You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- The controller will watch forthe resourcesin the helm chart release namespace. In this guide, that value is set from the `$ACK_K8S_NAMESPACE` variable in helm install section [3.1.3](#313-install-controller)
165
162
- ```sh
166
163
# Update values in helm chart
167
164
cd$CHART_EXPORT_PATH/$SERVICE-chart
168
165
yq e '.aws.region = env(AWS_DEFAULT_REGION)' -i values.yaml
169
166
yq e '.aws.account_id = env(AWS_ACCOUNT_ID)' -i values.yaml
170
167
yq e '.serviceAccount.annotations."eks.amazonaws.com/role-arn" = env(IAM_ROLE_ARN_FOR_IRSA)' -i values.yaml
171
-
yq e '.watchNamespace" = env(WATCH_NAMESPACE)' -i values.yaml
168
+
yq e '.installScope = namespace' -i values.yaml
172
169
cd -
173
170
```
174
171
##### 3.1.3 Install Controller
@@ -249,16 +246,17 @@ for example, the controller default region is us-west-2 (3.a/3.b) and you want t
249
246
apiVersion: sagemaker.services.k8s.aws/v1alpha1
250
247
kind: TrainingJob
251
248
metadata:
252
-
name: ack-sample-tainingjob
249
+
name: ack-sample-trainingjob
253
250
annotations:
254
251
services.k8s.aws/region: us-east-1
255
252
spec:
256
-
trainingJobName: ack-sample-tainingjob
253
+
trainingJobName: ack-sample-trainingjob
257
254
roleARN: <sagemaker_execution_role_arn>
258
255
...
259
256
```
260
257
261
258
- [Option 2] Namespace default region annotation sample
259
+
- **Note**: Namespaced scope deployment does not support this option
262
260
- To bind a region to a specific Namespace you will have to annotate the Namespace with `services.k8s.aws/default-region` annotation. For example:
263
261
- ```yaml
264
262
apiVersion: v1
@@ -278,10 +276,10 @@ for example, the controller default region is us-west-2 (3.a/3.b) and you want t
278
276
apiVersion: sagemaker.services.k8s.aws/v1alpha1
279
277
kind: TrainingJob
280
278
metadata:
281
-
name: ack-sample-tainingjob
279
+
name: ack-sample-trainingjob
282
280
namespace: production
283
281
spec:
284
-
trainingJobName: ack-sample-tainingjob
282
+
trainingJobName: ack-sample-trainingjob
285
283
roleARN: <sagemaker_execution_role_arn>
286
284
...
287
285
```
@@ -291,7 +289,9 @@ for example, the controller default region is us-west-2 (3.a/3.b) and you want t
291
289
ACK service controllers can manage resources in different AWS accounts. To enable and start using this feature, you will need to:
292
290
293
291
1. Configure your AWS accounts, where the resources will be managed.
294
-
2. Create a ConfigMap to map AWS accounts with the Role ARNs that needs to be assumed
292
+
2. Deploy ACK service controller in Cluster scope
293
+
- Namespaced scope deployment does not support Cross Account Resource Management
294
+
3. Create a ConfigMap to map AWS accounts with the Role ARNs that needs to be assumed
295
295
3. Annotate namespaces with AWS Account IDs
296
296
297
297
For detailed information about how ACK service controllers manage resource in multiple AWS accounts, please refer to [CARM](https://github.com/aws/aws-controllers-k8s/blob/main/docs/design/proposals/carm/cross-account-resource-management.md) design document.
0 commit comments