Skip to main content
Version: 3.1

Migration with Stork on EKS

Pairing with an EKS cluster requires the following additional steps because you also need to pass in your AWS credentials which will be used to generate the IAM token. ​

Create a Secret with your AWS credentials

On the source cluster, create a secret in kube-system namespace with your aws credentials file: ​

kubectl create secret generic --from-file=$HOME/.aws/credentials -n <stork-deployment-namespace> aws-creds
secret/aws-creds created

Pass the Secret to Stork

When Stork is deployed through the Operator

​ The credentials created in the previous step need to be provided to Stork. When deployed through Portworx Operator, add the following to the stork section of the StorageCluster spec:

  stork:
enabled: true
volumes:
- name: aws-creds
mountPath: /root/.aws/
readOnly: true
secret:
secretName: aws-creds

When Stork is deployed using the Portworx DaemonSet model

​ Mount the secret created above in the Stork deployment by performing the following steps. ​

  1. Run the following command to make updates:
    kubectl edit deployment -n kube-system stork
  2. Add the following under spec.template.spec:
    volumes:
    - name: aws-creds
    secret:
    secretName: aws-creds
  3. Add the following under spec.template.spec.containers:
    volumeMounts:
    - mountPath: /root/.aws/
    name: aws-creds
    readOnly: true
  4. Save the changes and wait for all the Stork pods to be in running state after applying the changes:
    kubectl get pods -n kube-system -l name=stork
Was this page helpful?