# Path-based routing to PPS

> Path-based routing to PPS - Path-based routing to Portable Prediction Servers on AWS.

This Markdown file sits beside the HTML page at the same path (with a `.md` suffix). It summarizes the topic and lists links for tools and LLM context.

Companion generated at `2026-04-24T16:03:56.547919+00:00` (UTC).

## Primary page

- [Path-based routing to PPS](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html): Full documentation for this topic (HTML).

## Sections on this page

- [Before you start](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#before-you-start): In-page section heading.
- [Install necessary tools](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#install-necessary-tools): In-page section heading.
- [Set up PPS containers](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#set-up-pps-containers): In-page section heading.
- [Create an Amazon EKS cluster](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#create-an-amazon-eks-cluster): In-page section heading.
- [Deploy the NGINX Ingress controller](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#deploy-the-nginx-ingress-controller): In-page section heading.
- [Create and deploy services to Kubernetes](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#create-and-deploy-services-to-kubernetes): In-page section heading.
- [Create and deploy Ingress resource for path-based routing](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#create-and-deploy-ingress-resource-for-path-based-routing): In-page section heading.
- [Clean up](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#clean-up): In-page section heading.
- [Wrap-up](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/path-based-routing-to-pps-on-aws.html#wrap-up): In-page section heading.

## Related documentation

- [Classic UI documentation](https://docs.datarobot.com/en/docs/classic-ui/index.html): Linked from this page.
- [Integrations](https://docs.datarobot.com/en/docs/classic-ui/integrations/index.html): Linked from this page.
- [AWS](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/index.html): Linked from this page.
- [monitoring](https://docs.datarobot.com/en/docs/classic-ui/mlops/monitor/index.html): Linked from this page.
- [governance](https://docs.datarobot.com/en/docs/classic-ui/mlops/governance/index.html): Linked from this page.
- [Deploy models on AWS EKS](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/deploy-dr-models-on-aws.html): Linked from this page.

## Documentation content

# Path-based routing to PPSs on AWS

Using DataRobot MLOps, users can deploy DataRobot models into their own Kubernetes clusters—managed or Self-Managed AI Platform—using Portable Prediction Servers (PPSs). A PPS is a Docker container that contains a DataRobot model with a monitoring agent, and can be deployed using container orchestration tools such as Kubernetes. Then you can use the [monitoring](https://docs.datarobot.com/en/docs/classic-ui/mlops/monitor/index.html) and [governance](https://docs.datarobot.com/en/docs/classic-ui/mlops/governance/index.html) capabilities of MLOps.

When deploying multiple PPSs in the same Kubernetes cluster, you often want to have a single IP address as the entry point to all of the PPSs. A typical approach to this is path-based routing, which can be achieved using different Kubernetes Ingress Controllers. Some of the existing approaches to this include [Traefik](https://github.com/traefik/traefik), [HAProxy](https://haproxy-ingress.github.io), and [NGINX](https://www.nginx.com/products/nginx/kubernetes-ingress-controller).

The following sections describe how to use the NGINX Ingress controller for path-based routing to PPSs deployed on Amazon EKS.

## Before you start

There are some prerequisites to interacting with AWS and the underlying services. If any (or all) of these tools are already installed and configured for you, you can skip the corresponding steps. See [Getting started with Amazon EKS – eksctl](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html) for detailed instructions.

### Install necessary tools

1. Install the AWS CLI, version 2.
2. Configure your AWS CLI credentials.
3. Install eksctl.
4. Install and configure kubectl (CLI for Kubernetes clusters).
5. Check that you successfully installed the tools.

### Set up PPS containers

This procedure assumes that you have created and locally tested PPS containers for DataRobot AutoML models and pushed them to Amazon Elastic Container Registry (ECR). See [Deploy models on AWS EKS](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/deploy-dr-models-on-aws.html) for instructions.

This walkthrough is based on two PPSs created with the models of linear regression and image classification use cases, using a Kaggle [housing prices dataset](https://www.kaggle.com/c/home-data-for-ml-course/data) and [Food 101 dataset](https://www.kaggle.com/dansbecker/food-101), respectively.

The first PPS (housing prices) contains an eXtreme Gradient Boosted Trees Regressor (Gamma Loss) model. The second PPS (image binary classification - hot dog not hot dog), contains a SqueezeNet Image Pretrained Featurizer + Keras Slim Residual Neural Network Classifier using Training Schedule model.

The latter model has been trained using DataRobot Visual AI functionality .

## Create an Amazon EKS cluster

With the [Docker images stored in ECR](https://docs.datarobot.com/en/docs/classic-ui/integrations/aws/deploy-dr-models-on-aws.html#push-the-docker-image-to-amazon-ecr), you can spin up an Amazon EKS cluster. The EKS cluster needs a VPC with either of the following:

- Two public subnets and two private subnets
- Three public subnets

Amazon EKS requires subnets in at least two Availability Zones. A VPC with public and private subnets is recommended so that Kubernetes can create public load balancers in the public subnets to control traffic to the pods that run on nodes in private subnets.

1. (Optional) Create or choose two public and two private subnets in your VPC. Make sure that “Auto-assign public IPv4 address” is enabled for the public subnets. NoteTheeksctltool creates all necessary subnets behind the scenes if you don’t provide the corresponding--vpc-private-subnetsand--vpc-public-subnetsparameters.
2. Create the cluster. eksctlcreatecluster\--namemulti-app\--vpc-private-subnets=subnet-XXXXXXX,subnet-XXXXXXX\--vpc-public-subnets=subnet-XXXXXXX,subnet-XXXXXXX\--nodegroup-namestandard-workers\--node-typet3.medium\--nodes2\--nodes-min1\--nodes-max3\--ssh-access\--ssh-public-keymy-public-key.pub\--managed NotesUsage of the--managedparameter enablesAmazon EKS-managed nodegroups. This feature automates the provisioning and lifecycle management of nodes (EC2 instances) for Amazon EKS Kubernetes clusters. You can provision optimized groups of nodes for their clusters. EKS will keep their nodes up-to-date with the latest Kubernetes and host OS versions. Theeksctltool makes it possible to choose the specific size and instance type family via command line flags or config files.Although--ssh-public-keyis optional, it is highly recommended that you specify it when you create your node group with a cluster. This option enables SSH access to the nodes in your managed node group. Enabling SSH access allows you to connect to your instances and gather diagnostic information if there are issues. You cannot enable remote access after the node group is created.Cluster provisioning usually takes between 10 and 15 minutes and results in the following:
3. When your cluster is ready, test that your kubectl configuration is correct: kubectlgetsvc

## Deploy the NGINX Ingress controller

AWS Elastic Load Balancing supports three types of load balancers: Application Load Balancers (ALB), Network Load Balancers (NLB), and Classic Load Balancers (CLB). See [Elastic Load Balancing features](https://aws.amazon.com/elasticloadbalancing/features/?nc=sn&loc=2) for details.

The NGINX Ingress controller uses NLB on AWS. NLB is best suited for load balancing of TCP, UDP, and TLS traffic when extreme performance is required. Operating at the connection level ( [Layer 4 of the OSI model](https://en.wikipedia.org/wiki/OSI_model#Layer_4:_Transport_Layer)), NLB routes traffic to targets within Amazon VPC and is capable of handling millions of requests per second while maintaining ultra-low latencies. NLB is also optimized to handle sudden and volatile traffic patterns.

Deploy the NGINX Ingress controller (this manifest file also launches the NLB):

```
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-
nginx/master/deploy/static/provider/aws/deploy.yaml
```

## Create and deploy services to Kubernetes

1. Create a Kubernetes namespace: kubectl create namespace aws-tlb-namespace
2. Save the following contents to ayamlfile on your local machine (in this case,house-regression-deployment.yaml), replacing the values for your project, for example: apiVersion:apps/v1kind:Deploymentmetadata:name:house-regression-deploymentnamespace:aws-tlb-namespacelabels:app:house-regression-appspec:replicas:3selector:matchLabels:app:house-regression-apptemplate:metadata:labels:app:house-regression-appspec:affinity:nodeAffinity:requiredDuringSchedulingIgnoredDuringExecution:nodeSelectorTerms:-matchExpressions:-key:beta.kubernetes.io/archoperator:Invalues:-amd64containers:-name:house-regression-modelimage:<your_image_in_ECR>ports:-containerPort:80
3. Save the following contents to ayamlfile on your local machine (in this case,house-regression-service.yaml), replacing the values for your project, for example: apiVersion:v1kind:Servicemetadata:name:house-regression-servicenamespace:aws-tlb-namespacelabels:app:house-regression-appspec:selector:app:house-regression-appports:-protocol:TCPport:8080targetPort:8080type:NodePort
4. Create a Kubernetes service and deployment: kubectl apply -f house-regression-deployment.yaml
kubectl apply -f house-regression-service.yaml
5. Save the following contents to ayamlfile on your local machine (in this case,hot-dog-deployment.yaml), replacing the values for your project, for example: apiVersion:apps/v1kind:Deploymentmetadata:name:hot-dog-deploymentnamespace:aws-tlb-namespacelabels:app:hot-dog-appspec:replicas:3selector:matchLabels:app:hot-dog-apptemplate:metadata:labels:app:hot-dog-appspec:affinity:nodeAffinity:requiredDuringSchedulingIgnoredDuringExecution:nodeSelectorTerms:-matchExpressions:-key:beta.kubernetes.io/archoperator:Invalues:-amd64containers:-name:hot-dog-modelimage:<your_image_in_ECR>ports:-containerPort:80
6. Save the following contents to ayamlfile on your local machine (in this case,hot-dog-service.yaml), replacing the values for your project, for example: apiVersion:v1kind:Servicemetadata:name:hot-dog-servicenamespace:aws-tlb-namespacelabels:app:hot-dog-appspec:selector:app:hot-dog-appports:-protocol:TCPport:8080targetPort:8080type:NodePort
7. Create a Kubernetes service and deployment: kubectl apply -f hot-dog-deployment.yaml
kubectl apply -f hot-dog-service.yaml
8. View all resources that exist in the namespace: kubectl get all -n aws-tlb-namespace

## Create and deploy Ingress resource for path-based routing

1. Save the following contents to ayamlfile on your local machine (in this case,nginx-redirect-ingress.yaml), replacing the values for your project, for example: apiVersion:networking.k8s.io/v1beta1kind:Ingressmetadata:name:nginx-redirect-ingressnamespace:aws-tlb-namespaceannotations:kubernetes.io/ingress.class:nginxnginx.ingress.kubernetes.io/rewrite-target:/$2labels:app:nginx-redirect-ingressspec:rules:-http:paths:-path:/house-regression(/|$)(.*)backend:serviceName:house-regression-serviceservicePort:8080-path:/hot-dog(/|$)(.*)backend:serviceName:hot-dog-serviceservicePort:8080 NoteThenginx.ingress.kubernetes.io/rewrite-targetannotation rewrites the URL before forwarding the request to the backend pods. As a result, the paths/house-regression/some-house-pathand/hot-dog/some-dog-pathtransform to/some-house-pathand/some-dog-path, respectively.
2. Create Ingress for path-based routing: kubectl apply -f nginx-redirect-ingress.yaml
3. Verify that Ingress has been successfully created: kubectl get ingress/nginx-redirect-ingress -n aws-tlb-namespace
4. (Optional) Use the following if you want to access the detailed output about this ingress: kubectl describe ingress/nginx-redirect-ingress -n aws-tlb-namespace Note the value ofAddressin the output for the next two scoring requests.
5. Score thehouse-regressionmodel: curl -X POST http://<ADDRESS>/house-regression/predictions -H "Content-Type: text/csv" --data-binary @kaggle_house_test_dataset_10.csv
6. Score thehot-dogmodel: curl -X POST http://<ADDRESS>/hot-dog/predictions -H "Content-Type: text/csv; charset=UTF-8" --data-binary @for_pred.csv Notefor_pred.csvis a CSV file containing one column with the header.  The content for that column is a Base64 encoded image. Original photo for prediction (downloaded fromhere): The image is predicted to be a hot dog: Another photo for prediction (downloaded fromhere): The image is predicted not to be a hot dog:

## Clean up

1. Remove the sample services, deployments, pods, and namespaces: kubectl delete namespace aws-tlb-namespace
kubectl delete namespace ingress-nginx
2. Delete the cluster: eksctl delete cluster --name multi-app

## Wrap-up

The deployment of a few Kubernetes services behind the same IP address allows you to minimize the number of load balancers needed and facilitate the maintenance of the applications. Applying Kubernetes Ingress Controllers makes it possible.

This walkthrough described how to develop the path-based routing to a few Portable Prediction Servers (PPSs) deployed on the Amazon EKS platform. This solution has been implemented via NGINX Ingress Controller.
