Before installing the Protegrity application in VantageCloud Lake, you must configure the ESA Server with specific parameters on an AWS account using PrivateLink .
As Protegrity ESA Server administrator perform the following steps to configure ESA Server:
- Obtain VantageCloud Lake details:
- Sign on VantageCloud Lake Console as organization administrator.
- From the User Defined Functions page, select Third Party Applications.
- Under Available Partner Solutions, select Protegrity.
- From Configure Partner Solution page, select the License Agreement check-box.
- Select an Environment in which you want to install Protegrity application.
- Make a note of the Availability Zone ID of Lake Environment and IAM Role that are displayed under your environment selection.
- Create Target Group for Data Protectors:
- Sign on your organization’s AWS account as administrator. You must also have ESA Server administrator privileges.
- From EC2 Dashboard > Load Balancing > Target Groups, select Create Target Group.
- Fill out the form with the specified values:
Option Value Target Type Instances Protocol TCP Required for mTLS handshake between Data Protectors and the ESA Server.
Port 8443 VPC VPC where ESA instance is deployed - From the Register Targets screen, select ESA or Proxy instance that you want to include in this Target Group.
- Select Include as pending below and select Create target group.The registered target status transitions to healthy.
- Create Target Group for Log Forwarders:
- As administrator of your organization AWS account, from EC2 Dashboard > Load Balancing > Target Groups, select Create Target Group.
- Fill out the form with the specified values:
Option Value Target Type Instances Protocol TCP Required for mTLS handshake between Log Forwarders and the ESA Server.
9200 VPC where ESA instance is deployed - From the Register Targets screen, select ESA or Proxy instance that you want to include in this Target Group.
- Select Include as pending below and select Create target group.The registered target status transitions to healthy.
For more information, see Open Listening Ports section in Protegrity Enterprise Security Administrator Guide 9.1.0.0 . - Create Network Load Balancer:
- From the Basic Configuration screen, select Internal as Scheme, and use the default values for IPv4 address and Private IPv4 address.
- Fill out the form with the specified values and select Save.
Option Value Network Mappings - Select VPC where the ESA instance or Proxy you want to expose is deployed.
- Select Availability Zones and Subnets as Mappings.
You can select all the availability zones and subnets that you want the load balancer to connect to. You must deploy the ESA Server in the availability zone that has the same Availability Zone ID as that of your VantageCloud Lake environment that you noted in step 1.f.
Listeners and routing - Select TCP as Protocol
- Select 8443 and 9200 as Ports
- Under the Default Action, specify to forward the traffic to the target groups created in the previous steps.
Attributes Select Enable cross-zone load balancing to make sure that the load balancer works in all the Availability Zones.
- Create VPC Endpoint Service:
- From the VPC dashboard select Endpoint Services, then Create Endpoint Service.
- Select the Network Load Balancer that you created in the previous step.
- Select Create Service and fill out the form with specified values.
Option Value Endpoint Service Settings Select Network as Load Balancer Type Available Load Balancers Select the Network Load Balancer that you created in the previous step. Details of selected load balancer Verify that Availability Zone ID of your services is same as that of VantageCloud Lake. Additional Settings - Select Acceptance Required
- Select IPv4 as Supported IP Address Types.
- Allow Principals to use the VPC Endpoint Service:
- Select the VPC Endpoint Service created in the previous step.
- Select Actions, then Allow Principals.
- Enter the Amazon Resource Number (ARN) of the IAM role that you noted in step 1.f.
- Select Allow Principals.This assures that only the Data Protectors in your VantageCloud Lake environment can access the ESA Server. Teradata recommends to allow only the VantageCloud Lake to secure your ESA Server.