Skip to content

Conversation

allamand
Copy link

@allamand allamand commented Aug 30, 2025

This is Macro PR that will be used as a target for any changes needed to update workshop structure, with our RIV25 target.

When all work will be done, this PR could be then merged

@allamand allamand marked this pull request as draft August 30, 2025 19:35
Workshop User and others added 29 commits October 6, 2025 21:23
- Add kubevela-components: enabled: true to control-plane addons.yaml
- This will create the ApplicationSet for KubeVela components deployment
Signed-off-by: Workshop User <[email protected]>
- Add provider-aws-iam and provider-aws-eks to providers.yaml
- Required for KubeVela dp-service-account component to work
- Fixes rust application service account creation issues
- Update dp-service-account, dynamodb-table, and component-iam-policy
- Change from default ProviderConfig to provider-aws-config
- Fixes Crossplane resource creation issues
- Add IAM role and pod identity association for provider-aws service account
- Add cluster name to crossplane-aws valuesObject
- Fixes AWS credentials issue for Crossplane providers
- Add crossplane_provider_aws_pod_identity module to pod-identity.tf
- Add enable_crossplane to aws_addons local in main.tf
- Enable crossplane in dev.tfvars
- Creates IAM role and pod identity association for Crossplane providers
- Fixes AWS credentials issue for Crossplane providers
- Remove ack_s3_pod_identity and ack_dynamodb_pod_identity modules
- These controllers already have pod identities from the old approach in main.tf
- Fixes ResourceInUseException conflicts during Terraform apply
- Keeps only crossplane_provider_aws_pod_identity module
- Remove pod-identity.yaml from crossplane-aws chart
- Use only Terraform-managed pod identity association
- Fixes circular dependency issue where Crossplane tries to create its own pod identity
- Change from PowerUserAccess to AdministratorAccess policy
- PowerUserAccess excludes IAM management permissions
- Crossplane needs full IAM permissions to create roles and policies
- Change from modernengg-dev to peeks-spoke-dev
- Fixes pod identity association creation error
- ResourceNotFoundException: No cluster found for name: modernengg-dev
- Create ClusterSecretStore with consistent naming (matches hub cluster)
- Uses external-secrets-sa service account with pod identity
- Fixes ExternalSecret connectivity to AWS Secrets Manager
- Applied at environment level for all dev clusters
- Create platform-manifests Helm chart with ClusterSecretStore template
- Add platform-manifests section to addons.yaml with metadata annotations
- Enable platform-manifests in control-plane environment
- Creates aws-secrets-manager ClusterSecretStore for external-secrets
- Add enable_platform_manifests to addons_metadata in main.tf
- Enable platform_manifests in dev.tfvars
- This will create the ArgoCD application for platform-manifests
- Add enable_platform_manifests: 'true' to fleet-spoke-dev labels
- This will trigger ApplicationSet to create platform-manifests application
- Creates aws-secrets-manager ClusterSecretStore for external-secrets
…sitory

- Use path pattern like other local charts (gitlab example)
- Remove chartName and releaseName fields
- Fixes template execution error for addonChartRepository
Signed-off-by: Workshop User <[email protected]>
- Add workload.type: autodetects for non-workload resources
- Fixes 'spec.workload: Required value' validation error
- Create both aws-secrets-manager and secrets-manager-cs
- Ensures compatibility with existing ExternalSecrets
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
hmuthusamy and others added 30 commits October 9, 2025 14:08
incfrease gitlab timeout in cloudfront
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Sebastien Allamand <[email protected]>
Co-authored-by: Sebastien Allamand <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Sébastien Allamand <[email protected]>
* recalculate argo url at each loop

Signed-off-by: Sébastien Allamand <[email protected]>

* fix: improve terraform robustness for gitlab service deployment

- Add 15m timeouts to kubernetes_service resource
- Implement exponential backoff retry logic
- Reduce parallelism to prevent API rate limiting
- Addresses timeout issues in CodeBuild environments

* fix: restore parallelism=3 for cluster creation performance

* clean repo

Signed-off-by: Sébastien Allamand <[email protected]>

---------

Signed-off-by: Sébastien Allamand <[email protected]>
Co-authored-by: Hari Muthusamy <[email protected]>
Only 'create' timeout is supported for kubernetes_service resource
Prevents naming conflicts when deploying multiple stacks
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Fix terraform and add usage telemetry
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants