
* fix missing min_healthy_percent which was causing an error on stdout...sigh Signed-off-by: Jens Langhammer <jens@goauthentik.io> * disable version reporting (replaces deleting BootstrapVersion) Signed-off-by: Jens Langhammer <jens@goauthentik.io> * dont generate bootstrap thing Signed-off-by: Jens Langhammer <jens@goauthentik.io> * aaand remove fix_template Signed-off-by: Jens Langhammer <jens@goauthentik.io> * always set CI to false so errors are sent to stderr Signed-off-by: Jens Langhammer <jens@goauthentik.io> * move aws stuff to lifecycle Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing package-lock Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix package Signed-off-by: Jens Langhammer <jens@goauthentik.io> * cleanup website structure Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
35 lines
1.5 KiB
Markdown
35 lines
1.5 KiB
Markdown
---
|
||
title: AWS installation
|
||
---
|
||
|
||
You can install authentik to run on AWS with a CloudFormation template.
|
||
|
||
### Prerequisites
|
||
|
||
- An AWS account.
|
||
- An [AWS Certificate Manager](https://aws.amazon.com/certificate-manager/) certificate. Take note of the ARN of the certificate.
|
||
|
||
### Installation
|
||
|
||
Log in to your AWS account and create a CloudFormation stack [with our template](https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?stackName=authentik&templateURL=https://authentik-cloudformation-templates.s3.amazonaws.com/authentik.ecs.latest.yaml).
|
||
|
||
Under the **Certificate ARN** input, enter the previously created certificate ARN. You can also configure other settings if needed. You can follow the prompts to create the stack.
|
||
|
||
This stack will create the following resources:
|
||
|
||
- AWS SSM secrets for the PostgreSQL user and the authentik secret key
|
||
- A VPC for all other resources
|
||
- A RDS PostgreSQL Multi-AZ cluster
|
||
- An ElastiCache Redis Multi-AZ cluster
|
||
- An ECS cluster with two tasks:
|
||
- One for the authentik server
|
||
- One for the authentik worker
|
||
- An ALB (Application Load Balancer) pointing to the authentik server ECS task with the configured certificate
|
||
- An EFS filesystem mounted on both ECS tasks for media file storage
|
||
|
||
The stack will output the endpoint of the ALB that to which you can point your DNS records.
|
||
|
||
### Further customization
|
||
|
||
If you require further customization, we recommend you install authentik via [Docker Compose](./docker-compose.mdx) or [Kubernetes](./kubernetes.md).
|