This document outlines the infrastructure and configuration requirements for deploying the EnkryptAI stack on an existing Kubernetes cluster.
There are various components such as Guardrails, Redteaming etc that are required for the deployment of the EnkryptAI stack. In this document, we are giving example of AWS and EKS cluster but the chart can be used for other cloud providers as well. If you get into any issues, reach out to us or raise an issue in this Github repo.
The Guardrails component requires GPU-enabled nodes particularly NVIDIA V100 (minimum 16 GB VRAM recommended) or above. Create a dedicated GPU node group using the following configuration.
Node Group Name: gpu-node-group
Configuration | Value |
---|---|
Instance Type | p3.2xlarge |
Capacity Type | ON_DEMAND |
AMI Type | AL2023_x86_64_NVIDIA |
Disk Size | 100 GB (gp3) |
Scaling Configuration | Desired: 2 • Min: 1 • Max: 2 |
[!WARNING] Avoid using SPOT instances because it can lead to unexpected behavior.
[!NOTE] The Guardrails pod requires a GPU and will be scheduled exclusively on this node group.
The Redteaming workloads run on a separate node group optimized for compute-intensive tasks.
Node Group Name: redteaming-node-group
Configuration | Value |
---|---|
Instance Type | r7i.xlarge |
Capacity Type | ON_DEMAND |
AMI Type | AL2_x86_64 |
Disk Size | 100 GB (gp3) |
Scaling Configuration | Desired: 2 • Min: 2 • Max: 10 |
Labels | dedicated: redteaming |
Taints | app=redteaming:NoSchedule |
[!NOTE] This node group ensures Redteaming jobs are scheduled exclusively on dedicated infrastructure. It is dependent on NATS, NACK, Argo Workflows and Argo Events.
Before installing the Helm chart, make sure the following namespaces and secrets are created. EnkryptAI team will provide the secret values separately.
kubectl create namespace enkryptai-stack
kubectl create namespace redteam-jobs
Namespace | Secret Name |
---|---|
enkryptai-stack | elastic-env-secret |
enkryptai-stack | frontend-env-secret |
enkryptai-stack | gateway-env-secret |
enkryptai-stack | gateway-migration-env-secret |
enkryptai-stack | guardrails-env-secret |
enkryptai-stack | onprem |
enkryptai-stack | openfga-env-secret |
enkryptai-stack | opensearch-cred |
enkryptai-stack | opensearch-securityconfig |
enkryptai-stack | postgres-superuser-secret |
enkryptai-stack | redteam-proxy-env-secret |
enkryptai-stack | s3-cred |
enkryptai-stack | superuser-secret |
redteam-jobs | redteam-proxy-env-secret |
The following table summarizes which applications use each secret.
gateway-kong
, frontend
, redteaming
, guardrails
opensearch
, openfga
, CloudNativePG
Secret Name | Used By |
---|---|
elastic-env-secret |
gateway-kong , opensearch |
frontend-env-secret |
frontend |
gateway-env-secret |
gateway-kong |
gateway-migration-env-secret |
gateway-kong |
guardrails-env-secret |
guardrails |
onprem |
Supabase (on-prem database and related services) |
openfga-env-secret |
openfga |
opensearch-cred |
opensearch |
opensearch-securityconfig |
opensearch |
postgres-superuser-secret |
Supabase on-prem |
redteam-proxy-env-secret |
redteaming , redteam-jobs |
s3-cred |
redteaming , Supabase (on-prem MinIO for internal artifact storage) |
superuser-secret |
Postgres CNPG credentials |
Before installing the EnkryptAI Helm charts, ensure the following components are available and configured.
Component | Description | Installation Reference |
---|---|---|
Kubernetes Cluster | EKS Version ≥ 1.31 (tested on v1.33.0) | Kubernetes Docs |
Cert Manager (AWS Certificate Manager) | Used for managing TLS/SSL certificates for services. | AWS Cert Manager Setup |
Ingress Controller (NGINX) | Required for routing external traffic to services inside the cluster. | NGINX Ingress Controller |
Metrics Server | Required for resource metrics (CPU/Memory) used by autoscalers and monitoring. | Metrics Server Installation |
[!NOTE] Ensure all components are in a Ready state before proceeding with Helm chart installation.
We have tested the setup with following versions:
This Helm chart setup has been tested on Kubernetes v1.33.0 with:
Compatibility with other Kubernetes versions or distributions may vary.
To install EnkryptAI stack, use the following helm charts. You can click the chart to get more information to see the installation steps.
helm repo add enkryptai https://enkryptai.github.io/helm-charts
helm repo update
helm upgrade --install platform enkryptai/platform-stack -n enkryptai-stack -f values.yaml --timeout 15m
# Don't forget to apply below configmap
kubectl apply -f https://raw.githubusercontent.com/enkryptai/helm-charts/refs/heads/main/charts/enkryptai-stack/gateway-temp-config-map.yaml
helm upgrade --install enkryptai enkryptai/enkryptai-stack -n enkryptai-stack -f values.yaml --timeout 15m
Read the documentation of each chart to perform post-installation tasks.
Chart | Description |
---|---|
enkryptai-stack |
Full-stack deployment including all EnkryptAI services |
platform |
Core platform dependencies and shared infrastructure |
enkryptai-lite |
Lightweight deployment — includes Red Teaming and Guardrails components only |
For accessing Redteaming job logs and more, please refer to the Monitoring documentation.
For troubleshooting, please refer to the Troubleshooting documentation
TBD
Report security issues to EnkryptAI Support.
If you face any issues during deployment, reach out to the EnkryptAI Support or raise a GitHub issue in this repository.