-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add deployment steps for self-provisioned K8s via AWS and ECR #48
base: main
Are you sure you want to change the base?
Conversation
062bd7d
to
975ba7b
Compare
Signed-off-by: arcolife <[email protected]>
Signed-off-by: arcolife <[email protected]>
Hi @arcolife - thank you kindly for the PR! This is a great PR and it's super to see some of the rough edges around working with EKS getting smoothed over. I am going to land this (maybe with a tweak here or there...) as is. But - please be aware that this area (chaincode and the sample network) is undergoing a little bit of change. Most importantly, please see the new fabric-builder-k8s if you have not already had a chance for review. It is brilliant and makes a "mockery" out of all the parts that used to be hard when working with chaincode and Fabric. In the 08/24 community call we did a quick demo of the new builder - please watch the 20220824 Fabric contributor call, starting about 0:22:00 into the video for a deep dive. Regarding the launch on EC2, the The next iteration of the operator sample-network is actually in the context of working in a "full stack" environment, combining local dev iterations with a Cloud-Native / production pipeline. If you are working around the area of spinning up Fabric networks, chaincode, etc. with EC2, please see the full-stack-asset-transfer-guide as it covers many of the use cases above in a natural format, including build; tag; publish; deploy iterations of chaincode with the kubernetes builder. The new recipes are very good, and we're promoting this lifecycle as THE lifecycle for working with chaincode on k8s, resorting to CCaaS only for cases where a user wants to launch a CC locally in a debugger, adjacent (or via reverse proxy) to a network peer running in k8s. This is relevant to your PR above, as when working with So near-term outcomes:
Thanks - great PR! |
|
Add scripts for deploying chaincode on a self-provisioned K8s cluster on AWS that uses ECR as container image registry.
Fixes #49
Open to suggestions for the ugly hack in tag name conversion.
PS: https://github.com/hyperledger-labs/fabric-operator/blob/main/docs/CONTRIBUTING.md is
TODO
.