You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: aws/README.md
+19-7Lines changed: 19 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,13 +42,14 @@ The terraform code is loosely based on [this EKS managed Node Group TF example](
42
42
43
43
1. export your AWS credentials (`export AWS_PROFILE=awsuser`)
44
44
2. check whether you have the right profile by doing `aws sts get-caller-identity`. Make sure you have the right account and have the rights to do this.
45
-
3. Do `terraform init` (if required, use tfenv to select TF 0.14.0 or higher )
46
-
4. The bucket ARN will be asked in the next 2 steps. Take the one provided to you in the output earlier (e.g., `arn:aws:s3:::terraform-20230102231352749300000001`).
47
-
5. Do `terraform plan`
48
-
6. Do `terraform apply`. Note: the apply will take 10 to 20 minutes depending on the speed of the AWS backplane.
49
-
7. When creation is done, do `aws eks update-kubeconfig --region eu-west-1 --name wrongsecrets-exercise-cluster --kubeconfig ~/.kube/wrongsecrets`
50
-
8. Do `export KUBECONFIG=~/.kube/wrongsecrets`
51
-
9. Run `./build-and-deploy-aws.sh` to install all the required materials (helm for calico, secrets management, autoscaling, etc.)
45
+
3. Ensure you have set all the right variables in `terraform.tfvars`. **Optional:** If you want to use a custom domain with TLS, also fill out your domain name(s) and Route53 hosted zone here. Delegate (sub)domains to Route53 nameservers if you're not hosting your domain with Route53: [using the AWS docs](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/CreatingNewSubdomain.html)
46
+
4. Do `terraform init` (if required, use tfenv to select TF 0.14.0 or higher )
47
+
5. The bucket ARN will be asked in the next 2 steps. Take the one provided to you in the output earlier (e.g., `arn:aws:s3:::terraform-20230102231352749300000001`).
48
+
6. Do `terraform plan`
49
+
7. Do `terraform apply`. Note: the apply will take 10 to 20 minutes depending on the speed of the AWS backplane.
50
+
8. When creation is done, do `aws eks update-kubeconfig --region eu-west-1 --name wrongsecrets-exercise-cluster --kubeconfig ~/.kube/wrongsecrets`
51
+
9. Do `export KUBECONFIG=~/.kube/wrongsecrets`
52
+
10. Run `./build-and-deploy-aws.sh` to install all the required materials (helm for calico, secrets management, autoscaling, etc.)
52
53
53
54
Your EKS cluster should be visible in [eu-west-1](https://eu-west-1.console.aws.amazon.com/eks/home?region=eu-west-1#/clusters) by default. Want a different region? You can modify `terraform.tfvars` or input it directly using the `region` variable in plan/apply.
54
55
@@ -158,9 +159,12 @@ The documentation below is auto-generated to give insight on what's created via
| <aname="input_balancer_domain_name"></a> [balancer\_domain\_name](#input\_balancer\_domain\_name)| The domain name to use |`string`|`""`| no |
207
212
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| The EKS cluster name |`string`|`"wrongsecrets-exercise-cluster"`| no |
208
213
| <aname="input_cluster_version"></a> [cluster\_version](#input\_cluster\_version)| The EKS cluster version to use |`string`|`"1.30"`| no |
214
+
| <aname="input_ctfd_domain_name"></a> [ctfd\_domain\_name](#input\_ctfd\_domain\_name)| The domain name to use |`string`|`""`| no |
209
215
| <aname="input_extra_allowed_ip_ranges"></a> [extra\_allowed\_ip\_ranges](#input\_extra\_allowed\_ip\_ranges)| Allowed IP ranges in addition to creator IP |`list(string)`|`[]`| no |
216
+
| <aname="input_hosted_zone_id"></a> [hosted\_zone\_id](#input\_hosted\_zone\_id)| The ID of the Route53 Hosted Zone to use |`string`|`""`| no |
210
217
| <aname="input_region"></a> [region](#input\_region)| The AWS region to use |`string`|`"eu-west-1"`| no |
211
218
| <aname="input_state_bucket_arn"></a> [state\_bucket\_arn](#input\_state\_bucket\_arn)| ARN of the state bucket to grant access to the s3 user |`string`| n/a | yes |
| <aname="output_balancer_domain_name"></a> [balancer\_domain\_name](#output\_balancer\_domain\_name)| Balancer domain name |
217
226
| <aname="output_cluster_autoscaler_role"></a> [cluster\_autoscaler\_role](#output\_cluster\_autoscaler\_role)| Cluster autoscaler role |
218
227
| <aname="output_cluster_autoscaler_role_arn"></a> [cluster\_autoscaler\_role\_arn](#output\_cluster\_autoscaler\_role\_arn)| Cluster autoscaler role arn |
219
228
| <aname="output_cluster_endpoint"></a> [cluster\_endpoint](#output\_cluster\_endpoint)| Endpoint for EKS control plane. |
220
229
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| The id of the cluster |
221
230
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| The EKS cluster name |
222
231
| <aname="output_cluster_security_group_id"></a> [cluster\_security\_group\_id](#output\_cluster\_security\_group\_id)| Security group ids attached to the cluster control plane. |
# The certificate ARN can be discovered automatically by the ALB Ingress Controller based on the host value in the ingress, or you can specify it manually by uncommenting and customizing the line below
# The certificate ARN can be discovered automatically by the ALB Ingress Controller based on the host value in the ingress, or you can specify it manually by uncommenting and customizing the line below
0 commit comments