You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deploy/installation.md
+10-10Lines changed: 10 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,13 @@
2
2
3
3
The AWS Load Balancer controller (LBC) provisions AWS Network Load Balancer (NLB) and Application Load Balancer (ALB) resources. The LBC watches for new `service` or `ingress` Kubernetes resources and configures AWS resources.
4
4
5
-
The LBC is supported by AWS. Some clusters may be using the legacy "in-tree" functionality to provision AWS load balancers. The AWS Load Balancer Controller should be installed instead.
5
+
The LBC is supported by AWS. Some clusters may be using the legacy "in-tree" functionality to provision AWS load balancers. The AWS Load Balancer Controller should be installed instead.
3. Create an IAM policy named `AWSLoadBalancerControllerIAMPolicy`. If you downloaded a different policy, replace `iam-policy` with the name of the policy that you downloaded.
95
+
3. Create an IAM policy named `AWSLoadBalancerControllerIAMPolicy`. If you downloaded a different policy, replace `iam-policy` with the name of the policy that you downloaded.
@@ -111,7 +111,7 @@ Example condition for cluster name resource tag:
111
111
--region <region-code> \
112
112
--approve
113
113
```
114
-
114
+
115
115
### Option B: Attach IAM policies to nodes
116
116
If you're not setting up IAM roles for service accounts, apply the IAM policies from the following URL at a minimum.
117
117
```
@@ -145,9 +145,9 @@ The following IAM permissions subset is for those using `TargetGroupBinding` onl
145
145
146
146
## Network configuration
147
147
148
-
Review the [worker nodes security group](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html) docs. Your node security group must permit incoming traffic on TCP port 9443 from the Kubernetes control plane. This is needed for webhook access.
148
+
Review the [worker nodes security group](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html) docs. Your node security group must permit incoming traffic on TCP port 9443 from the Kubernetes control plane. This is needed for webhook access.
149
149
150
-
If you use [eksctl](https://eksctl.io/usage/vpc-networking/), this is the default configuration.
150
+
If you use [eksctl](https://eksctl.io/usage/vpc-networking/), this is the default configuration.
151
151
152
152
## Add controller to cluster
153
153
@@ -175,7 +175,7 @@ We recommend using the Helm chart to install the controller. The chart supports
175
175
The `helm install` command automatically applies the CRDs, but `helm upgrade` doesn't.
0 commit comments