source: url
PGPASSWORD=$(terraform output rds-password) psql --host $(terraform output public-rds-endpoint) --port 5432 --user $(terraform output rds-username) --dbname postgres
CREATE USER metabase;
GRANT rds_iam TO metabase;
CREATE DATABASE metabase;
GRANT ALL ON DATABASE metabase TO metabase;
aws eks --region ... update-kubeconfig --name ....
kubectl describe daemonset aws-node --namespace kube-system | grep Image | cut -d "/" -f 2
Change version if necessary
curl -o aws-k8s-cni.yaml https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/master/config/v1.9/aws-k8s-cni.yaml
sed -i "s/us-west-2/eu-west-1/g" aws-k8s-cni.yaml
kubectl apply -f aws-k8s-cni.yaml
kubectl set env daemonset -n kube-system aws-node ENABLE_POD_ENI=true
kubectl get nodes -o wide -l vpc.amazonaws.com/has-trunk-attached=true
METABASE_PWD=$(aws rds generate-db-auth-token --hostname $(terraform output private-rds-endpoint) --port 5432 --username metabase --region
kubectl create namespace metabase kubectl config set-context --current --namespace=metabase kustomize build . | kubectl apply -f -
kubectl get pods kubectl describe pods meta-... kubectl logs meta-...
kubectl delete -f security-group-policy.patch.yaml kubectl delete -f deployment.patch.yaml kubectl apply -f deployment.patch.yaml
kubectl annotate sa metabase eks.amazonaws.com/role-arn- kubectl apply -f security-group-policy.patch.yaml kubectl delete -f deployment.patch.yaml kubectl apply -f deployment.patch.yaml kustomize build . | kubectl delete -f -