Enterprise Deployment Guide - Energent.ai

2025-05-28

Enterprise Deployment Guide - Energent.ai

Energent.ai provides AI-powered virtual desktop agents that automate complex multi-application workflows for enterprise users. This guide outlines enterprise-grade deployment requirements, security configurations, and best practices to ensure SOC 2 compliant, scalable, and secure installations.

  • Document Classification: Public
  • Version: 2.0
  • Last Updated: 2025-05-28
  • SOC 2 Alignment: Security, Availability, Processing Integrity

Table of Contents

  1. Deployment Options
  2. Infrastructure Requirements
  3. Network & Security Architecture
  4. Access Control & Integration
  5. Security & Compliance
  6. Monitoring & Observability
  7. Deployment Timeline & Process
  8. Post-Deployment Operations
  9. Support & Escalation

1. Deployment Options

1.1 Energent Cloud (SaaS) - Recommended

Best for: Quick deployment, minimal infrastructure overhead

  • Hosting: AWS cloud infrastructure managed by Energent.ai
  • Security: SOC 2 Type II compliant with enterprise-grade encryption
  • Data Processing: Customer data processed under strict privacy controls
  • Setup Time: < 1 hour
  • SLA: 99.9% uptime guarantee

1.2 Private Cloud Deployment

Best for: Data residency requirements, regulatory compliance

  • Platform: Customer-managed Kubernetes cluster
  • Isolation: Dedicated namespace with RBAC controls
  • Scalability: Auto-scaling based on workload demands
  • Compliance: Full SOC 2 control inheritance

2. Infrastructure Requirements

2.1 Kubernetes Deployment Specifications

2.1.1 Cluster Requirements

ComponentMinimumRecommendedProduction
Kubernetes Version1.30+1.30+1.30+
Node Configuration1 vCPU, 2GB RAM2 vCPU, 4GB RAM4 vCPU, 8GB RAM
Storage Classgp2 (AWS), Standard (GCP), Standard_LRS (Azure)gp3 (AWS), SSD (GCP), Premium_LRS (Azure)io1/io2 (AWS), SSD (GCP), UltraSSD_LRS (Azure)
Persistent Volume100GB250GB500GB+
Network Policy SupportRequiredRequiredRequired

2.1.2 Required Kubernetes Resources

# Namespace Configuration
apiVersion: v1
kind: Namespace
metadata:
  name: energent-ai
  labels:
    security.policy: restricted
    monitoring: enabled
---
# Storage Class Example
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
  name: energent-storage
provisioner: kubernetes.io/aws-ebs
parameters:
  type: gp3
  encrypted: 'true'

2.1.3 Helm Chart Deployment

# Add Energent.ai Helm repository
helm repo add energent https://charts.energent.ai
helm repo update

# Install with enterprise configuration
helm install energent-ai energent/energent-platform \
  --namespace energent-ai \
  --create-namespace \
  --values enterprise-values.yaml

3. Network & Security Architecture

3.1 Domain & DNS Configuration

  • Primary Domain: *.energent.ai for SaaS deployments
  • Customer Subdomain: {customer}.energent.ai or custom domain
  • TLS Requirements: TLS 1.3 minimum, certificate management via Let's Encrypt or customer CA
  • DNS Records: A/AAAA records for primary endpoints, CNAME for subdomains

3.2 Firewall & Network Security

3.2.1 Required Firewall Rules

DirectionProtocolPortSource/DestinationPurpose
InboundHTTPS443Customer networksAdmin UI, API access
InboundHTTPS8443energent.ai monitoringHealth checks

3.2.2 Network Security Best Practices

# Network Policy Example
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: energent-network-policy
  namespace: energent-ai
spec:
  podSelector:
    matchLabels:
      app: energent-platform
  policyTypes:
    - Ingress
    - Egress
  ingress:
    - from:
        - namespaceSelector:
            matchLabels:
              name: ingress-nginx
      ports:
        - protocol: TCP
          port: 8080
  egress:
    - to: []
      ports:
        - protocol: TCP
          port: 443

3.3 VPC & Network Architecture

3.3.1 AWS VPC Configuration

  • VPC CIDR: /16 or larger for scalability
  • Subnets: Private subnets for workloads, public for load balancers
  • Security Groups: Least privilege access patterns
  • VPC Endpoints: For AWS services (S3, ECR, CloudWatch)

3.3.2 Network Connectivity Options

OptionUse CaseImplementation
VPC PeeringAWS-to-AWS connectivityCross-VPC resource access
VPN GatewayOn-premises integrationSite-to-site VPN tunnel
Direct ConnectHigh-bandwidth requirementsDedicated network connection
Private LinkService-to-service connectivityAWS PrivateLink endpoints

4. Access Control & Integration

4.1 Authentication & Authorization

4.1.1 Single Sign-On (SSO) Integration

ProviderProtocolConfiguration
Azure ADSAML 2.0, OAuth 2.0, OIDCMicrosoft Azure Portal
AWS CognitoSAML 2.0, OAuth 2.0, OIDCAWS Cognito Console
Google WorkspaceSAML 2.0, OAuth 2.0, OIDCGoogle Admin Console
OktaSAML 2.0, OAuth 2.0, OIDCOkta Admin Dashboard
Custom Identity ProviderSAML 2.0, OAuth 2.0, OIDCSAML metadata exchange

4.1.2 Role-Based Access Control (RBAC)

# Example RBAC Configuration
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
  namespace: energent-ai
  name: energent-operator
rules:
  - apiGroups: ['']
    resources: ['pods', 'services', 'configmaps']
    verbs: ['get', 'list', 'watch', 'create', 'update', 'patch', 'delete']
  - apiGroups: ['apps']
    resources: ['deployments', 'replicasets']
    verbs: ['get', 'list', 'watch', 'create', 'update', 'patch', 'delete']

4.2 API Access & Integration

4.2.1 API Authentication

  • Method: Bearer token authentication with JWT
  • Token Lifecycle: 24-hour expiration with refresh capability
  • Rate Limiting: 1000 requests/minute per API key
  • IP Allowlisting: Optional IP-based access control

4.2.2 Webhook Integration

# Webhook endpoint configuration
curl -X POST https://api.energent.ai/v1/webhooks \
  -H "Authorization: Bearer ${API_TOKEN}" \
  -H "Content-Type: application/json" \
  -d '{
    "url": "https://customer.internal/energent-webhook",
    "events": ["workflow.completed", "workflow.failed"],
    "secret": "webhook-secret-key"
  }'

5. Security & Compliance

5.1 SOC 2 Compliance Framework

5.1.1 Security Controls Implementation

Control CategoryImplementationEvidence
Access Controls (CC6)RBAC, MFA, SSO integrationAccess logs, authentication logs
Data Protection (CC6.7)TLS 1.3, AES-256 encryptionEncryption configuration, certificates
System Operations (CC7)Automated monitoring, backup proceduresMonitoring dashboards, backup tests
Change Management (CC8)GitOps deployment, approval workflowsChange logs, deployment artifacts

5.1.2 Data Encryption Standards

Data StateEncryption MethodKey Management
At RestAES-256-GCMCustomer-managed keys (CMK)
In TransitTLS 1.3 with PFSCertificate rotation every 90 days
In MemoryApplication-level encryptionHardware security modules (HSM)

5.2 Security Hardening

5.2.1 Container Security

# Security-hardened container configuration
FROM alpine:3.18
RUN addgroup -g 1001 energent && \
    adduser -D -u 1001 -G energent energent
USER 1001:1001
COPY --chown=1001:1001 app /app
WORKDIR /app
EXPOSE 8080
CMD ["./energent-agent"]

5.2.2 Kubernetes Security Policies

# Pod Security Policy
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
  name: energent-psp
spec:
  privileged: false
  allowPrivilegeEscalation: false
  requiredDropCapabilities:
    - ALL
  volumes:
    - 'configMap'
    - 'emptyDir'
    - 'projected'
    - 'secret'
    - 'downwardAPI'
    - 'persistentVolumeClaim'
  runAsUser:
    rule: 'MustRunAsNonRoot'
  seLinux:
    rule: 'RunAsAny'
  fsGroup:
    rule: 'RunAsAny'

6. Monitoring & Observability

6.1 Metrics & Monitoring

6.1.1 Prometheus Integration

# ServiceMonitor for Prometheus
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
  name: energent-metrics
  namespace: energent-ai
spec:
  selector:
    matchLabels:
      app: energent-platform
  endpoints:
    - port: metrics
      interval: 30s
      path: /metrics

6.1.2 Key Performance Indicators (KPIs)

MetricTargetAlert Threshold
System Availability99.9%< 99.5%
Response Time (P95)< 2 seconds> 5 seconds
Error Rate< 0.1%> 1%
Resource Utilization< 80%> 90%

6.2 Logging & Audit

6.2.1 Centralized Logging

# Fluentd configuration for log forwarding
apiVersion: v1
kind: ConfigMap
metadata:
  name: fluentd-config
data:
  fluent.conf: |
    <source>
      @type tail
      path /var/log/containers/energent-*.log
      pos_file /var/log/fluentd-containers.log.pos
      tag kubernetes.*
      format json
    </source>

    <match kubernetes.**>
      @type forward
      <server>
        name customer-siem
        host siem.customer.com
        port 24224
      </server>
    </match>

6.2.2 Audit Logging Requirements

  • Authentication Events: All login attempts, SSO assertions
  • Authorization Events: Permission grants, access denials
  • Data Access: Customer data queries, modifications
  • Administrative Actions: Configuration changes, user management
  • Retention Period: 7 years for SOC 2 compliance

7. Deployment Timeline & Process

7.1 Pre-Deployment Checklist

7.1.1 Infrastructure Readiness

  • Kubernetes cluster provisioned and configured
  • Network connectivity and firewall rules configured
  • DNS records and TLS certificates provisioned
  • Storage classes and persistent volumes available
  • Monitoring and logging infrastructure deployed

7.1.2 Security Configuration

  • RBAC policies defined and applied
  • Network policies configured
  • Security scanning completed
  • Secrets management configured
  • Backup and disaster recovery procedures tested

7.2 Deployment Process

PhaseDurationActivitiesStakeholders
Planning1-2 daysRequirements gathering, architecture reviewCustomer IT, Energent.ai Solutions
Infrastructure Setup0.5-1 dayCluster provisioning, network configurationCustomer DevOps, Energent.ai Support
Security Configuration0.5 dayRBAC, policies, certificatesCustomer Security, Energent.ai Security
Application Deployment< 1 hourHelm chart installation, configurationEnergent.ai Support
Integration Testing1-2 daysSSO, API, workflow validationCustomer QA, Energent.ai Support
Go-Live0.5 dayProduction cutover, monitoring validationAll stakeholders

7.3 Deployment Commands

7.3.1 Kubernetes Deployment

# Create namespace and apply security policies
kubectl create namespace energent-ai
kubectl apply -f security-policies/

# Deploy Energent.ai platform
helm install energent-ai energent/energent-platform \
  --namespace energent-ai \
  --values production-values.yaml \
  --wait --timeout=10m

# Verify deployment
kubectl get pods -n energent-ai
kubectl get ingress -n energent-ai

7.3.2 VM Deployment

# Download and deploy Energent.ai containers
curl -O https://releases.energent.ai/latest/energent-enterprise.tar.gz
tar -xzf energent-enterprise.tar.gz
cd energent-enterprise/

# Configure environment
cp config/production.env.template .env
# Edit .env with customer-specific configuration

# Start services
docker-compose up -d
docker-compose logs -f

8. Post-Deployment Operations

8.1 Health Monitoring

8.1.1 Health Check Endpoints

# Application health
curl https://{customer}.energent.ai/health

# Metrics endpoint
curl https://{customer}.energent.ai/metrics

# Readiness probe
curl https://{customer}.energent.ai/ready

8.1.2 Automated Health Checks

# Kubernetes health checks
livenessProbe:
  httpGet:
    path: /health
    port: 8080
  initialDelaySeconds: 30
  periodSeconds: 30
  timeoutSeconds: 5
  failureThreshold: 3

readinessProbe:
  httpGet:
    path: /ready
    port: 8080
  initialDelaySeconds: 5
  periodSeconds: 10
  timeoutSeconds: 3
  failureThreshold: 3

8.2 Backup & Disaster Recovery

8.2.1 Backup Strategy

ComponentFrequencyRetentionRecovery RTO
Application DataDaily30 days< 4 hours
ConfigurationOn change90 days< 1 hour
SecretsDaily30 days< 1 hour
Audit LogsReal-time7 years< 24 hours

8.2.2 Disaster Recovery Procedures

# Database backup
kubectl exec -n energent-ai postgres-0 -- pg_dump -U energent energent_db > backup.sql

# Configuration backup
kubectl get configmap -n energent-ai -o yaml > configmaps-backup.yaml
kubectl get secret -n energent-ai -o yaml > secrets-backup.yaml

# Restore procedures
kubectl apply -f configmaps-backup.yaml
kubectl apply -f secrets-backup.yaml
kubectl exec -n energent-ai postgres-0 -- psql -U energent energent_db < backup.sql

8.3 Update & Maintenance

8.3.1 Rolling Updates

# Update Energent.ai platform
helm upgrade energent-ai energent/energent-platform \
  --namespace energent-ai \
  --values production-values.yaml \
  --wait --timeout=10m

# Rollback if needed
helm rollback energent-ai 1 --namespace energent-ai

8.3.2 Maintenance Windows

  • Scheduled Maintenance: First Sunday of each month, 2-6 AM UTC
  • Emergency Updates: As needed for security patches
  • Customer Notification: 72 hours advance notice for planned maintenance

9. Support & Escalation

9.1 Support Tiers

TierResponse TimeChannelsScope
Tier 1< 4 hoursEmail, PortalGeneral issues, questions
Tier 2< 2 hoursPhone, EmailTechnical issues, integration
Tier 3< 1 hourPhone, SlackCritical system issues
Emergency< 30 minutesPhone, SMSProduction outages

9.2 Contact Information

Primary Support

9.3 Escalation Matrix

SeverityDefinitionResponseEscalation
P0 - CriticalComplete service outage< 30 minutesImmediate C-level notification
P1 - HighSignificant functionality impacted< 2 hoursManagement team notification
P2 - MediumMinor functionality impacted< 8 hoursTeam lead notification
P3 - LowCosmetic or documentation issues< 24 hoursStandard support queue

Appendices

Appendix A: Configuration Templates

  • Kubernetes YAML manifests
  • Docker Compose files
  • Environment configuration templates
  • Security policy examples

Appendix B: Troubleshooting Guide

  • Common deployment issues
  • Performance optimization
  • Security configuration problems
  • Network connectivity issues

Appendix C: API Reference

  • Authentication endpoints
  • Webhook configuration
  • Monitoring endpoints
  • Administrative APIs

  • Document Classification: Public
  • Version: 2.0
  • Last Updated: 2025-05-28
  • Next Review: 2025-08-28
  • Contact: support@energent.ai

Let's talk!

Office:

Abu Dhabi Office:

Al Khatem Tower, Al Maryah Island, Abu Dhabi

Silicon Valley Office:

3101 Park Blvd. Palo Alto, CA