gateway: externalURL: https://app.example.comimageService: registryStore: s3 registryCredentialProvider: aws registries: s3: bucketName: <your-image-bucket-name> region: <your-aws-region> # keys not needed if using iam with k8s service account accessKey: secretKey: runner: baseImageTag: 0.1.10 baseImageName: beta9-runner baseImageRegistry: public.ecr.aws/n4e0e1y0worker: imageTag: 0.1.95 imageName: beta9-worker imageRegistry: public.ecr.aws/n4e0e1y0 serviceAccountName: <k8s service account to use>storage: mode: juicefs juicefs: awsS3Bucket: <your-juicefs-bucket> # keys not needed if using iam with k8s service account awsAccessKey: awsSecretKey:
To access the S3 bucket that you need to setup and configure in the config/secret, you’ll need to also setup an IAM role that a K8s service account can authenticate with.This is called EKS IRSA. Once you figure this out, you’ll need to add an annotation to the K8s service account that points to their IAM role.Here is an example in the values.yaml file:
We recommend saving secrets with the External Secrets Operator, but you can also create secrets manually in the cluster.To create a secret manually, create your secrets file on disk and run kubectl apply like you would normally.