Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Scroll Documents: Update page title prefix

The x-install tool is the newest Exostellar installer designed to simplify the setup process. It offers a variety of subcommands to provision a sandbox environment, install Exostellar products, and verify post-installation readiness.

Prerequisites

Before using the x-install tool, ensure that your environment meets the following requirements:

  • Terraform: Version 1.8+

  • AWS Account: Ensure the following IAM permissions are in place:kubectl: Version 1.28+

  • Helm: Version 3.14.2+

  • AWS CLI

  • AWS Authentication, Credentials, and Region
    Please properly configure AWS authentication and default region in your local environment.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ssm:ListAssociations", "ec2:RunInstances", "ec2:DescribeSubnets", "ec2:DescribeKeyPairs", "ec2:DescribeVpcs", "ec2:DescribeSecurityGroups", "ec2:DescribeSecurityGroupRules", "ec2:AuthorizeSecurityGroupIngress", "ec2:CreateTags", "ec2:CreateSecurityGroup", "sns:ListTopics", "s3:CreateBucket", "iam:AttachRolePolicy", "iam:CreateRole", "iam:ListRoles", "iam:TagRole", "iam:PutRolePolicy", "iam:CreateInstanceProfile", "iam:AddRoleToInstanceProfile", "iam:PassRole
Expand
titleIAM Permissions for the AWS Account
Code Block
AWS Authentication and Credentials Setup Methods

You can set up credentials using various methods such as command-line options, environment variables, assume role, credentials files, configuration files, etc.

  • Command-line Options

    Code Block
    languagebash
    aws configure sso
    Code Block
    languagebash
    aws s3 ls --profile profile1
  • Environment Variables

    Code Block
    languagebash
    export AWS_ACCESS_KEY_ID=<AccessKeyId>
    export AWS_SECRET_ACCESS_KEY=<SecretAccessKey>
    export AWS_SESSION_TOKEN=<SessionToken>
  • Assume role

    Code Block
    aws sts assume-role \
        --role-arn arn:aws:iam::123456789012:role/xaccounts3access \
        --role-session-name s3-access-example
  • Credentials and Configuration File:
    Update in ~/.aws/credentials and ~/.aws/config

    Code Block
    languagebash
    aws configure
Info

Please ensure the default region is set for deployment. If not set above, use the following command:

Code Block
languagebash
aws configure set default.region us-east-2

Ensure the account has the following IAM permissions:

Expand
titleIAM Permissions for the AWS Account
Code Block
languagejson
{
	"Version": "2012-10-17",
	"Statement": [
		{
			"Effect": "Allow",
			"Action": [
				"ssm:ListAssociations",
				"ec2:RunInstances",
				"ec2:DescribeSubnets",
				"ec2:DescribeKeyPairs",
				"ec2:DescribeVpcs",
				"ec2:DescribeSecurityGroups",
				"ec2:DescribeSecurityGroupRules",
				"ec2:AuthorizeSecurityGroupIngress",
				"ec2:CreateTags",
				"ec2:CreateSecurityGroup",
				"sns:ListTopics",
				"s3:CreateBucket",
				"iam:AttachRolePolicy",
				"iam:CreateRole",
				"iam:ListRoles",
				"iam:TagRole",
				"iam:PutRolePolicy",
				"iam:CreateInstanceProfile",
				"iam:AddRoleToInstanceProfile",
				"iam:PassRole",
				"ec2:DescribeInstances",
				"ec2:DescribeInstanceTypes",
				"ec2:RunInstances",
				"ec2:DescribeImages",
				"ec2:DescribeImageAttribute",
				"ec2:DescribeAvailabilityZones",
				"ec2:DescribeAccountAttributes",
				"ec2:DescribeRouteTables",
				"ec2:DescribeNetworkAcls",
				"ec2:DescribeInstanceStatus",
				"ec2:DescribeAddresses",
				"ec2:DescribeDhcpOptions",
				"ec2:DescribeSnapshots",
				"ec2:DescribeVolumes",
				"ec2:DescribeVolumeStatus",
				"ec2:DescribeInstances:DescribeVolumesModifications",
				"cloudwatch:DescribeAlarms",
				"cloudwatch:ListMetrics",
				"iam:ListUsers",
				"ec2iam:DescribeInstanceTypesListAccessKeys",
				"ec2iam:RunInstancesCreateAccessKey",
				"ec2:DescribeImagesAuthorizeSecurityGroupEgress",
				"ec2iam:DescribeImageAttributeListPolicyVersions",
				"ec2eks:DescribeAvailabilityZonesListClusters",
				"ec2eks:DescribeAccountAttributesDescribeCluster",
				"ec2eks:DescribeRouteTablesListNodegroups",
				"ec2eks:DescribeNetworkAclsDescribeNodegroup",
				"ec2eks:DescribeInstanceStatusDescribeAddon",
				"ec2eks:DescribeAddressesListAddons",
				"ec2eks:DescribeDhcpOptionsDescribeIdentityProviderConfig",
				"ec2:DescribeSnapshots"],
				"Resource"ec2:DescribeVolumes "*",
				"ec2:DescribeVolumeStatus"},
		{
			"Effect"ec2:DescribeVolumesModifications "Allow",
				"Action"cloudwatch:DescribeAlarms", [
				"cloudwatchs3:ListMetricsPutObject",
				"iams3:ListUsersGetObject",
				"iam:ListAccessKeys"],
				"Resource"iam:CreateAccessKey "*",
		},
		"ec2:AuthorizeSecurityGroupEgress",{
				"Sid"iam:ListPolicyVersions "Statement1",
				"Effect"eks:ListClusters "Allow",
				"Action"eks:DescribeCluster", [
				"eks:ListNodegroupsCreateCluster",
				"eks:DescribeNodegroupDescribeCluster",
				"eks:DescribeAddonDeleteCluster",
				"eks:ListAddonsListClusters",
				"eks:DescribeIdentityProviderConfigUpdateClusterConfig",
			],
			"Resource": "*"
		}eks:UpdateClusterVersion",
		{
			"Effect": "Alloweks:CreateNodegroup",
				"Action": [eks:DescribeNodegroup",
				"s3eks:PutObjectListNodegroups",
				"s3eks:GetObjectUpdateNodegroupConfig",
				]"eks:UpdateNodegroupVersion",
				"Resource": "arn:aws:s3:::cf-template*"
		}eks:DescribeAddonVersions",
		{
			"Sid": "Statement1eks:CreateAddon",
				"Effect"eks: DeleteAddon"Allow",
				"Action": [eks:DescribeAddon",
				"eks:CreateClusterListAddons",
				"eks:DescribeClusterUpdateAddon",
				"eks:DeleteClusterAccessKubernetesApi",
				"eks:ListClustersListAccessPolicies",
				"eks:UpdateClusterConfigListAccessEntries",
				"eks:UpdateClusterVersionListIdentityProviderConfigs",
				"eks:CreateNodegroupDescribeAccessEntry",
				"eks:DescribeNodegroupListPodIdentityAssociations",
				"eks:ListNodegroupsListAssociatedAccessPolicies",
				"eks:UpdateNodegroupConfigCreateAccessEntry",
				"eks:UpdateNodegroupVersionAssociateAccessPolicy"
			],
				"Resource"eks:DescribeAddonVersions" "*"
		},
		{
			"Effect"eks:CreateAddon "Allow",
				"Action"eks:DeleteAddon", [
				"eksiam:DescribeAddonDeleteRolePolicy",
				"eksiam:ListAddonsDeleteRole",
				"eksiam:UpdateAddonGetRole",
				"eksiam:AccessKubernetesApiListPolicies",
				"eksiam:ListAccessPoliciesListAttachedRolePolicies",
				"eksiam:ListAccessEntriesCreateServiceLinkedRole",
				"eksiam:ListIdentityProviderConfigsRemoveRoleFromInstanceProfile",
				"eksiam:DescribeAccessEntryDeleteInstanceProfile",
				"eksiam:ListPodIdentityAssociationsListEntitiesForPolicy",
				"eksiam:ListAssociatedAccessPoliciesGetInstanceProfile",
				"eksiam:CreateAccessEntryListInstanceProfiles",
				"eksiam:AssociateAccessPolicyListInstanceProfilesForRole",
			],
			"Resource": "*"
		}iam:ListOpenIDConnectProviders",
		{
			"Effect": "Allowiam:GetOpenIDConnectProvider",
				"Actioniam:GetRolePolicy":,
[
				"iamec2:DeleteRolePolicyRevokeSecurityGroupIngress",
				"iamec2:DeleteRoleDeleteSecurityGroup",
				"iamec2:GetRoleStopInstances",
				"iamec2:ListPoliciesTerminateInstances",
				"iamec2:ListAttachedRolePoliciesDescribeVpcAttribute",
				"iamec2:CreateServiceLinkedRoleDescribeTags",
				"iamec2:RemoveRoleFromInstanceProfileDescribeNetworkInterfaces",
				"iamcloudformation:DeleteInstanceProfileDeleteStack",
				"iamec2:ListEntitiesForPolicyRevokeSecurityGroupEgress",
				"iam:GetInstanceProfileListRolePolicies",
				"iam:ListInstanceProfilesCreatePolicy",
				"iam:ListInstanceProfilesForRoleGetPolicy",
				"iamec2:ListOpenIDConnectProvidersDescribeInstanceAttribute",
				"iam:GetOpenIDConnectProviderGetPolicyVersion",
				"iam:GetRolePolicy"],
				"Resource"ec2:RevokeSecurityGroupIngress" "*"
		},
		{
			"Sid"ec2:DeleteSecurityGroup "AdditionalPermissions",
				"Effect"ec2:StopInstances "Allow",
				"Action"ec2:TerminateInstances", [
				"ec2iam:DescribeVpcAttributeDetachRolePolicy",
				"ec2:DescribeTagsCreateVpc",
				"ec2:DescribeNetworkInterfacesDeleteVpc",
				"cloudformationec2:DeleteStackCreateSubnet",
				"ec2:RevokeSecurityGroupEgressDeleteSubnet",
				"iamec2:ListRolePoliciesCreateRouteTable",
				"iamec2:CreatePolicyCreateRoute",
				"iamec2:GetPolicyAssociateRouteTable",
				"ec2:DescribeInstanceAttributeReplaceRouteTableAssociation",
				"iamec2:GetPolicyVersionDeleteRouteTable",
			],
			"Resource": "*"
		}ec2:CreateInternetGateway",
		{
			"Sid"ec2: AttachInternetGateway"AdditionalPermissions",
				"Effect": "Allowec2:AllocateAddress",
				"Action": [ec2:ReleaseAddress",
				"iamec2:DetachRolePolicyCreateNatGateway",
				"ec2:CreateVpcDeleteNatGateway",
				"ec2cloudformation:DeleteVpcUpdateStack",
				"ec2cloudformation:CreateSubnetDeleteChangeSet",
				"ec2cloudformation:DeleteSubnetDescribeChangeSet",
				"ec2cloudformation:CreateRouteTableExecuteChangeSet",
				"ec2cloudtrail:CreateRouteDescribeTrails",
				"ec2cloudtrail:AssociateRouteTableGetTrailStatus",
				"ec2cloudtrail:ReplaceRouteTableAssociationGetEventSelectors",
				"ec2logs:DeleteRouteTableDescribeLogGroups",
				"ec2logs:CreateInternetGatewayDescribeLogStreams",
				"ec2logs:AttachInternetGatewayGetLogEvents",
				"ec2logs:AllocateAddressFilterLogEvents",
				"ec2iam:ReleaseAddressGetUserPolicy",
				"ec2iam:CreateNatGatewayGetGroupPolicy",
				"ec2iam:DeleteNatGatewayGetPolicyVersion",
				"cloudformationec2:UpdateStackCreateLaunchTemplate",
				"cloudformationec2:DeleteChangeSetDescribeLaunchTemplates",
				"cloudformationec2:DescribeChangeSetDescribeInternetGateways",
				"cloudformationec2:ExecuteChangeSetModifyVpcAttribute",
				"cloudtrailec2:DescribeTrailsModifySubnetAttribute",
				"cloudtrailec2:GetTrailStatusDescribeNatGateways",
				"cloudtrailec2:GetEventSelectorsDescribeInstanceTypeOfferings",
				"logsec2:DescribeLogGroupsDescribeEgressOnlyInternetGateways",
				"logsec2:DescribeLogStreamsDescribeLaunchTemplateVersions",
				"logsec2:GetLogEventsDeleteLaunchTemplate",
				"logseks:FilterLogEventsTagResource",
				"iamelasticloadbalancing:GetUserPolicyCreateLoadBalancer",
				"iamelasticloadbalancing:GetGroupPolicyDescribeLoadBalancers",
				"iamelasticloadbalancing:GetPolicyVersionDeleteLoadBalancer",
				"ec2elasticloadbalancing:CreateLaunchTemplateCreateTargetGroup",
				"ec2elasticloadbalancing:DescribeLaunchTemplatesDescribeTargetGroups",
				"ec2elasticloadbalancing:DescribeInternetGatewaysRegisterTargets",
				"ec2autoscaling:ModifyVpcAttributeCreateAutoScalingGroup",
				"ec2autoscaling:ModifySubnetAttributeUpdateAutoScalingGroup",
				"ec2autoscaling:DescribeNatGatewaysDeleteAutoScalingGroup",
				"ec2autoscaling:DescribeInstanceTypeOfferingsDescribeAutoScalingGroups",
				"ec2autoscaling:DescribeEgressOnlyInternetGatewaysDescribeScalingActivities",
				"ec2cloudformation:DescribeLaunchTemplateVersionsDescribeChangeSet",
				"ec2cloudformation:DeleteLaunchTemplateExecuteChangeSet",
				"ekss3:TagResourceCreateBucket",
				"elasticloadbalancings3:CreateLoadBalancerDeleteBucket",
				"elasticloadbalancings3:DescribeLoadBalancersListBucket",
				"elasticloadbalancings3:DeleteLoadBalancerGetBucketLocation",
				"elasticloadbalancings3:CreateTargetGroupGetBucketPolicy",
				"elasticloadbalancings3:DescribeTargetGroupsPutBucketPolicy",
				"elasticloadbalancingaws-marketplace:RegisterTargetsViewSubscriptions",
				"autoscalingec2:CreateAutoScalingGroupDescribeKeyPairs",
				"autoscalingec2:UpdateAutoScalingGroupCreateKeyPair"
			],
				"Resource"autoscaling:DeleteAutoScalingGroup "*",
				"autoscaling:DescribeAutoScalingGroups",
				"autoscaling:DescribeScalingActivities",
				"cloudformation:DescribeChangeSet",
				"cloudformation:ExecuteChangeSet",
				"s3:CreateBucket",
				"s3:DeleteBucket",
				"s3:ListBucket",
				"s3:GetBucketLocation",
				"s3:GetBucketPolicy",
				"s3:PutBucketPolicy"
			],
			"Resource": "*"
		}
	]
}}
	]
}
Expand
titleSSH Key Creation

Use the following command to create a new SSH key pair:

Code Block
languagebash
aws ec2 create-key-pair --key-name 'my-dev-key' --query 'KeyMaterial' --output text --region us-east-2 > my-dev-key.pem

Modify the permission to secure the key:

Code Block
languagebash
chmod 400 my-dev-key.pem 
  • x-install tool: Version 0.0.10+

Expand
title

...

x-install

...

Download Options

Platform

Architecture

File

Release Date

macOS

ARM64

View file
namex-install-darwin-arm64-.0.0.10.tar.gz

macOS

x86_64

View file
namex-install-darwin-x86_64-.0.0.10.tar.gz

Linux

ARM64

View file
namex-install-linux-arm64-.0.0.10.tar.gz

Linux

i386

View file
namex-install-linux-i386-.0.0.10.tar.gz

Linux

x86_64

View file
namex-install-linux-x86_64-.0.0.10.tar.gz

Windows

ARM64

View file
namex-install-windows-arm64-.0.0.10.zip

Windows

i386

View file
namex-install-windows-i386-.0.0.10.zip

Windows

x86_64

View file
namex-install-windows-x86_64-.0

...

.0.10.zip

Info

For macOS users, please grant x-install permissions by clicking the “Allow Anyway” button in the Security settings. This button is available for about an hour after you try to open the app. You can access the Security settings by choosing Apple Menu System Settings, then clicking Privacy & Security in the sidebar.

Installation Steps

1. Create a Standalone Stack

Use Go to the directory where x-install is downloaded and use the following command to create a standalone stack:

(Please modify the stack name, VPC CIDR, SSH key pair, and region to suit your environment.)

Code Block
languagebash
x-install create-standalone \
  --stack-name=xio-standalone \
  --vpc-cidr=10.0.0.0/16 \
  --ssh-key-pair-name=my-dev-key \
  --region=us-east-2
  • The new VPC and EKS cluster will inherit the stack name.

  • The VPC will be assigned the CIDR block 10.0.0.0/16.

  • The EC2 SSH key pair, my-dev-key, will be used to access the Exostellar Management Server.

2. Verify Post-Installation Readiness

After the standalone stack is successfully created, use the following command to check if the stack is ready:

...

Info

It might take a few attempts for post-install to pass all system units and containers readiness checks, due to infrastructure readiness latency.

3. Add an X-Compute Node to the Standalone EKS Cluster

To add an X-Compute node to the newly created standalone EKS cluster, first SSH into the Exostellar Management Server:

...

Tip

The new node can be verified using the kubectl command:

Code Block
kubectl get node -l eks.amazonaws.com/nodegroup=x-compute

Please ensure ~/.kube/config is set up properly. It takes a couple of minutes for the x-compute node to boot and show up.

...

By default, the EKS token used to access the standalone EKS cluster expired after 60 minutes. Following that, all attempts to access the cluster will fail with Unauthorized errors.

To generate a new EKS token and use it with your existing kubeconfig file, run:

Code Block
languagebash
x-install update-kubeconfig --stack-name=xio-standalone

4. Clean Up

Once the free trial period is over, the entire standalone stack can be deleted with the destroy command:

...

Info

In some cases, Terraform might time out during the destroy process. If this happens, simply re-run the command to allow Terraform to reconcile its final state.

At this time, all controllers and workers EC2 instances need to be manually terminated.

Additional Help and Support

To explore other subcommands, use the following command for a list of available options:

...