Aurva

Data Plane on AWS EKS

Deploy the Aurva Data Plane on an existing Amazon EKS cluster.

Overview

The Aurva Data Plane runs inside your environment and is responsible for collecting telemetry — discovery, classification, query activity, and posture data — from your AWS account, then forwarding it to the Aurva Control Plane for analysis and visualization.

This guide covers Data Plane deployment on an existing Amazon EKS cluster, including infrastructure prerequisites, networking requirements, and the high-level deployment workflow.

High Level Architecture

Data Plane on AWS EKS architecture

Infrastructure Components

The customer must provision the following infrastructure before installing the Data Plane:

Compute

ComponentRequirement
Node groupA dedicated node group is recommended (an existing one can be reused)
Architecturex86_64
Node OSAmazon EKS-Optimized Linux
Instance sizec5a.xlarge (4 vCPU, 8 GB RAM) — minimum
Storage50 GB minimum
Node countProduction: minimum 2; scale out as needed. PoC: 1 is acceptable.

Storage

ResourceConfiguration
S3 bucketRetention 3 days; SSE-3 server-side encryption; public access blocked; bucket policy restricts access to the Data Plane IAM role
Terraform backendS3 bucket plus DynamoDB lock table for state

IAM

The Aurva-provided Terraform module provisions the read-only IAM permissions required by the Data Plane. See AWS IAM Permissions for the Data Plane for the full policy document.

Pod Specifications

Aurva deploys the following workloads into the EKS cluster (production sizing):

PodTypeReplicasMemoryCPUProduct
controllerDeploymentmin 1, max 5req 500 MiB / lim 1024 MiBreq 500 m / lim 1000 mAll (DAM, Data Flow, DSPM)
pii-analyserDeploymentmin 1, max 3req 2 GiB / lim 4 GiBreq 1000 m / lim 2000 mAll
ocrDeploymentmin 1, max 1req 1 GiB / lim 1 GiBreq 1000 m / lim 1000 mDSPM
postgresqlStatefulSet1req 200 m / lim 500 mreq 500 MiB / lim 500 MiBAll
ebpf-agentDaemonSetOne per nodereq 300 MiB / lim 600 MiBreq 300 m / lim 600 mData Flow

Networking Prerequisites

The following outbound connectivity must be permitted from the EKS node group:

DestinationPortPurpose
Control Plane URL (command.aurva.io for production, command.uat.aurva.io for PoC)443Data Plane → Control Plane communication
resources.deployment.aurva.io443Download deployment scripts and resources
registry.aurva.io443Pull Aurva container images
Target databasesNative database portsRequired for discovery, classification, and DAM

Deployment Workflow

The deployment is split into two phases:

  1. Infrastructure provisioning — provision the IAM role, S3 bucket, DynamoDB table, and any additional networking via the Aurva-provided Terraform module.
  2. Application installation — install the Aurva workloads into the cluster using the bundled Helm charts.

Detailed step-by-step Terraform and Helm commands for this deployment are provided in the customer-specific runbook delivered by Aurva support during onboarding. Contact Aurva support if you need an updated copy.

Verification

Once installation completes:

  1. Confirm the controller pod is Running and ready:

    kubectl -n aurva get pods
    
  2. Tail the controller logs to verify the Data Plane has registered with the Control Plane:

    kubectl -n aurva logs deployment/controller -f
    
  3. In the Aurva console, navigate to Settings → Monitoring Configuration. The new Data Plane should appear and be marked Healthy within a few minutes.

Next Steps