You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-4Lines changed: 2 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ This repository assumes you have a new AWS account and wish to test Spinnaker ou
32
32
3. Navigate to CodeBuild
33
33
4. Start the create-eks CodeBuild project
34
34
5. Create a security group in the EKS-VPC to lock-down the Spinnaker load balancers take note of the security group id.
35
-
6. Start the deploy-spinnaker CodeBuild project, fill in the environment variable "SECURITY_GROUP_ID" with the security group id from the previous step
35
+
6. Start the deploy-spinnaker CodeBuild project, fill in the environment variable "SECURITY_GROUP_ID" with the security group id from the previous step (replacing the "false" default)
36
36
37
37
Spinnaker will be available at the UI/Deck address emitted at the end of the deploy-spinnaker CodeBuild job.
38
38
@@ -55,9 +55,7 @@ Once it is downloaded you can run kubectl commands as normal to read and output
55
55
56
56
# Exposing Services
57
57
58
-
See the [buildspec section](#modifying-buildspec-for-authentication-and-security-groups) for some supplemental information.
59
-
60
-
The code in this repository will create two load balancers using the EKS and EC2 integrations, these services are created in the deploy_spinnaker.sh. When created these load balancers are open to the world, so there are few flags in the deploy_spinnaker.sh to give you options on locking down the security groups, the flags in this example will apply the security group specified in the deploy_spinnaker.sh script to the load balancers to lock down load balancers.
58
+
There are two methods in this repository that can expose the Spinnaker services on load balancers, one uses a user-provided security group that is locked down. These are controlled via environment variables in the deploy-spinnaker CodeBuild project. The second method is using SSM to store security information that can be used to lock down the Spinnaker installation even further. See details in the deploy_spinnaker.sh script.
0 commit comments