generated from amazon-archives/__template_MIT-0
-
Notifications
You must be signed in to change notification settings - Fork 31
feat: Add EKS capabilities integration #442
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
allamand
wants to merge
77
commits into
main
Choose a base branch
from
feat/eks-capabilities-integration
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
62f5f5b to
b19a134
Compare
…yment scripts - Add EKS cluster Terraform configuration updates - Add Identity Center Terraform module for IAM integration - Update deployment scripts with force-unlock helper - Add hub-config.yaml changes for EKS capabilities - Update ArgoCD and secrets Terraform configurations - Add EKS Capabilities ArgoCD setup documentation
…yment scripts - Add EKS cluster Terraform configuration updates - Add Identity Center Terraform module for IAM integration - Update deployment scripts with force-unlock helper and state lock management - Add hub-config.yaml changes for EKS capabilities - Update ArgoCD and secrets Terraform configurations - Add EKS Capabilities ArgoCD setup documentation - Add multi-acct EKS capabilities RBAC and IAM role selectors - Keep spark_operator enabled
- Disable ArgoCD client creation (using EKS Marina managed ArgoCD) - Remove ARGOCD_SESSION_TOKEN from keycloak-clients secret - Add AWS Secrets Manager ClusterSecretStore for platform secrets - Add Keycloak split-brain detector CronJob for cluster health monitoring
- Change destination server from hardcoded kubernetes.default.svc to {{server}} template
- Enables proper multi-cluster fleet management
- Switch from ARGOCD_SESSION_TOKEN (keycloak-clients) to ARGOCD_AUTH_TOKEN (cluster secrets) - Aligns with EKS Marina managed ArgoCD authentication
Signed-off-by: user1 <[email protected]>
- Remove ARGOCD_AUTH_TOKEN from external secret configuration - Backstage will use OIDC authentication instead of token-based auth
- Remove stuck operation before clearing operation state - Simplify revision conflict fix by clearing operation first
- Skip apps that are already Healthy and Synced - Only recover apps with truly stuck operations (Running >5min) - Prevent unnecessary recovery attempts on healthy apps
- Revert to checking both stuck operations and Progressing status - Restore simpler condition for stuck app detection
- Add detection of stale operations (finishedAt exists but phase=Running) - Clear stale operation state without unnecessary retries - Fix revision conflict handling to sync to HEAD - Improve output to show finished timestamp for better debugging
…fests - Add HuggingFace model download documentation - Add Kro resource group for HuggingFace model management - Add platform manifest template for HuggingFace models - Update addons configuration - Update GitLab initialization script - Remove deprecated platform-manifests values.yaml
- Update addons configuration for platform manifests - Enhance Argo Workflows installation template - Improve CICD pipeline Kro resource group - Refine HuggingFace model resource group - Update cluster secret store configuration - Configure Spark operator values
…epools - Comment out compute_config in Terraform to disable Auto Mode default nodepools - Enable customNodepools in platform-manifests values - Custom nodepools provide more control over instance types, taints, and disruption policies
e0ee763 to
5c4efb0
Compare
- Add recover_stuck_workflows() function to detect and delete workflows stuck > 15min - Integrate into wait_for_sync_wave_completion() to run every 30s - Prevents cascading failures when workflows hang (e.g., mysql-setup-workflow) - Allows ArgoCD to automatically recreate workflows after deletion
- Add second SecurityGroupIngressRule referencing EKS cluster SG - Extract cluster_security_group_id from VPC secret - Add clusterSecurityGroupId to Crossplane EnvironmentConfig - Ensures reliable pod-to-RDS connectivity without manual SG fixes
Signed-off-by: Workshop User <[email protected]>
…yment scripts - Add EKS cluster Terraform configuration updates - Add Identity Center Terraform module for IAM integration - Update deployment scripts with force-unlock helper - Add hub-config.yaml changes for EKS capabilities - Update ArgoCD and secrets Terraform configurations - Add EKS Capabilities ArgoCD setup documentation
…yment scripts - Add EKS cluster Terraform configuration updates - Add Identity Center Terraform module for IAM integration - Update deployment scripts with force-unlock helper and state lock management - Add hub-config.yaml changes for EKS capabilities - Update ArgoCD and secrets Terraform configurations - Add EKS Capabilities ArgoCD setup documentation - Add multi-acct EKS capabilities RBAC and IAM role selectors - Keep spark_operator enabled
- Disable ArgoCD client creation (using EKS Marina managed ArgoCD) - Remove ARGOCD_SESSION_TOKEN from keycloak-clients secret - Add AWS Secrets Manager ClusterSecretStore for platform secrets - Add Keycloak split-brain detector CronJob for cluster health monitoring
- Change destination server from hardcoded kubernetes.default.svc to {{server}} template
- Enables proper multi-cluster fleet management
Signed-off-by: user1 <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Sébastien Allamand <[email protected]>
Signed-off-by: Sébastien Allamand <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Sébastien Allamand <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: user1 <[email protected]>
Signed-off-by: Workshop User <[email protected]>
hmuthusamy
reviewed
Feb 11, 2026
| ARGOCD_URL="$ARGOCD_SERVER_URL" | ||
| print_info "Using EKS-managed ArgoCD URL: $ARGOCD_URL" | ||
| else | ||
| ARGOCD_URL="https://$DOMAIN_NAME/argocd" |
Collaborator
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@allamand Are we still setting up argocd during initial bootstrap? Do we need to set this condition with capabilities enabled?
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: user1 <[email protected]>
Signed-off-by: user1 <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
…if 1 nginx pod or if 2 are in same AZ Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issue #, if available:
Description of changes:
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.