AWS
AWS is the canonical managed-cloud path when you want to run Supernode on EKS.
Prerequisites
- an AWS account with permissions for EKS, IAM, VPC resources, and node groups
- working AWS credentials on the machine running bootstrap
- permission to install CLIs locally
Validate credentials before you start:
aws sts get-caller-identityThe provider flow installs missing dependencies including aws, eksctl, kubectl, and helm.
Canonical flow
cd bootstrap./bootstrap.sh \ --provider aws \ --version 0.2.1If you do not provide --values, the bootstrap flow uses bootstrap/aws/values.yml.
What the AWS provider does
The AWS bootstrap path:
- creates or reuses an EKS cluster
- updates local kubeconfig
- enables the EBS CSI driver add-on
- creates an EBS-backed
StorageClass - installs the Supernode control-plane
Canonical production pattern for Vault
On AWS, the preferred Supernode operating model is:
- keep the shared control-plane enabled
- run Vault with
awskmsauto-unseal - use IAM-backed pod identity such as IRSA instead of static credentials
Start from the control-plane AWS example values:
cd bootstrap./bootstrap.sh \ --provider aws \ --version 0.2.1 \ --values ../extensions/control-plane/examples/aws-values.yamlAfter bootstrap, finish the IAM and Vault steps:
- bind the Vault service account to IAM that can use the chosen KMS key
- wait for the Vault StatefulSet to come up
- initialize Vault once if you are not using dev mode
- run
extensions/control-plane/scripts/post_install.sh
Validate the environment
kubectl config current-contextkubectl -n control-plane get podskubectl get storageclassWhen to use AWS
Choose AWS when you want:
- a managed Kubernetes control-plane
- EBS-backed persistence for Supernode workloads
- an opinionated Vault-on-KMS operating model
- a production-oriented deployment target for Cardano or partner-chain workloads