This deployment guide shows you how to set up an Amazon Elastic Kubernetes Engine cluster on which Coder can deploy.
Please make sure that you have the following utilities installed on your machine:
- AWS command-line interface (you'll also need to configure the command-line interface to interact with your AWS account; consider AWS' CLI configuration quickstart to fast-track this process
- eksctl command-line utility
The node type and size that you select impact how you use Coder. When choosing, be sure to account for the number of developers you expect to use Coder, as well as the resources they need to run their workspaces. See our guide on on compute resources for additional information.
If you expect to provision GPUs to your Coder workspaces, you must use an EC2 instance from AWS' accelerated computing instance family.
GPUs are not supported in workspaces deployed as container-based virtual machines (CVMs) unless you're running Coder in a bare-metal Kubernetes environment.
Before you can create a cluster, you'll need to perform the following to set up and configure your AWS account.
Go to AWS' EC2 console; this should take you to the EC2 page for the AWS region in which you're working (if not, change to the correct region using the dropdown in the top-right of the page)
In the Resources section in the middle of the page, click Elastic IPs.
Choose either an Elastic IP address you want to use or click Allocate Elastic IP address. Choose Amazon's pool of IPv4 addresses and click Allocate.
Return to the EC2 Dashboard.
In the Resources section in the middle of the page, click Key Pairs.
Click Create key pair (alternatively, if you already have a local SSH key you'd like to use, you can click the Actions dropdown and import your key)
Provide a name for your key pair and select pem as your file format. Click Create key pair.
You'll automatically download the keypair; save it to a known directory on your local machine (we recommend keeping the default name, which will match the name you provided to AWS).
Now that you have the
.pemfile, extract the public key portion of the keypair so that you can use it with the eksctl CLI in later steps:
ssh-keygen -y -f <PATH/TO/KEY>.pem >> <PATH/TO/KEY/KEY>.pub
Note: if you run into a bad permissions error, run
sudobefore the command above.
When done, you should have a .pem and .pub file for the same keypair you downloaded from AWS.
To make subsequent steps easier, start by creating environment variables for the cluster name, region, and SSH key path:
CLUSTER_NAME="YOUR_CLUSTER_NAME" SSH_KEY_PATH="<PATH/TO/KEY>.pub" REGION="YOUR_REGION"
The following will spin up a Kubernetes cluster using
eksctl (be sure to
update the parameters as necessary, especially the version number):
eksctl create cluster \ --name "$CLUSTER_NAME" \ --version <version> \ --region "$REGION" \ --nodegroup-name standard-workers \ --node-type t3.medium \ --nodes 2 \ --nodes-min 2 \ --nodes-max 8 \ --ssh-access \ --ssh-public-key "$SSH_KEY_PATH" \ --managed
When your cluster is ready, you should see the following message:
EKS cluster "YOUR_CLUSTER_NAME" in "YOUR_REGION" region is ready
This process may take ~15-30 minutes to complete.
Once you've created the cluster, adjust the default Kubernetes storage class to support immediate volume binding.
Make sure that you're pointed to the correct context:
kubectl config current-context
If you're pointed to the correct context, delete the gp2 storage class:
kubectl delete sc gp2
Recreate the gp2 storage class with the
cat <<EOF | kubectl apply -f - apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: annotations: storageclass.kubernetes.io/is-default-class: "true" name: gp2 provisioner: kubernetes.io/aws-ebs parameters: type: gp2 fsType: ext4 volumeBindingMode: Immediate allowVolumeExpansion: true EOF
See the Kubernetes docs for information on choosing the right parameter for
volumeBindingMode; Coder accepts both
Define your config file (we've named the file
coder-node.yaml, but you can call it whatever you'd like):
apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig metadata: version: "<YOUR_K8s_VERSION>" name: <YOUR_CLUSTER_NAME> region: <YOUR_AWS_REGION> managedNodeGroups: - name: coder-node-group amiFamily: Ubuntu2004 # Custom EKS-compatible AMIs can be used instead of amiFamily # ami: <your Ubuntu 20.04 AMI ID> instanceType: <instance-type> minSize: 1 maxSize: 2 desiredCapacity: 1 # Uncomment "overrideBootstrapCommand" if you are using a custom AMI # overrideBootstrapCommand: | # #!/bin/bash -xe # sudo /etc/eks/bootstrap.sh <YOUR_CLUSTER_NAME>
Create your nodegroup (be sure to provide the correct file name):
eksctl create nodegroup --config-file=coder-node.yaml
AWS uses Calico to implement network segmentation and tenant isolation.
Apply the Calico manifest to your cluster:
kubectl apply -f https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/master/config/master/calico-operator.yaml kubectl apply -f https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/master/config/master/calico-crs.yaml
kubectl get daemonset calico-node --namespace calico-system
Wait for the
calico-nodeDaemonSet to have the number of pods desired in the ready state; this indicates that Calico is working:
NAME DESIRED CURRENT READY UP-TO-DATE ... calico-node 3 3 3 3 ...
EKS allows you to create and manage user permissions using IAM identity providers (IdPs). EKS also supports user authentication via OpenID Connect (OIDC) identity providers.
Using IAM with Kubernetes' native Role-Based Access Control (RBAC) allows you to grant access to your EKS cluster using existing IDPs and fine-tune permissions with RBAC.
For more information, see: