Replies: 5 comments 3 replies
-
Hi @mwengren, Nebari supports existing AWS subnets, by passing the associated security group ID and existing subnet IDs in the Here's an example of how that can be set in the config:
I am c.c. @aktech @Adam-D-Lewis as both have more experience with AWS deployments, and Adam worked on adding support for this |
Beta Was this translation helpful? Give feedback.
-
@viniciusdc When I add the
Do I need a custom validation configuration as well? |
Beta Was this translation helpful? Give feedback.
-
The syntax is as following: amazon_web_services:
existing_subnet_ids:
- subnet-xxxxxxxxxxxx
- subnet-yyyyyyyyyyyy
existing_security_group_id: sg-kkkkkkkkkkkk |
Beta Was this translation helpful? Give feedback.
-
I figured out the answer to the nebari-config.yaml question above, however I'm hitting an issue in the deployment process. This is the YAML config I used to override and use my existing subnets (same as above but without the
Adding these resulted in the Nebari deploy starting. Is the purpose of the Security Group documented anywhere? I found this part of the TF code that both the Asking because it's not clear to me why my
Looking in the AWS console it appears the desired size of the general node group is 1, so presumably it failed when the instance failed to join, which must be security group or other permission-related issue? Thanks for any advice! |
Beta Was this translation helpful? Give feedback.
-
I've tried redeploying a few times but each time the node instance (which is created successfully as m52xlarge type per nebari-config.yml) isn't able to join the
It's odd because I have AdministratorAccess role for my account which appears to have full access as far as I can tell for IAM permissions, so I'm not sure where to go to troubleshoot further. Are there other common reasons why the instance might not be able to connect to the node group? Thanks in advance! |
Beta Was this translation helpful? Give feedback.
-
We have some particular networking/security requirements that compel us to use a pre-existing VPC and associated public/private subnets in our AWS account. Similarly, we can't create new InternetGateway (IGW) in our public subnet, we must use an existing networking setup for outgoing traffic out of AWS to our network or for any public traffic.
Is there a way to configure such a deployment by editing the nebari-config.yaml file appropriately? Essentially to pass IDs for existing AWS resources (VPC, subnet, etc) for Nebari to deploy components to? I can't find documentation for this type of deployment scenario in the Nebari docs, so I assume it would require some manual editing of Nebari internals beyond just the options provided in nebari-config?
TIA!
Beta Was this translation helpful? Give feedback.
All reactions