Skip to content

doc update for non-EKS installs #1979

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 6, 2021
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 9 additions & 2 deletions docs/deploy/installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,13 @@
!!!note "Security updates"
The controller doesn't receive security updates automatically. You need to manually upgrade to a newer version when it becomes available.

!!!note "non-EKS cluster"
You can run the controller on a non-EKS cluster, for example kops or vanilla k8s. Here are the things to consider -

- In lieu of IAM for service account, you will have to manually attach the IAM permissions to your worker nodes IAM roles
- Ensure subnets are tagged appropriately for auto-discovery to work
- For IP targets, pods must have IPs from the VPC subnets. You can configure `amazon-vpc-cni-k8s` plugin for this purpose.

## IAM Permissions

#### Setup IAM role for service accounts
Expand Down Expand Up @@ -44,15 +51,15 @@ The IAM permissions can either be setup via IAM roles for ServiceAccount or can
--override-existing-serviceaccounts \
--approve
```
Setup IAM manually
#### Setup IAM manually
If not setting up IAM for ServiceAccount, apply the IAM policies from the following URL at minimum.
```
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.1.3/docs/install/iam_policy.json
```
## Add Controller to Cluster

!!!note "Use Fargate"
If you want to run it in Fargate, use Helm that does not depend on cert-manager.
If you want to run the controller on Fargate, use Helm chart since it does not depend on the cert-manager.

=== "Via Helm"

Expand Down