Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/configure/index.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
# Configure AWS Gateway API Controller
Refer to this document to further configure your use of the AWS Gateway API Controller.
Refer to this section to further configure your use of the AWS Gateway API Controller.
The features here build on the examples shown in [Get Started Using the AWS Gateway API Controller](../getstarted.md).
37 changes: 23 additions & 14 deletions docs/deploy.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,11 +19,15 @@ Run through them again for a second cluster to use with the extended example sho
CLUSTER_SG=$(aws eks describe-cluster --name $CLUSTER_NAME | jq -r '.cluster.resourcesVpcConfig.clusterSecurityGroupId')
aws ec2 authorize-security-group-ingress --group-id $CLUSTER_SG --cidr $MANAGED_PREFIX --protocol -1
```

1. Create an IAM OIDC provider: See [Creating an IAM OIDC provider for your cluster](https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html) for details.

```bash
eksctl utils associate-iam-oidc-provider --cluster $CLUSTER_NAME --approve --region $AWS_REGION
```

1. Create a policy (`recommended-inline-policy.json`) in IAM with the following content that can invoke the gateway API and copy the policy arn for later use:

```bash
{
"Version": "2012-10-17",
Expand All @@ -47,14 +51,19 @@ Run through them again for a second cluster to use with the extended example sho
--policy-document file://examples/recommended-inline-policy.json
```
1. Create the `system` namespace:

```bash
kubectl apply -f examples/deploy-namesystem.yaml
```

1. Retrieve the policy ARN:

```bash
export VPCLatticeControllerIAMPolicyArn=$(aws iam list-policies --query 'Policies[?PolicyName==`VPCLatticeControllerIAMPolicy`].Arn' --output text)
```

1. Create an iamserviceaccount for pod level permission:

```bash
eksctl create iamserviceaccount \
--cluster=$CLUSTER_NAME \
Expand All @@ -68,21 +77,21 @@ Run through them again for a second cluster to use with the extended example sho

1. Run either `kubectl` or `helm` to deploy the controller:

```bash
kubectl apply -f examples/deploy-v0.0.4.yaml
```
```bash
kubectl apply -f examples/deploy-v0.0.4.yaml
```

or

```bash
# login to ECR
aws ecr-public get-login-password --region us-east-1 | helm registry login --username AWS --password-stdin public.ecr.aws
# Run helm with either install or upgrade
helm install gateway-api-controller \
oci://public.ecr.aws/aws-application-networking-k8s/aws-gateway-controller-chart\
--version=v0.0.3 \
--set=aws.region=$AWS_REGION --set=serviceAccount.create=false --namespace system
```
or

```bash
# login to ECR
aws ecr-public get-login-password --region us-east-1 | helm registry login --username AWS --password-stdin public.ecr.aws
# Run helm with either install or upgrade
helm install gateway-api-controller \
oci://public.ecr.aws/aws-application-networking-k8s/aws-gateway-controller-chart\
--version=v0.0.3 \
--set=aws.region=$AWS_REGION --set=serviceAccount.create=false --namespace system
```

1. Create the `amazon-vpc-lattice` GatewayClass:
```bash
Expand Down
20 changes: 10 additions & 10 deletions docs/getstarted.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,21 +19,21 @@ This example creates a single cluster in a single VPC, then configures two route
**Set up Service-to-Service communications**

1. Create the Kubernetes Gateway `my-hotel`:

```bash
kubectl apply -f examples/my-hotel-gateway.yaml
```
***Note***

By default, the gateway (lattice service network) is not associated with cluster's VPC. To associate a gateway (lattice service network) to VPC, `my-hotel-gateway.yaml` includes the following annotation.
***Note***: By default, the gateway (lattice service network) is not associated with cluster's VPC. To associate a gateway (lattice service network) to VPC, `my-hotel-gateway.yaml` includes the following annotation.

apiVersion: gateway.networking.k8s.io/v1beta1
kind: Gateway
metadata:
name: my-hotel
annotations:
application-networking.k8s.aws/lattice-vpc-association: "true"
```
apiVersion: gateway.networking.k8s.io/v1beta1
kind: Gateway
metadata:
name: my-hotel
annotations:
application-networking.k8s.aws/lattice-vpc-association: "true"
```

1. Verify that `my-hotel` gateway is created (this could take about five minutes):
```bash
Expand Down