Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Gov Cloud support #421

Merged
merged 14 commits into from
Jun 16, 2022
3 changes: 3 additions & 0 deletions charts/addons/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,7 @@ Configuration | Usage
`clusterName` | The name of your EKS cluster. Resources created by the ALB Ingress controller will be prefixed with this string.
`region` | AWS region of the EKS cluster. Required if if ec2metadata is unavailable from the controller Pod.
`vpcId` | VPC ID of EKS cluster, required if ec2metadata is unavailable from controller pod.
`image.repository` | Amazon EKS Amazon ECR image repository. To be enabled only for aws gov cloud deployments.
`serviceAccount.annotations` | Annotate the service account with `eks.amazonaws.com/role-arn` IAM Role that provides access to AWS resources.

Example:
Expand All @@ -63,6 +64,8 @@ aws-load-balancer-controller:
clusterName: "YOUR_EKS_CLUSTER_NAME"
region: "YOUR_EKS_CLUSTER_REGION"
vpcId: "YOUR_EKS_CLUSTER_VPC_ID"
image:
repository: "Amazon EKS Amazon ECR image repository"
serviceAccount:
annotations:
eks.amazonaws.com/role-arn: "YOUR_IAM_ROLE_ARN"
Expand Down
7 changes: 7 additions & 0 deletions charts/addons/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,13 @@ aws-load-balancer-controller:
region: "YOUR_EKS_CLUSTER_REGION"
## VPC ID of k8s cluster, required if ec2metadata is unavailable from controller pod
vpcId: "YOUR_EKS_CLUSTER_VPC_ID"

## Deployments on AWS Gov Cloud requires the image repository to be passed explicitly. Please enable this block for aws gov cloud deployments only.
Prakash-Singh1712 marked this conversation as resolved.
Show resolved Hide resolved
## The AMAZON_CONTAINER_IMAGE_REGISTRY can be found here: https://docs.aws.amazon.com/eks/latest/userguide/add-ons-images.html
## For more details on this, please refer https://docs.aws.amazon.com/eks/latest/userguide/aws-load-balancer-controller.html
##image:
## repository: "<AMAZON_CONTAINER_IMAGE_REGISTRY>/amazon/aws-load-balancer-controller"

## To create IAM Role, see https://docs.aws.amazon.com/eks/latest/userguide/create-service-account-iam-policy-and-role.html#create-service-account-iam-role
## Create policy with https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/main/docs/install/iam_policy.json and
## attach it to the role. See, https://github.com/aws/eks-charts/tree/master/stable/aws-load-balancer-controller for more details
Expand Down
1 change: 1 addition & 0 deletions docs/Deploying-Pega-on-EKS.md
Original file line number Diff line number Diff line change
Expand Up @@ -434,6 +434,7 @@ To configure the use of an Amazon AWS ALB ingress controller in the addons.yaml
- Specify your EKS cluster name in the `clusterName: <YOUR_EKS_CLUSTER_NAME>` parameter.
- Specify the region of your EKS cluster name in the `region: <YOUR_EKS_CLUSTER_REGION>` parameter. Resources created by the ALB Ingress controller will be prefixed with this string.
- Specify the the AWS VPC ID of your EKS cluster name in the `VpcID: <YOUR_EKS_CLUSTER_VPC_ID>` parameter. You must enter your VPC ID here if ec2metadata is unavailable from the controller pod.
- Uncomment & specify the Amazon EKS Amazon ECR image repository in the `image.repository: <Amazon EKS Amazon ECR image repository>` parameter. This needs to be done only for AWS Gov Cloud deployments.
Prakash-Singh1712 marked this conversation as resolved.
Show resolved Hide resolved
- Specify complete required required annotation to specify the role that you associate with the primary IAM user who is responsible for your EKS deployment in the `serviceAccount.annotations.eks.amazonaws.com/role-arn: <YOUR_IAM_ROLE_ARN>` parameter.

To ensure logging for your deployment is properly configured to take advantage of the built-in EFK logging tools in EKS deployments, refer to the [Amazon EKS Workshop](https://eksworkshop.com/logging/).
Expand Down