You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-the`aws-ebs-csi-driver` addon is required to use EBS volumes as persistent volumes . This will be mainly used to store the tenant control plane data using default data store `etcd`.
105
+
-The`aws-ebs-csi-driver` addon is required to use EBS volumes as persistent volumes . This will be mainly used to store the tenant control plane data using default data store `etcd`.
105
106
- We created a node group with 1 node in one availability zone to simplify the setup.
- Tenant Control Plane will expose the API server using a public IP address through a network loadbalancer.
285
+
- Tenant Control Plane will expose the API server using a public IP address through a network loadbalancer.
285
286
it is important to provide a static public IP address for the API server in order to make it reachable from the outside world.
286
287
287
-
-the following annotation: `external-dns.alpha.kubernetes.io/hostname` is set to create the dns record. It tells AWS to expose the Tenant Control Plane with public domain name: `${TENANT_NAME}.${TENANT_DOMAIN}`.
288
+
-The following annotation: `external-dns.alpha.kubernetes.io/hostname` is set to create the dns record. It tells AWS to expose the Tenant Control Plane with public domain name: `${TENANT_NAME}.${TENANT_DOMAIN}`.
288
289
289
290
> Since AWS load Balancer does not support setting LoadBalancerIP, you will get the following warning on the service created for the control plane tenant `Error syncing load balancer: failed to ensure load balancer: LoadBalancerIP cannot be specified for AWS ELB`. you can ignore it for now.
290
291
291
292
### Working with Tenant Control Plane
292
293
293
294
Check the access to the Tenant Control Plane:
294
295
295
-
> if the domain you used is a private route53 domain make sure to map the public IP of the LB to ${TENANT_NAME}.${TENANT_DOMAIN} in your `/etc/hosts`. otherwise kubectl will fail checking ssl certificates
296
+
> If the domain you used is a private route53 domain make sure to map the public IP of the LB to ${TENANT_NAME}.${TENANT_DOMAIN} in your `/etc/hosts`. otherwise kubectl will fail checking ssl certificates
@@ -339,15 +340,16 @@ Kamaji does not provide any helper for creation of tenant worker nodes, instead
339
340
340
341
An alternative approach to create and join worker nodes in AWS is to manually create the VMs, turn them into Kubernetes worker nodes and then join through the `kubeadm` command.
341
342
342
-
### Create the kubeadm join command
343
+
### generate kubeadm join command
344
+
345
+
To join the worker nodes to the Tenant Control Plane, you need to generate the `kubeadm join` command from the Management cluster:
343
346
344
-
Run the following command to get the `kubeadm` join command that will be used on the worker tenant nodes:
> we have used user data to run the `kubeadm join` command on the instance boot. This will make sure that the worker node will join the cluster automatically.
374
+
> We have used user data to run the `kubeadm join` command on the instance boot. This will make sure that the worker node will join the cluster automatically.
373
375
374
376
375
-
> make sure to replace `<REPLACE_WITH_SG>` with the security group id that allows the worker nodes to communicate with the public IP of the tenant control plane
377
+
> Make sure to replace `<REPLACE_WITH_SG>` with the security group id that allows the worker nodes to communicate with the public IP of the tenant control plane
0 commit comments