Replies: 12 comments 19 replies
-
Hi @mwengren, Nebari supports existing AWS subnets, by passing the associated security group ID and existing subnet IDs in the Here's an example of how that can be set in the config:
I am c.c. @aktech @Adam-D-Lewis as both have more experience with AWS deployments, and Adam worked on adding support for this |
Beta Was this translation helpful? Give feedback.
-
@viniciusdc When I add the
Do I need a custom validation configuration as well? |
Beta Was this translation helpful? Give feedback.
-
The syntax is as following: amazon_web_services:
existing_subnet_ids:
- subnet-xxxxxxxxxxxx
- subnet-yyyyyyyyyyyy
existing_security_group_id: sg-kkkkkkkkkkkk |
Beta Was this translation helpful? Give feedback.
-
I figured out the answer to the nebari-config.yaml question above, however I'm hitting an issue in the deployment process. This is the YAML config I used to override and use my existing subnets (same as above but without the
Adding these resulted in the Nebari deploy starting. Is the purpose of the Security Group documented anywhere? I found this part of the TF code that both the Asking because it's not clear to me why my
Looking in the AWS console it appears the desired size of the general node group is 1, so presumably it failed when the instance failed to join, which must be security group or other permission-related issue? Thanks for any advice! |
Beta Was this translation helpful? Give feedback.
-
I've tried redeploying a few times but each time the node instance (which is created successfully as m52xlarge type per nebari-config.yml) isn't able to join the
It's odd because I have AdministratorAccess role for my account which appears to have full access as far as I can tell for IAM permissions, so I'm not sure where to go to troubleshoot further. Are there other common reasons why the instance might not be able to connect to the node group? Thanks in advance! |
Beta Was this translation helpful? Give feedback.
-
Unfortunately we don't yet have a complete list of the permissions required
yet. It is on our todo list but no one has picked it up yet. If you have
access to cloudtrail that will tell you what permissions are missing as you
will see permission denied errors there. All that being said, please feel
free to create an issue about the minimal permissions. People creating
issues is one of the things that we use when prioritizing issues.
…On Tue, Apr 29, 2025, 7:17 PM Micah Wengren ***@***.***> wrote:
@dcmcand <https://github.com/dcmcand> That is some of the best news I've
heard in awhile, thanks! I will take a look at the branch & documentation
and give it a try.
If you know of any info or documentation about required permissions to
successfully deploy Nebari on AWS (without account-wide admin rights), that
would be really helpful for my situation. I've already found #1366
<#1366> which addresses
that somewhat, but since it's > 2 years old I thought the situation might
have changed and I couldn't find specific permissions or a policy available
anywhere in the Nebari docs.
I still think I'm running into limits of my permission set when I try to
deploy in my existing VPC/account related to the k8s 'general' cluster and
the instance join error.
—
Reply to this email directly, view it on GitHub
<#2559 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABPVTR3X6Z43FHU6IG4OSPL236X4NAVCNFSM6AAAAAB4BENLFOVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTEOJYGM3TAMI>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Yep that's it. Checkout the branch and `pip install .`
…On Wed, Apr 30, 2025, 8:47 PM Micah Wengren ***@***.***> wrote:
@dcmcand <https://github.com/dcmcand> Can you help me out as far as how
to use Nebari from a git branch like the one you suggested? Is it just a
process like:
- clone https://github.com/nebari-dev/nebari locally to my install
server
- git checkout aws-no-public-ip-by-default
- pip install -e .
Or is there a better/recommended way I'm missing? Thanks!
—
Reply to this email directly, view it on GitHub
<#2559 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABPVTR6XHJ67VQC7KHFAGFD24ELELAVCNFSM6AAAAAB4BENLFOVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTEOJZG43DKNQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
@dcmcand I've looked over the changes in https://github.com/nebari-dev/nebari/tree/aws-no-public-ip-by-default and generally it looks fairly similar to our existing network layout (as I described above) with a few differences:
I also see in your branch that there are additional endpoints created in the network module (presumably for the private subnets to access external AWS services that are needed?): My main question is how to make Nebari work for my situation, which requires using existing VPC and networking resources in my account? I can't deploy Nebari's network module as is, essentially. So, as a result, the testing I've done involves passing both I see two options:
I think 2 would be possible but I'm still not sure if my overall architecture is likely to work for Nebari or not with the VPGW and other factors like the 1:2 public:private subnet architecture. Either way, I'm sure it'll take more testing. Appreciate any guidance, thx! |
Beta Was this translation helpful? Give feedback.
-
This is a rough-cut edit of some of the relevant TF files in the main and network modules to illustrate what I mean: https://github.com/mwengren/nebari/tree/mw-aws-no-public-ip I haven't run this to test and I'm sure I missed some things, but hopefully this gets the idea across of what I had in mind for Option 2 above. |
Beta Was this translation helpful? Give feedback.
-
@dcmcand I've reached a point where my EKS cluster is deployed successfully, but I'm running into a problem where the EKS OIDC provider doesn't seem to be properly created. Here's the error message from
I checked in the console and a previous deploy I'd ran successfully created the Googling led me two a few good posts about the same/similar problem, but I was hoping this had been encountered by someone else previously who could point me in the right direction. These posts mostly describe my problem:
I think it's failing before the From post 2 above, the EKS VPC endpoint might be the culprit, not sure. Looking in AWS Console, my EKS cluster includes the OpenID Connect Provider with the same URL as above, so it seems it's created properly from EKS' standpoint. I'm also wondering if a failed manual cleanup from a previous Is there an inventory or resources to clean up when |
Beta Was this translation helpful? Give feedback.
-
I've reached the I'm getting a timeout here:
My best guess is that it's hung up on Digging around the docs, I found the ingress config section. Do I need to specify an IP address for I also had a hard time identifying what parameters are passed to the Also, for testing purposes, I created a Route 53 private hosted zone that I'll use in the Presently, I have no value for For now, I'm assuming a blank value doesn't work for The docs are helpful, but the answers I need seem to be in several places and it's a little hard to diagnose, Any advice appreciated! |
Beta Was this translation helpful? Give feedback.
-
@viniciusdc Thanks. The security group suggestion made me revisit the settings I was using in AWS, and I'm hoping that will lead somewhere. Early on when testing this, I manually created a security group in the AWS console to test with, primarily because in the infrastructure module, as written currently, the only way to trigger the I noticed when checking my SG rules, which I tried to match against those in https://github.com/nebari-dev/nebari/blob/main/src/_nebari/stages/infrastructure/template/aws/modules/network/main.tf#L51-L75, I inadvertently selected 'All TCP' rather than 'All traffic'. So, I'm going to try to redeploy and see if this helps things. Will report back. However, I like the way I've modified the TF code in my development branch - at least for my situation, it is more flexible and allows a user to pass existing resources they don't want created in TF (existing public/private subnets and security group id), and Nebari TF adapts to use them accordingly, and removes the Obviously, it doesn't work yet for me, and I can only test it for my existing set up, but it gets me a lot closer to being able to use Nebari in my AWS environment than the code currently in main. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We have some particular networking/security requirements that compel us to use a pre-existing VPC and associated public/private subnets in our AWS account. Similarly, we can't create new InternetGateway (IGW) in our public subnet, we must use an existing networking setup for outgoing traffic out of AWS to our network or for any public traffic.
Is there a way to configure such a deployment by editing the nebari-config.yaml file appropriately? Essentially to pass IDs for existing AWS resources (VPC, subnet, etc) for Nebari to deploy components to? I can't find documentation for this type of deployment scenario in the Nebari docs, so I assume it would require some manual editing of Nebari internals beyond just the options provided in nebari-config?
TIA!
Beta Was this translation helpful? Give feedback.
All reactions