Skip to main content
Version: 0.1.0-rc.5
Classification

Cloud reference architecture. This is a realistic EKS validation and bring-up topology, but it is intentionally a Development lane rather than a production target.

Decision matrix

Lane summary

Lane summary.
SurfaceChoiceWhy it matters
Seal pathAWS KMS via workload identityThe main workload proves real cloud auto-unseal behavior instead of a local or static secret fallback.
Edge modelShared terminating Gateway API edgeThe lane keeps public routing simple and avoids ACME passthrough complexity during bring-up.
Backup pathS3 with a separate backup identityThe lane proves that backup execution stays separate from the main KMS identity surface.
Validation scopeManual EKS validation plus operator lifecycle behaviorThe lane proves the cloud integration path you need before deciding whether to harden the endpoint.

Diagram

Validated lane topology

The main workload uses one cloud identity for KMS, backup Jobs use another for S3, and the public edge remains a shared terminating layer rather than a dedicated passthrough stack.

Why this lane exists

Reference table

Key design choices

Key design choices.
ChoiceWhat it optimizesWhy it stays in the lane
Separate KMS and backup identitiesUnseal permissions and object-storage permissions stay decoupled.This is the cloud-specific security boundary the lane needs to prove before a hardened rollout.
Development profileFast bring-up and low-friction validation on real infrastructure.The lane should prove AWS integrations without also forcing the full public-ACME hardening path.

Stay on the validated path

  • keep spec.profile: Development and treat the lane as bring-up coverage, not a production recommendation
  • keep the shared terminating edge and do not switch the same lane to passthrough midstream
  • keep separate IAM paths for KMS and S3 so backup behavior is actually validated
  • keep JWT bootstrap enabled for both operator-owned auth and human admin access
  • use a bucket, region, and Gateway path that are all reachable from the exact EKS environment you are validating
What this lane validated

The EKS development lane covered bootstrap, AWS KMS auto-unseal, JWT bootstrap on EKS, human admin JWT login, Gateway exposure through the shared edge, and successful S3 backups.

What this lane is not

This is not a hardened public-endpoint reference, not proof of ACME passthrough, and not a final production posture. It is the shortest cloud lane that still proves the important AWS control-plane integrations.

Use the lane

Prerelease documentation

This version tracks a prerelease build. Features and behavior may change before the next stable release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.