You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For additional guidelines on configuring ingress and DNS, see [Considerations for Kubernetes Distributions](https://cloud.ibm.com/docs/blockchain-sw-252?topic=blockchain-sw-252-deploy-k8#console-deploy-k8-considerations).
300
301
301
302
303
+
### Self-provisioned Kubernetes on AWS + ECR
304
+
305
+
- This will push the chaincode images to AWS ECR (private authenticated container registry).
306
+
- It will use AWS CLI for ECR related operations like login and push.
307
+
- The same image will then be pulled from ECR by the chaincode deployed in `test-network` k8s namespace.
308
+
309
+
**Prerequisites**:
310
+
- All steps in [#EKS](#eks).
311
+
- Make sure the AWS profile is configured with the correct AWS region and credentials for [aws-cli](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html).
312
+
- You could use `AmazonEC2ContainerRegistryFullAccess` for relaxed access, but this is not recommended.
313
+
- Refer to [ECR related AWS managed policies](https://docs.aws.amazon.com/AmazonECR/latest/userguide/security-iam-awsmanpol.html) for more information.
314
+
- ECR repo as exported below under env var `TEST_NETWORK_AWS_ECR_REPO` exists in the correct region.
315
+
316
+
And for ECR based container registry, export:
317
+
318
+
```sh
319
+
export TEST_NETWORK_CHAINCODE_REGISTRY="ecr"
320
+
export TEST_NETWORK_AWS_PROFILE="default"
321
+
export TEST_NETWORK_AWS_ACCOUNT="999999999999"
322
+
export TEST_NETWORK_AWS_ECR_REPO="chaincodes"
323
+
```
324
+
325
+
For using this ECR registry with Kubernetes, create a secret in `test-network` namespace within your cluster:
326
+
327
+
```sh
328
+
export AWS_REGION=$(aws configure get region --profile ${TEST_NETWORK_AWS_PROFILE})
0 commit comments