Kubernetes + Helm Deployment
Enterprise Only: This deployment guide is exclusively for Enterprise customers. Self-hosting requires an Enterprise license and access to our private Helm chart repository. Contact us to discuss your self-hosting requirements and get access.
Kubernetes + Helm Deployment Guide
This guide provides the complete installation checklist for deploying Promptless on Kubernetes using Helm charts. Everything is parameterized through values.yaml
—you should never need to edit the Helm chart itself.
Quick Start Checklist
This is the happy-path installation checklist for prospects:
Prerequisites
- AWS account with EKS cluster version 1.27+, IRSA enabled
kubectl
,helm
, andaws-cli
installed locally- Route 53 hosted zone for
promptless.<corp>.com
Architecture
The self-hosted deployment uses a microservices architecture running on Kubernetes:
Handles REST API requests, authentication, and core business logic
Processes documentation generation jobs and integrations
User interface for project management and configuration
Prerequisites
Before installing Promptless, ensure you have the following:
Infrastructure Requirements
AWS Account & EKS Cluster
- AWS account with EKS cluster version 1.27 or higher
- IRSA (IAM Roles for Service Accounts) enabled
- Node groups configured (including GPU nodes if using local LLMs)
Database Services
- RDS PostgreSQL instance (recommended: Aurora PostgreSQL)
Storage & Networking
- S3 bucket for document storage (e.g.,
promptless-doc-store
) - Route 53 hosted zone for your domain (e.g.,
promptless.corp.com
) - VPC Endpoints for AWS services: STS, Bedrock, S3, Secrets Manager (plus GitHub Enterprise if applicable)
IAM Roles
Create the following IAM roles with scoped policies:
promptless-api
: Access to Bedrock, S3, and Secrets Managerpromptless-worker
: Background job processing permissionspromptless-dashboard
: Web interface permissions
We can provide Terraform modules to provision the baseline infrastructure. Contact our support team at help@gopromptless.ai for infrastructure templates and IAM policy examples.
Installation Guide
Follow these steps to install Promptless on your Kubernetes cluster:
Provision Infrastructure
Set up the baseline AWS infrastructure. You can use the Terraform modules we provide or create resources manually.
Required Resources:
- EKS cluster with node groups (including GPU nodes if using local LLMs)
- RDS PostgreSQL
- S3 bucket
promptless-doc-store
- VPC Endpoints for: STS, Bedrock, S3, Secrets Manager (plus GitHub Enterprise if applicable)
- IAM roles:
promptless-api
,promptless-worker
,promptless-dashboard
with scoped policies for Bedrock, S3, RDS
Contact our support team for Terraform modules and infrastructure templates.
Configure Container Images
Choose your container image strategy:
Option A: Direct Pull (Recommended)
Option B: Private Registry
Create Kubernetes Secrets
Create a secret containing your database credentials and other sensitive configuration:
Configure values.yaml
Create a values.yaml
file with your deployment configuration:
Configuration Options
Authentication Providers:
oidc
: OpenID Connect (recommended for enterprise)saml
: SAML 2.0oauth
: OAuth 2.0 with various providers
LLM Providers:
bedrock
: AWS Bedrock (recommended)openai
: OpenAI APIanthropic
: Anthropic Claude APIlocal
: Self-hosted models
Observability:
cloudwatch
: AWS CloudWatchdatadog
: DataDogprometheus
: Prometheus + Grafana
Install Promptless
Add the Promptless Helm repository and install:
The installation typically takes 3-5 minutes. Monitor the deployment with:
Post-Installation Verification
After installation, verify your deployment:
Verification Checklist:
- All pods are running and ready
- Database migrations completed successfully
- Services are accessible
- SSL certificates are issued
Configure User Access
Set up user access through your identity provider:
- Invite Users: Use your IdP group mapping to grant access
- Verify Authentication: Test that users can log in successfully
Test Documentation Generation
Verify the system is working by:
- Access Dashboard: Navigate to your Promptless domain
- Create Project: Set up a test project with integrations
- Trigger Test Ingestion: Test documentation generation via UI
- Validate S3 Objects: Check S3 bucket for generated assets
- Validate Bedrock Calls: Ensure LLM integration is working
- Monitor Logs: Check CloudWatch logs for any errors
If documentation generation completes successfully, your installation is ready for production use!
Configuration Reference
Environment Variables
Key environment variables for customizing your deployment:
PostgreSQL connection string for the application database
Secret key for JWT token signing and verification
S3 bucket name for document and asset storage
AWS region for Bedrock and other AWS services
Helm Chart Values
The Promptless Helm chart supports extensive customization through values.yaml:
Global Configuration
Authentication Settings
Resource Limits
Integration Configuration
Maintenance & Operations
Upgrades
Keep your Promptless installation up to date:
Always review the changelog before upgrading and test in a staging environment first.
Troubleshooting
Common Issues
Pods Not Starting
Symptoms: Pods stuck in Pending
or CrashLoopBackOff
state
Solutions:
- Check resource availability:
kubectl describe nodes
- Verify secrets exist:
kubectl get secrets -n promptless
- Check pod logs:
kubectl logs <pod-name> -n promptless
- Validate values.yaml configuration
Database Connection Issues
Symptoms: API server logs show database connection errors
Solutions:
- Verify PostgreSQL URL in secrets
- Check RDS security groups and network connectivity
- Ensure database exists and migrations can run
- Test connection from a debug pod
Authentication Problems
Symptoms: Users cannot log in or receive authentication errors
Solutions:
- Verify OIDC/SAML configuration in values.yaml
- Check IdP connectivity and certificate validity
- Review authentication provider logs
- Validate redirect URLs and client secrets
Documentation Generation Failures
Symptoms: Jobs fail or documents are not generated
Solutions:
- Check worker pod logs for errors
- Verify Bedrock/LLM provider connectivity
- Ensure S3 bucket permissions are correct
Getting Help
If you encounter issues not covered in this guide:
- Check Logs: Review CloudWatch logs for error messages
- Contact Support: Email help@gopromptless.ai with:
- Deployment configuration (sanitized)
- Error logs and symptoms
- Steps to reproduce the issue
Our support team typically responds within 1 business hour for self-hosted deployments.
Security Considerations
Network Security
- Use private subnets for database instances
- Configure security groups to restrict access to necessary ports only
- Enable VPC Flow Logs for network monitoring
- Use AWS PrivateLink/VPC Endpoints for AWS service access
Data Protection
- Enable encryption at rest for RDS and S3
- Use TLS 1.2+ for all communications
- Implement proper IAM roles with least privilege access
- Regular security updates and vulnerability scanning
Compliance
Self-hosted Promptless supports various compliance requirements:
- SOC 2: Audit logging and access controls
- GDPR: Data residency and privacy controls
- HIPAA: Enhanced encryption and access logging
- FedRAMP: Government cloud deployment options
Contact our team to discuss specific compliance requirements for your deployment.
Example Architecture Diagram
The following diagram illustrates a typical EKS + Bedrock deployment architecture with self-hosted GitHub Enterprise and Slack integrations:
Architecture Components
- Backend API: Handles REST requests and core business logic
- Frontend Dashboard: Web interface served at
promptless.corp.com
- Worker Processes: Background jobs for documentation generation
- RDS PostgreSQL: Application database with VPC endpoint
- S3 Bucket: Document and asset storage with VPC endpoint
- Bedrock: LLM service for AI-powered documentation generation
- GitHub Enterprise: Self-hosted Git platform integration
- Slack: Corporate messaging platform integration
- VPC Connectivity: Secure connections via VPC endpoints
- VPC Endpoints: Private connectivity to AWS services
- Security Groups: Network-level access controls
- IAM Roles: Service-specific permissions with IRSA
Key Architectural Benefits
- Data Sovereignty: All data remains within your AWS VPC
- Secure Connectivity: VPC endpoints eliminate internet traffic for AWS services
- Scalable Design: Kubernetes deployments can scale based on demand
- Enterprise Integration: Direct connectivity to self-hosted GitHub and Slack
- Compliance Ready: Architecture supports SOC 2, GDPR, HIPAA, and FedRAMP requirements