
Total IP |
...
required | Total Nodes + Total nodes * Max |
...
Pods |
...
13 + 13 * 30 = |
...
403 |
For more details about IP address sizing, see Azure documentation.
Kubernetes Subnet Service Endpoints: Following Service Points are required on the subnet:
Microsoft.Storage
Microsoft.ContainerRegistry
Microsoft.Sql
Microsoft.KeyVault
...
KeyVault
Kyvos APIs and required Kubernetes permissions: Kyvos’ Managed Identity must have a Contributor role on the Kubernetes cluster.
Monitoring pod API
Analytical Server
Kube-Config Credentials (From Analytical server):
Monitoring Pod API: The following Monitoring Pod REST APIs are required:
Azure API for retrieving Kubernetes master details on Azure Kubernetes Service (AKS), including Cluster endpoint information.
REST API for requesting necessary job pods.
For example, https://34.47.137.13/apis/batch/v1/namespaces/kyvos-compute/jobs
Analytical Server: The following Analytical Server REST APIs are required:
REST API to check the status of the AKS agent pool.
REST API to modify AKS agent pool scaleset.
REST API to check the status of the AKS agent pool scaleset.
REST API to start the AKS cluster.
REST API to get the status of the AKS cluster.
REST API to get instance view of AKS agent pool scaleset.
REST API to get AKS agent pool scaleset information.
REST API to get a list of scaleset from the resource group.
Kube-Config Credentials (From Analytical server): Here is a list of required Kube-Config Credentials (From the Analytical Server) APIs:
Kubernetes Java API for creating deployments and services.
Kubernetes API obtains details on pods, deployments, and services.
Optional Information
In addition to the prerequisites, you can also keep the following information handy according to your business requirements.
...