We use cookies to make your experience better.
Learn how to set up an Amazon EKS cluster for your Coder deployment.
This deployment guide shows you how to set up an Amazon Elastic Kubernetes Engine cluster on which Coder can deploy.
Please make sure that you have the following utilities installed on your machine:
The node type and size that you select impact how you use Coder. When choosing, be sure to account for the number of developers you expect to use Coder, as well as the resources they need to run their workspaces. See our guide on on compute resources for additional information.
If you expect to provision GPUs to your Coder workspaces, you must use an EC2 instance from AWS' accelerated computing instance family.
GPUs are not supported in workspaces deployed as container-based virtual machines (CVMs) unless you're running Coder in a bare-metal Kubernetes environment.
Before you can create a cluster, you'll need to perform the following to set up and configure your AWS account.
Go to AWS' EC2 console; this should take you to the EC2 page for the AWS region in which you're working (if not, change to the correct region using the dropdown in the top-right of the page)
In the Resources section in the middle of the page, click Elastic IPs.
Choose either an Elastic IP address you want to use or click Allocate Elastic IP address. Choose Amazon's pool of IPv4 addresses and click Allocate.
Return to the EC2 Dashboard.
In the Resources section in the middle of the page, click Key Pairs.
Click Create key pair (alternatively, if you already have a local SSH key you'd like to use, you can click the Actions dropdown and import your key)
Provide a name for your key pair and select pem as your file format. Click Create key pair.
You'll automatically download the keypair; save it to a known directory on your local machine (we recommend keeping the default name, which will match the name you provided to AWS).
Now that you have the .pem
file, extract the public key portion of the
keypair so that you can use it with the eksctl CLI in later steps:
ssh-keygen -y -f <PATH/TO/KEY>.pem >> <PATH/TO/KEY/KEY>.pub
Note: if you run into a bad permissions error, run sudo
before the
command above.
When done, you should have a .pem and .pub file for the same keypair you downloaded from AWS.
To make subsequent steps easier, start by creating environment variables for the cluster name, region, and SSH key path:
CLUSTER_NAME="YOUR_CLUSTER_NAME"
SSH_KEY_PATH="<PATH/TO/KEY>.pub"
REGION="YOUR_REGION"
The following will spin up a Kubernetes cluster using eksctl
(be sure to
update the parameters as necessary, especially the version number):
eksctl create cluster \
--name "$CLUSTER_NAME" \
--version <version> \
--region "$REGION" \
--nodegroup-name standard-workers \
--node-type t3.medium \
--nodes 2 \
--nodes-min 2 \
--nodes-max 8 \
--ssh-access \
--ssh-public-key "$SSH_KEY_PATH" \
--managed
Please note that the sample script creates a t3.medium
instance; depending on
your needs, you can choose a
larger size instead. See
requirements for help estimating your cluster size.
When your cluster is ready, you should see the following message:
EKS cluster "YOUR_CLUSTER_NAME" in "YOUR_REGION" region is ready
This process may take ~15-30 minutes to complete.
Once you've created the cluster, adjust the default Kubernetes storage class to support immediate volume binding.
Make sure that you're pointed to the correct context:
kubectl config current-context
If you're pointed to the correct context, delete the gp2 storage class:
kubectl delete sc gp2
Recreate the gp2 storage class with the volumeBindingMode
set to
Immediate
:
cat <<EOF | kubectl apply -f -
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.kubernetes.io/is-default-class: "true"
name: gp2
provisioner: kubernetes.io/aws-ebs
parameters:
type: gp2
fsType: ext4
volumeBindingMode: Immediate
allowVolumeExpansion: true
EOF
See the Kubernetes docs for information on choosing the right parameter for
volumeBindingMode
; Coder accepts bothImmediate
andWaitForFirstConsumer
.
To create clusters allowing you to enable container-based virtual machines (CVMs) as a workspace deployment option, you'll need to create a nodegroup.
Define your config file (we've named the file coder-node.yaml
, but you can
call it whatever you'd like):
apiVersion: eksctl.io/v1alpha5
kind: ClusterConfig
metadata:
version: "<YOUR_K8s_VERSION>"
name: <YOUR_CLUSTER_NAME>
region: <YOUR_AWS_REGION>
nodeGroups:
- name: coder-node-group
amiFamily: Ubuntu2004
ami: <your Ubuntu 20.04 AMI ID>
Create your nodegroup (be sure to provide the correct file name):
eksctl create nodegroup --config-file=coder-node.yaml
AWS uses Calico to implement network segmentation and tenant isolation.
Apply the Calico manifest to your cluster:
kubectl apply -f https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/master/config/master/calico-operator.yaml
kubectl apply -f https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/master/config/master/calico-crs.yaml
Watch the calico-system
DaemonSets:
kubectl get daemonset calico-node --namespace calico-system
Wait for the calico-node
DaemonSet to have the number of pods desired
in the ready state; this indicates that Calico is working:
NAME DESIRED CURRENT READY UP-TO-DATE ...
calico-node 3 3 3 3 ...
EKS allows you to create and manage user permissions using IAM identity providers (IdPs). EKS also supports user authentication via OpenID Connect (OIDC) identity providers.
Using IAM with Kubernetes' native Role-Based Access Control (RBAC) allows you to grant access to your EKS cluster using existing IDPs and fine-tune permissions with RBAC.
For more information, see:
If you have already installed Coder or are using our hosted beta, you can add this cluster as a workspace provider.
To access Coder through a secure domain, review our guides on configuring and using TLS certificates.
Once complete, see our page on installation.
See an opportunity to improve our docs? Make an edit.