-
Notifications
You must be signed in to change notification settings - Fork 75
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2831 from manics/aws-curvenote-binder-calico
AWS Curvenote: Install Calico for network policies
- Loading branch information
Showing
13 changed files
with
98 additions
and
619 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
apiVersion: v2 | ||
description: A meta-chart for the tiger-operator charts on some mybinder.org hosts | ||
name: mybinder-tiger-operator | ||
version: "0.0.1-set.by.chartpress" | ||
kubeVersion: ">= 1.26.0-0" | ||
dependencies: | ||
# https://artifacthub.io/packages/helm/aws/aws-load-balancer-controller | ||
- name: tigera-operator | ||
version: 3.25.2 | ||
repository: https://docs.tigera.io/calico/charts | ||
condition: tigera-operator.enabled |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Tigera operator for installing Calico | ||
tigera-operator: | ||
enabled: false |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
# Install Calico for proper NetworkPolicy support | ||
tigera-operator: | ||
enabled: true | ||
installation: | ||
kubernetesProvider: EKS | ||
apiServer: | ||
# Doesn't seem to work on EKS | ||
# https://github.com/projectcalico/calico/issues/7555 | ||
# It's not needed anyway since we only want standard NetworkPolicy support, | ||
# not 'projectcalico.org/v3' | ||
enabled: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,30 @@ | ||
# BinderHub on AWS EKS | ||
|
||
**_Important: Deploying this EKS cluster requires some manual steps after running Terraform_** | ||
|
||
This module deploys an AWS EKS cluster with IRSA roles to support BinderHub ECR access. | ||
|
||
The module has optional support for using a limited non-administrative AWS role with a permissions boundary to deploy the cluster. | ||
|
||
For an example see [curvenote](../curvenote/README.md) | ||
|
||
## Post-deployment steps | ||
|
||
After running Terraform, you will need to perform the following steps: | ||
|
||
### Install the AWS VPC CNI add-on | ||
|
||
Using the AWS CLI: | ||
|
||
1. Get the available vpc-cni versions: `aws eks describe-addon-versions --addon-name vpc-cni ` | ||
2. `aws eks create-addon --cluster-name binderhub --addon-name vpc-cni --addon-version v1.15.3-eksbuild.1 --resolve-conflicts OVERWRITE` | ||
3. Wait for the status to change to `ACTIVE`: `aws eks describe-addon --cluster-name binderhub --addon-name vpc-cni` | ||
|
||
You can also do this using the AWS EKS web console: | ||
|
||
1. Go to the AWS EKS console and open the EKS cluster | ||
2. Under `Add-ons` choose `Get more add-ons` | ||
3. Select `Amazon VPC CNI`, click `Next` | ||
4. Select latest version of the plugin, use the default IAM role `Inherit from node`, click `Next` | ||
5. Client `Create` | ||
6. Wait for the status to change to `Active` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.