lifecycle: move AWS CFN generation to lifecycle and fix CI (#12743)
* fix missing min_healthy_percent which was causing an error on stdout...sigh Signed-off-by: Jens Langhammer <jens@goauthentik.io> * disable version reporting (replaces deleting BootstrapVersion) Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont generate bootstrap thing Signed-off-by: Jens Langhammer <jens@goauthentik.io> * aaand remove fix_template Signed-off-by: Jens Langhammer <jens@goauthentik.io> * always set CI to false so errors are sent to stderr Signed-off-by: Jens Langhammer <jens@goauthentik.io> * move aws stuff to lifecycle Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing package-lock Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix package Signed-off-by: Jens Langhammer <jens@goauthentik.io> * cleanup website structure Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
34
website/docs/install-config/install/aws.md
Normal file
34
website/docs/install-config/install/aws.md
Normal file
@ -0,0 +1,34 @@
|
||||
---
|
||||
title: AWS installation
|
||||
---
|
||||
|
||||
You can install authentik to run on AWS with a CloudFormation template.
|
||||
|
||||
### Prerequisites
|
||||
|
||||
- An AWS account.
|
||||
- An [AWS Certificate Manager](https://aws.amazon.com/certificate-manager/) certificate. Take note of the ARN of the certificate.
|
||||
|
||||
### Installation
|
||||
|
||||
Log in to your AWS account and create a CloudFormation stack [with our template](https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?stackName=authentik&templateURL=https://authentik-cloudformation-templates.s3.amazonaws.com/authentik.ecs.latest.yaml).
|
||||
|
||||
Under the **Certificate ARN** input, enter the previously created certificate ARN. You can also configure other settings if needed. You can follow the prompts to create the stack.
|
||||
|
||||
This stack will create the following resources:
|
||||
|
||||
- AWS SSM secrets for the PostgreSQL user and the authentik secret key
|
||||
- A VPC for all other resources
|
||||
- A RDS PostgreSQL Multi-AZ cluster
|
||||
- An ElastiCache Redis Multi-AZ cluster
|
||||
- An ECS cluster with two tasks:
|
||||
- One for the authentik server
|
||||
- One for the authentik worker
|
||||
- An ALB (Application Load Balancer) pointing to the authentik server ECS task with the configured certificate
|
||||
- An EFS filesystem mounted on both ECS tasks for media file storage
|
||||
|
||||
The stack will output the endpoint of the ALB that to which you can point your DNS records.
|
||||
|
||||
### Further customization
|
||||
|
||||
If you require further customization, we recommend you install authentik via [Docker Compose](./docker-compose.mdx) or [Kubernetes](./kubernetes.md).
|
Reference in New Issue
Block a user