Skip to Content

Management

Ongoing management of your CorpAI deployment.

Health Monitoring

Check Data Plane health in Settings:

StatusMeaning
HealthyAll systems operational
PropagatingDNS propagating (wait up to 30 min)
UnhealthyCheck NAT Gateway, security groups

Credentials

See Getting Started for adding credentials. Credentials are stored in your AWS Secrets Manager and accessed by MCP servers via IRSA.

For services running in your VPC, use the endpoint DNS from VPC Connections as the host.

MCP Servers

See Getting Started for deploying servers.

StatusMeaning
RunningOperational
DeployingIn progress
FailedCheck logs (see below)

Viewing Logs

Via kubectl

Configure kubectl access:

aws eks update-kubeconfig --name corpai-cluster --region {region}

View Data Plane API logs:

kubectl logs -l app=data-plane-api -n {namespace} -f

List MCP server pods:

kubectl get pods -n {namespace}

View MCP server logs:

kubectl logs -l app=mcp-github -n {namespace} -f

Via AWS Console

View logs in CloudWatch:

  1. Go to CloudWatch → Log groups
  2. Find /aws/eks/corpai-cluster/cluster for cluster logs
  3. Find /corpai/*/data-plane for application logs

EKS Console Access

To view pods in the AWS Console, you need to add your IAM user/role to the EKS cluster’s aws-auth ConfigMap.

Get current ConfigMap:

kubectl get configmap aws-auth -n kube-system -o yaml > aws-auth.yaml

Add your IAM user/role:

mapUsers: | - userarn: arn:aws:iam::{account-id}:user/{username} username: {username} groups: - system:masters

Apply the change:

kubectl apply -f aws-auth.yaml

Backups

ComponentBackupRetention
RDSAutomated snapshots7 days
S3Versioning enabled90 days

Restore via AWS Console if needed.

Support

Next

Security

Last updated on