Skip to content

Commit 9e55e3e

Browse files
authored
Improve docs when running HA on AWS (#121)
1 parent d66855f commit 9e55e3e

File tree

1 file changed

+4
-4
lines changed
  • charts/memgraph-high-availability/aws

1 file changed

+4
-4
lines changed

charts/memgraph-high-availability/aws/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ eksctl create cluster -f cluster.yaml`
2626
```
2727

2828
should be sufficient. Make sure to change the path to the public SSH key if you want to have SSH access to EC2 instances. After creating the cluster, `kubectl` should pick up
29-
the AWS context and you can verify this by running `kubectl config current-context`. My is pointing to `andi.skrgat@test-cluster-ha.eu-west-1.eksctl.io`.
29+
the AWS context and you can verify this by running `kubectl config current-context`. My is pointing to `andi.skrgat@mg-ha.eu-west-1.eksctl.io`.
3030

3131
## Add Helm Charts repository
3232

@@ -51,14 +51,14 @@ kubectl apply -k "github.com/kubernetes-sigs/aws-ebs-csi-driver/deploy/kubernete
5151
Before deploying the cluster, you need to provide access to the NodeInstanceRole. First find the name of the role with
5252

5353
```
54-
aws eks describe-nodegroup --cluster-name test-cluster-ha --nodegroup-name standard-workers
54+
aws eks describe-nodegroup --cluster-name mg-ha --nodegroup-name standard-workers
5555
```
5656

5757
and then provide full access to it:
5858

5959
```
60-
aws iam attach-role-policy --role-name eksctl-test-cluster-ha-nodegroup-s-NodeInstanceRole-<ROLE-ID> --policy-arn arn:aws:iam::aws:policy/AmazonEC2FullAccess
61-
aws iam list-attached-role-policies --role-name eksctl-test-cluster-ha-nodegroup-s-NodeInstanceRole-<ROLE-ID>
60+
aws iam attach-role-policy --role-name eksctl-mg-ha-nodegroup-s-NodeInstanceRole-<ROLE-ID> --policy-arn arn:aws:iam::aws:policy/AmazonEC2FullAccess
61+
aws iam list-attached-role-policies --role-name eksctl-mg-ha-nodegroup-s-NodeInstanceRole-<ROLE-ID>
6262
```
6363

6464
When using `NodePort` services, it is important to create Inbound Rule in the Security Group attached to the eksctl cluster which will allow TCP traffic

0 commit comments

Comments
 (0)