Skip to content

Commit 02de5bf

Browse files
authored
Merge pull request #67839 from AedinC/OSDOCS-8727
OSDOCS#8727:QE and Style Revisions of MOBB Content for Using AWS controllers for Kubernetes (ACK) on ROSA
2 parents d4f22b9 + 93a6cd6 commit 02de5bf

File tree

1 file changed

+22
-11
lines changed

1 file changed

+22
-11
lines changed

cloud_experts_tutorials/cloud-experts-using-aws-ack.adoc

Lines changed: 22 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,22 +18,24 @@ toc::[]
1818
// - Connor Wooley
1919
//---
2020

21-
link:https://aws-controllers-k8s.github.io/community/[AWS Controllers for Kubernetes] (ACK) lets you define and use AWS service resources directly from {product-title} (ROSA). With ACK, you can take advantage of AWS-managed services for your applications without needing to define resources outside of the cluster or run services that provide supporting capabilities like databases or message queues within the cluster.
21+
link:https://aws-controllers-k8s.github.io/community/[AWS Controllers for Kubernetes] (ACK) lets you define and use AWS service resources directly from {product-title} (ROSA). With ACK, you can take advantage of AWS-managed services for your applications without needing to define resources outside of the cluster or run services that provide supporting capabilities such as databases or message queues within the cluster.
2222

23-
Users can install various ACK Operators directly from OperatorHub. This makes it relatively easy to get started and start using it with your applications. This controller is a component of the AWS Controller for Kubernetes project. This project is currently in developer preview.
23+
You can install various ACK Operators directly from OperatorHub. This makes it easy to get started and use the Operators with your applications. This controller is a component of the AWS Controller for Kubernetes project, which is currently in developer preview.
2424

25-
This tutorial shows you how to use the ACK S3 Operator as an example, but can be adapted for any other ACK Operator in the OperatorHub of your cluster.
25+
Use this tutorial to deploy the ACK S3 Operator. You can also adapt it for any other ACK Operator in the OperatorHub of your cluster.
2626

27+
[id="cloud-experts-using-aws-ack-prerequisites"]
2728
== Prerequisites
2829

2930
* A ROSA cluster
3031
* A user account with `cluster-admin` privileges
31-
* You have access to the OpenShift CLI (`oc`)
32-
* You have access to the AWS CLI (`aws`)
32+
* The OpenShift CLI (`oc`)
33+
* The Amazon Web Services (AWS) CLI (`aws`)
3334

34-
=== Environment Setup
35+
[id="cloud-experts-using-aws-ack-environment-setup"]
36+
== Setting up your environment
3537

36-
. Configure the following environment variables:
38+
. Configure the following environment variables, changing the cluster name to suit your cluster:
3739
+
3840
[source,terminal]
3941
----
@@ -47,12 +49,18 @@ $ export POLICY_ARN=arn:aws:iam::aws:policy/AmazonS3FullAccess
4749
$ export AWS_PAGER=""
4850
$ export SCRATCH="/tmp/${ROSA_CLUSTER_NAME}/ack"
4951
$ mkdir -p ${SCRATCH}
52+
----
53+
. Ensure all fields output correctly before moving to the next section:
54+
+
55+
[source,terminal]
56+
----
5057
$ echo "Cluster: ${ROSA_CLUSTER_NAME}, Region: ${REGION}, OIDC Endpoint: ${OIDC_ENDPOINT}, AWS Account ID: ${AWS_ACCOUNT_ID}"
5158
----
5259

53-
== Prepare AWS Account
60+
[id="cloud-experts-using-aws-ack-prep-aws"]
61+
== Preparing your AWS Account
5462

55-
. Create an AWS IAM trust policy for the ACK Operator:
63+
. Create an AWS Identity Access Management (IAM) trust policy for the ACK Operator:
5664
+
5765
[source,terminal]
5866
----
@@ -95,7 +103,8 @@ $ aws iam attach-role-policy --role-name "ack-${ACK_SERVICE}-controller" \
95103
--policy-arn ${POLICY_ARN}
96104
----
97105

98-
== Install the ACK S3 Controller
106+
[id="cloud-experts-using-aws-ack-install-ack"]
107+
== Installing the ACK S3 Controller
99108

100109
. Create a project to install the ACK S3 Operator into:
101110
+
@@ -183,6 +192,7 @@ NAME READY STATUS RESTARTS AGE
183192
ack-s3-controller-585f6775db-s4lfz 1/1 Running 0 51s
184193
----
185194

195+
[id="cloud-experts-using-aws-ack-valid-deploy"]
186196
== Validating the deployment
187197

188198
. Deploy an S3 bucket resource:
@@ -213,6 +223,7 @@ $ aws s3 ls | grep ${CLUSTER_NAME}-bucket
213223
2023-10-04 14:51:45 mrmc-test-maz-bucket
214224
----
215225

226+
[id="cloud-experts-using-aws-ack-clean-up"]
216227
== Cleaning up
217228

218229
. Delete the S3 bucket resource:
@@ -239,4 +250,4 @@ $ aws iam delete-role \
239250
[source,terminal]
240251
----
241252
$ oc delete project ack-system
242-
----
253+
----

0 commit comments

Comments
 (0)