You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now that all the accounts have been deployed, we need to finalize the setup of the accounts. This includes deploying CloudTrail and ECR. These foundational components will be necessary to move forward with the rest of the deployment.
@@ -23,8 +24,6 @@ Now that all the accounts have been deployed, we need to finalize the setup of t
23
24
24
25
Deploy CloudTrail and ECR with the following workflow:
This step-by-step process outlines how to deploy AWS accounts using `atmos` workflows and ClickOps steps. It covers necessary preparations, such as configuring the AWS Organization, increasing account quotas, and verifying account configurations. The guide details the deployment processes and post-deployment configurations, including setting up account settings, enabling AWS RAM for Organizations, and performing certain manual configurations via ClickOps.
@@ -42,9 +43,8 @@ This step-by-step process outlines how to deploy AWS accounts using `atmos` work
Follow these steps to configure and initialize the Terraform state backend using Atmos, ensuring proper setup of the infrastructure components and state management.
@@ -27,20 +30,32 @@ If you're unfamiliar with atmos, you can read more about it [here](https://atmos
27
30
If you look at `components/terraform/`, you'll see a bunch of directories. These contain Terraform "root modules" that are provisioned with Atmos. At first they'll only have their vendor files, such as `components/terraform/tfstate-backend/component.yaml`.
28
31
29
32
<Steps>
30
-
1. You can use `atmos workflow vendor -f baseline` to vendor all the `baseline` modules, if the Terraform files are not
31
-
present. You'll want to at least see Terraform files in `tfstate-backend` and `account-map`.
33
+
<Step>
34
+
## <StepNumber/> Vendor the Terraform State Backend component
32
35
33
-
2. Once you've done that, you can run `atmos workflow init/tfstate -f baseline` to deploy the Terraform Backend.
34
-
<Note>it can take a minute for the S3 buckets you created to become available. The workflow will attempt to wait until the bucket is created and available, with a 5-second delay between each check.</Note>
36
+
Vendor the Terraform State Backend component by running the following command. The steps here require the `tfstate-backend` and `account-map` components.
@@ -38,16 +39,7 @@ All deployment steps below assume that the environment has been successfully set
38
39
39
40
Vendor these components with the included Atmos Workflows.
40
41
41
-
```bash
42
-
atmos workflow vendor -f ecs
43
-
```
44
-
45
-
or for each component:
46
-
47
-
```bash
48
-
atmos vendor pull --component ecs
49
-
atmos vendor pull --component ecs-service
50
-
```
42
+
<AtmosWorkflowworkflow="vendor"fileName="ecs" />
51
43
52
44
</Step>
53
45
@@ -66,11 +58,9 @@ All deployment steps below assume that the environment has been successfully set
66
58
67
59
First deploy all required ACM certificates for each ECS cluster. These certificates validate the given service domain. You can deploy these certificates before associating the given Route 53 Hosted Zone with the purchased domain in your chosen Domain Registrar, but the certificate will not be ISSUED until the registered domain and Hosted Zone are connected.
68
60
69
-
Run the following Atmos Workflow to deploy every required ACM certificate for ECS.
61
+
Run the following to deploy every required ACM certificate for ECS.
Provision an example service like the Echo server to test your cluster’s functionality. This will ensure you can access the service remotely via the load balancer, both publicly and privately through the VPN.
@@ -25,12 +26,10 @@ Once the cluster is up and running, continue with the first ECS service deployme
25
26
<Step>
26
27
## <StepNumber/> Deploy Echo Server
27
28
28
-
Run the following Atmos Workflow to deploy `ecs/platform/service/echo-server` and
29
+
Run the following to deploy `ecs/platform/service/echo-server` and
29
30
`ecs/platform/service/echo-server-private` to every cluster.
The GitHub Action Runner Controller (ARC) is a Kubernetes operator that automates the management of self-hosted GitHub Actions runners in a Kubernetes cluster, that works very well together with Karpenter for EKS.
@@ -120,9 +121,7 @@ GitHub Repository or Organization
120
121
<Note title="Tip">
121
122
The first three steps before are all included in the following workflow:
0 commit comments