Skip to main content

System Requirements

Controller Host Machine

  1. This software distribution bundles certain additional applications required to run PK Protect. One is Apache Tomcat (Tomcat 9.x) which is installed automatically along with the controller.

  2. Operating System: CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1.

  3. Authentication Systems: Options include Active Directory Server, LDAP, and DB Authentication.

  4. Metadata Repository: Options include PostgreSQL, RDS Postgres, MySQL, RDS MySQL, Oracle, SQL Server, RDS SQL Server and HyperSQL.

*Note: The supported version of the database which the user wants to use to set up metadata repository should be pre-installed. To view the supported versions, refer to PK-DSM 8.10.5 Support Matrix.

Following system configurations are required to install and use PK Protect:

Minimum System Requirements

No of VMs

CPUs

Memory (GB)

DG Disk Space (GB)

Operating Systems

DSM Administrator machine

1

8

16

60

CentOS 7.x , RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

Recommended System Requirements

No of VMs

CPUs

Memory (GB)

DG Disk Space (GB)

Operating Systems

DSM Administrator machine

1

8

32

60

CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

DSM Administrator machine

(If metadata repository is on same VM)

1

8

32/64

120

CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

*Note:

  1. When installing with MySQL as the backend (metadata) repository, ensure the ‘inno_db_lock_wait’ timeout property in my.cnf/my.ini file is set to 600.

  2. PK Protect will use bundled JDK (Java Development Kit) and JRE (Java Runtime Environment) files.

IDP Host Machines

The IDP host machine must have access to the machines on which data you intend to scan, or mask are hosted. For example, if firewalls are set up around sub-nets that the data host machines are part of, appropriate ports should be open for the IDPs to perform the scanning/masking operations. System requirements for the various IDPs are listed below. All IDPs are compatible with:

Minimum System Requirements

No of VMs

CPUs

Memory (GB)

DG Disk Space (GB)

Operating Systems

PK Protect IDP Host Machine

1

4

8

100

CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

Recommended System Requirements

No of VMs

CPUs

Memory (GB)

DG Disk Space (GB)

Operating Systems

PK Protect Discover IDP Host Machine

1

8

32GB

100

CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

PK Protect Masker IDP Host Machine

1

8

32GB

100 GB

CentOS 7.x, RedHat 7.x and 8.x, Ubuntu 18 and 20, Rocky Linux 9.1

  1. Additional Requirements for HDFS IDP on Azure Blob Storage:

    1. Recommendation: The IDP should be deployed on an edge node instead of the head node or a worker node.

    2. To run tasks on storage accounts not linked with a cluster, the access policy on the container should be “container”.

*Note:

  1. IDPs can be installed on the same machine as the controller or on another machine.

  2. PK Protect will use bundled JDK (Java Development Kit) and JRE (Java Runtime Environment) files.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.