Skip to main content
Version: 0.2.x

Validated coverage

  • a Development-profile cluster can bootstrap on EKS with AWS KMS auto-unseal and no static root-token workflow
  • JWT bootstrap and human admin JWT access both work under the cloud control-plane conditions EKS introduces
  • a shared terminating Gateway can expose the development cluster without requiring passthrough or public ACME
  • backup Jobs can authenticate separately from the main workload and write snapshots to S3 successfully
Baseline scope

Cloud reference architecture. This is a realistic EKS validation and bring-up topology, but it is intentionally a Development lane rather than a production target.

Decision matrix

Baseline summary

Baseline summary.
SurfaceChoiceWhy it matters
Seal pathAWS KMS via workload identityThe main workload uses cloud auto-unseal through AWS KMS rather than local or static secret material.
Edge modelShared terminating Gateway API edgeThe lane keeps public routing simple and avoids ACME passthrough complexity during bring-up.
Backup pathS3 with a separate backup identityBackup execution stays separate from the main KMS identity surface.
Validation scopeManual EKS validation plus operator lifecycle behaviorThe baseline covers the cloud integration path used in the validated EKS development environment.

Diagram

Baseline topology

The main workload uses one cloud identity for KMS, backup Jobs use another for S3, and the public edge remains a shared terminating layer rather than a dedicated passthrough stack.

Why this lane exists

Reference table

Key design choices

Key design choices.
ChoiceWhat it optimizesWhy it stays in the lane
Separate KMS and backup identitiesUnseal permissions and object-storage permissions stay decoupled.This is the cloud-specific security boundary the lane needs to prove before a hardened rollout.
Development profileFast bring-up and low-friction validation on real infrastructure.The lane should prove AWS integrations without also forcing the full public-ACME hardening path.

Baseline requirements

  • keep spec.profile: Development and treat the lane as bring-up coverage, not a production recommendation
  • keep the shared terminating edge and do not switch the same lane to passthrough midstream
  • keep separate IAM paths for KMS and S3 so backup behavior is actually validated
  • keep JWT bootstrap enabled for both operator-owned auth and human admin access
  • use a bucket, region, and Gateway path that are all reachable from the exact EKS environment you are validating
Validated coverage

The EKS development lane covered bootstrap, AWS KMS auto-unseal, JWT bootstrap on EKS, human admin JWT login, Gateway exposure through the shared edge, and successful S3 backups.

Out of scope

This baseline does not cover the hardened public-endpoint path, ACME passthrough, or a final production posture. It covers the AWS control-plane integrations used in the validated development environment.

Next steps

Published release documentation

You are reading docs for version 0.2.x. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.