You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Includes bug fixed in release script and helm bug fixes code-generator#141
- Updated README with latest ECR repo and some enhancements
### Testing
Tested manually. Controller image is fine, only the charts had bugs
Copy file name to clipboardexpand all lines: README.md
+50-55
Original file line number
Diff line number
Diff line change
@@ -33,14 +33,19 @@ The following sections will guide you to install SageMaker and Application Autos
33
33
This guide assumes that you’ve the following prerequisites:
34
34
- Installed the following tools on the client machine used to access your Kubernetes cluster:
35
35
-[kubectl](https://docs.aws.amazon.com/eks/latest/userguide/install-kubectl.html) - A command line tool for working with Kubernetes clusters.
36
-
- helm v3.2.4 - A tool for installing and managing Kubernetes applications
37
-
-```
38
-
git clone https://github.com/aws-controllers-k8s/community.git community
39
-
40
-
./community/scripts/install-helm.sh
41
-
```
36
+
-[helm](https://helm.sh/docs/intro/install/) - A tool for installing and managing Kubernetes applications
42
37
-[AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv1.html) - A command line tool for interacting with AWS services.
43
38
-[eksctl](https://docs.aws.amazon.com/eks/latest/userguide/eksctl.html) - A command line tool for working with EKS clusters that automates many individual tasks.
- Have IAM permissions to create roles and attach policies to roles.
45
50
- Created an EKS cluster on which to run the controllers. It should be Kubernetes version 1.16+. For automated cluster creation using eksctl, see [Create an Amazon EKS Cluster](https://docs.aws.amazon.com/eks/latest/userguide/create-cluster.html) and select eksctl option.
Run the following command to create a role with the trust relationship defined in `trust.json`. This role enables the Amazon EKS cluster to get and refresh credentials from IAM.
115
+
110
116
```sh
111
-
OIDC_ROLE_NAME=ack-sage-role-$CLUSTER_NAME
117
+
OIDC_ROLE_NAME=ack-controller-role-$CLUSTER_NAME
112
118
113
119
aws --region $AWS_DEFAULT_REGION iam create-role --role-name $OIDC_ROLE_NAME --assume-role-policy-document file://trust.json
114
120
115
121
# Attach the AmazonSageMakerFullAccess Policy to the Role
116
122
aws --region $AWS_DEFAULT_REGION iam attach-role-policy --role-name $OIDC_ROLE_NAME --policy-arn arn:aws:iam::aws:policy/AmazonSageMakerFullAccess
117
-
exportOIDC_ROLE_ARN=$(aws --region $AWS_DEFAULT_REGION iam get-role --role-name $OIDC_ROLE_NAME --output text --query 'Role.Arn')
118
-
echo$OIDC_ROLE_ARN
123
+
exportIAM_ROLE_ARN_FOR_IRSA=$(aws --region $AWS_DEFAULT_REGION iam get-role --role-name $OIDC_ROLE_NAME --output text --query 'Role.Arn')
124
+
echo$IAM_ROLE_ARN_FOR_IRSA
119
125
```
120
126
121
-
Take note of OIDC_ROLE_ARN printed in the previous step; you will pass this value to the service account used by the controller.
127
+
Take note of IAM_ROLE_ARN_FOR_IRSA printed in the previous step; you will pass this value to the service account used by the controller.
122
128
123
129
### 3.0 Install Controllers
124
130
@@ -129,10 +135,10 @@ Take note of OIDC_ROLE_ARN printed in the previous step; you will pass this valu
0 commit comments