Skip to Content

Setup Guide

Deploy CorpAI infrastructure to your AWS account.

Prerequisites

  • CorpAI organization account with admin access
  • AWS account with an IAM user that has PowerUserAccess + IAMFullAccess
  • AWS Access Key ID and Secret Access Key

1. Validate Credentials

  1. Log in to app.corpai.io 
  2. Go to Settings → Infrastructure Setup
  3. Enter AWS credentials and select region
  4. Click Validate Credentials

2. Provision Infrastructure

Run each step in order. Each must complete before the next begins.

StepWhat It CreatesTime
VPC & NetworkingVPC, subnets, NAT Gateway5-10 min
RDS PostgreSQLDatabase10-15 min
ElastiCache ValkeyCache5-10 min
EKS ClusterKubernetes for MCP servers15-20 min
Bedrock Knowledge BaseAI + vector search5-10 min
Database SchemaTables1-2 min

Advanced: Expand options to customize instance sizes for RDS, Valkey, and EKS.

3. Configure Cross-Account Access

Create an IAM role for CorpAI to manage resources:

  1. Go to AWS IAM Console  → Roles → Create role
  2. Select “AWS account” → enter your account ID
  3. Attach policies:
    • AmazonEKSClusterPolicy
    • AmazonBedrockFullAccess
    • AmazonS3FullAccess
  4. Name it corpai-cross-account-access
  5. Copy the Role ARN
  6. Paste in CorpAI Settings and click Set Role

4. ACM Certificate Setup

Your Data Plane API requires an SSL certificate. Since the certificate must be in your AWS account, you need to create it in AWS Certificate Manager (ACM).

Create the Certificate

  1. Go to AWS Certificate Manager  in the same region as your CorpAI-provisioned EKS cluster
  2. Click Request → select Request a public certificate
  3. Enter the domain shown in your CorpAI UI
  4. Select Disable export and DNS validation
  5. Click Request

Add DNS Validation Record

ACM provides a CNAME record for domain validation. CorpAI then adds this domain for you:

  1. In ACM, copy the CNAME name and CNAME value from the validation details
  2. In CorpAI Settings, paste both values in the ACM Certificate Setup section
  3. Click Add DNS Record

Save Certificate ARN

  1. Wait for ACM status to show Issued (usually 5-30 minutes)
  2. Copy the Certificate ARN from ACM
  3. Paste in CorpAI Settings and click Save Certificate

Important: Only save the ARN after the certificate shows “Issued” status. If the certificate is still pending, Data Plane deployment will fail.

5. Deploy Data Plane API

  1. Enter AWS credentials
  2. Click Deploy Data Plane API
  3. Wait 2-5 minutes for deployment

The Data Plane API is deployed to your EKS cluster with an NLB (Network Load Balancer) configured with your ACM certificate.

6. Verify Health

Status should show Healthy. If it shows Propagating, wait a few minutes for DNS.

StatusMeaning
HealthyReady to use
PropagatingDNS resolving, wait
UnhealthyCheck NAT Gateway and security groups

Next: Add Credentials & Deploy MCP Servers

After your Data Plane is healthy:

  1. Add credentials in Settings → Credentials (GitHub tokens, Atlassian tokens, etc.)
  2. Deploy MCP servers in MCP Servers page
  3. Configure policies to grant tool access

See Management for details.

Troubleshooting

Provisioning failed: Check error message. Common issues:

  • Resource quota exceeded → Request increase in AWS
  • Access denied → Verify IAM permissions

ACM certificate not issuing:

  • Verify DNS validation record was added (check with CorpAI support)
  • Ensure you requested the certificate in the correct region (same as EKS)

Data Plane deployment failed:

  • Ensure ACM certificate shows “Issued” status before deploying
  • Verify the certificate matches the wildcard domain shown in the UI

API unhealthy: Check NAT Gateway is active and security groups allow outbound 443.

Stuck propagating: Wait up to 30 min. Check Route 53 for DNS record.

Next

Infrastructure

Last updated on