Updated on January 9, 2024

Step 1: Prerequisites

Kubernetes Cluster

Azure Kubernetes Service (AKS)

1.Log in to Azure CLI:

az login

2.Set the subscription:

az account set --subscription <subscription-id>

3.Create a resource group:

az group create --name Protecto-tokenization-RG --location eastus

4.Create AKS cluster:

az aks create --resource-group Protecto-tokenization-RG --name Protecto-tokenization-Aks --kubernetes-version 1.27.7 --enable-managed-identity --node-count 2 --enable-cluster-autoscaler --min-count 2 --max-count 7 --node-osdisk-size 100 --node-vm-size Standard_D8_v5 --enable-addons monitoring --generate-ssh-keys --generate-ssh-keys

5.Get AKS credentials:

az aks get-credentials --resource-group Protecto-tokenization-RG --name Protecto-tokenization-Aks --admin

Elastic Kubernetes Service (Amazon EKS)

1.Configure AWS CLI:

aws configure

2.Create EKS cluster:

eksctl create cluster --name Protecto-tokenization --version 1.28 --region us-east-2 --nodegroup-name standard-workers --node-type t3.2xlarge --nodes 3 --nodes-min 2 --nodes-max 7 --managed

3.Update Kubeconfig:

aws eks --region us-east-2 update-kubeconfig --name Protecto-tokenization

TiDB Subscription

1.Obtain TiDB subscription: TiDB Subscription

2.Create Database, User, and Password: TiDB Documentation

CREATE DATABASE IF NOT EXISTS <db_name>;
CREATE USER 'newuser' IDENTIFIED BY 'newuserpassword';

3.Retrieve and keep the database name, username, and password for configuring Protecto tokenization.

Docker Config

Contact Protecto at help@protecto.ai to obtain the Protecto Docker image for tokenization deployment.

What are your feelings?
Scroll to Top