Running Gitpod in Amazon EKS
IMPORTANT This guide exists as a simple and reliable way of creating required AWS infrastructure. It is not designed to cater for every situation. If you find that it does not meet your exact needs, please fork this guide and amend it to your own needs.
This guide exists as a simple and reliable way of creating an environment in AWS (EKS) that Gitpod can be installed into. Upon completion, it will print the config for the resources created (including passwords) and create the necessary credential files that will allow you to connect the components created to your Gitpod instance during the next installation step.
Before starting the installation process, you need:
- An AWS account with Administrator access
- AWS credentials set up. By default, those configs are present in
$HOME/.aws/
. - eksctl config file describing the cluster.
- Here is an eks-cluster.yaml you can use as example.
- A
.env
file with basic details about the environment.- We provide an example of such file here.
- Docker installed on your machine, or better, a Gitpod workspace :)
Create a public SSL/TLS certificate with AWS Certificate Manager,
valid for the <domain>
, *.ws.<domain>
and *.<domain>
Domain names.
Once the certificate is issued and verified, Update the CERTIFICATE_ARN
field in the .env
file accordingly.
Please update the ami
field in the eks-cluster.yaml file with the proper AMI ID for the region of the cluster.
Region | AMI |
---|---|
us-west-1 | ami-04e9afc0a981cac90 |
us-west-2 | ami-009935ddbb32a7f3c |
eu-west-1 | ami-0f08b4b1a4fd3ebe3 |
eu-west-2 | ami-05f027fd3d0187541 |
eu-central-1 | ami-04a8127c830f27712 |
us-east-1 | ami-076db8ca29c04327b |
us-east-2 | ami-0ad574da759c55c17 |
To start the installation, execute:
make install
Important: DNS propagation can take several minutes until the configured domain is available!
The whole process takes around forty minutes. In the end, the following resources are created:
-
an EKS cluster running Kubernetes v1.21
-
Kubernetes nodes using a custom AMI image:
- Ubuntu 21.10
- Linux kernel v5.13
- containerd v1.5.8
- runc: v1.0.1
- CNI plugins: v0.9.1
- Stargz Snapshotter: v0.10.0
-
ALB load balancer with TLS termination and re-encryption
-
RDS Mysql database
-
Two autoscaling groups, one for gitpod components and another for workspaces
-
In-cluster docker registry using S3 as storage backend
-
IAM account with S3 access (docker-registry and gitpod user content)
-
calico as CNI and NetworkPolicy implementation
-
cert-manager for self-signed SSL certificates
-
Jaeger operator - and Jaeger deployment for gitpod distributed tracing
-
A public DNS zone managed by Route53 (if
ROUTE53_ZONEID
env variable is configured)
Please check the OAuth providers integration documentation expected format.
We provide an example here. Fill it with your OAuth providers data.
make auth
We are aware of the limitation of this approach, and we are working to improve the helm chart to avoid this step.
Remove Cloudformation stacks and EKS cluster running:
make uninstall
The command asks for a confirmation:
Are you sure you want to delete: Gitpod, Services/Registry, Services/RDS, Services, Addons, Setup (y/n)?
Please make sure you delete the S3 bucket used to store the docker registry images!