Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update AWS setup documentation #3536

Merged
merged 4 commits into from
Mar 4, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
18 changes: 10 additions & 8 deletions docs/install/kubernetes/aws.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,13 @@ metadata:
name: FlowFuse
region: eu-west-1

iam:
withOIDC: true

addons:
- name: aws-ebs-csi-driver
resolveConflicts: overwrite

nodeGroups:
- name: management
labels:
Expand All @@ -68,7 +75,7 @@ nodeGroups:
allow: false
iam:
withAddonPolicies:
efs: true
ebs: true
- name: instance
labels:
role: "projects"
Expand All @@ -82,18 +89,13 @@ nodeGroups:
allow: false
```

Add OIDC provider for the Load Balancer and IAM roles
```bash
eksctl utils associate-iam-oidc-provider --cluster flowforge --approve
```

## Ingress Controller

### Nginx Ingress

It is recommended to run the Nginx Ingress controller even on AWS EKS (The AWS ALB load balancer currently appears to only support up to 100 Ingress Targets which limits the number of Instance/Projects that can be run).

Create a `nginx-values.ymal` file to pass the values to the nginx helm file.
Create a `nginx-values.yaml` file to pass the values to the nginx helm file.

You will need to replace the ARN for the SSL certificate created earlier

Expand Down Expand Up @@ -185,7 +187,7 @@ Request move to production from sandbox (need to include examples of emails bein
```

```bash
IAM_POLICY_ARN=$(aws iam create-policy --policy-name FlowForgeSendEmail --policy-document file://ses_policy.json | jq -r .Policy.Arn)
IAM_POLICY_ARN=$(aws iam create-policy --policy-name FlowForgeSendEmail --policy-document file://ses_policy.json --output json | jq -r .Policy.Arn)
ACCOUNT_ID=$(aws sts get-caller-identity --query "Account" --output text)
OIDC_PROVIDER=$(aws eks describe-cluster --name flowforge --query "cluster.identity.oidc.issuer" --output text | sed -e "s/^https:\/\///")

Expand Down