Phase 1 AWS - Prerequisites
On This Page
- 1. Install required software
- 2. Create a VPC
- VPC and cluster sizing recommendations
- 2. Create a Kubernetes cluster
- Cluster requirements
- Compute resources
- Supported Kubernetes versions
- Minimum permissions requirements
- EKS
- 3. Create a new GitHub OAuth app
- GitHub Enterprise
- 4. Static IP addresses
- AWS: Reserve an elastic IP address
- 5. Frontend TLS certificates
- AWS Route 53
- AWS Certificate Manager
- Upstream TLS termination
- 6. Encryption/signing keys
- a. Artifact signing key
- b. Encryption signing key
- 7. Object storage and permissions
- AWS S3 storage
- a. Create AWS S3 bucket
- b. Enable bucket versioning
- c. Set up authentication
- Next steps
CircleCI server v4.7 is installed as a Helm chart. The installation process is broken down into four phases. There is a validation step at the end of each phase, allowing you to confirm success before moving to the next phase. Depending on your requirements, phases 3 and 4 may include multiple steps. This installation guide assumes you have already read the CircleCI server v4.7 overview.
In the following sections, replace any sections indicated by < > with your details. |
1. Install required software
Download and install the following software before continuing:
Tool | Version | Used for | Notes |
---|---|---|---|
1.19 or greater | Kubernetes CLI | ||
3.9.2 or greater | Kubernetes Package Management | ||
3.5.0 or greater | Helping with | Optional, but may help with troubleshooting between releases | |
Latest | Managing AWS resources | AWS installs only | |
0.15.4 or greater | Infrastructure Management | Required for installations within GCP or AWS | |
Install and configure MinIO CLI for your storage provider if you choose not to use AWS or GCP object storage. | TBC | TBC | Required for installations outside AWS and GCP, for example, local installation. |
2. Create a VPC
Installing server locally? you can skip this step, but you should ensure you follow the resourcing recommendation of using /18 CIDR blocks to ensure you have adequate capacity for both your Kubernetes Cluster and the provisioning of Nomad clients to run your jobs. |
If you are installing server in the cloud, either AWS or GCP, you will need to create a new virtual private cloud (VPC).
Refer to the AWS guide to creating a VPC.
VPC and cluster sizing recommendations
While there are no strict requirements for VPC (Virtual Private Cloud) setup or disk size, the following practices are recommended for optimal performance and stability in production environments.
-
VPC Selection
We recommend you create a new VPC specifically for CircleCI server and its components, rather than using an existing VPC.
-
Subnet Provisioning
For high availability, and to avoid potential outages, you should provision subnets using /18 CIDR blocks across multiple Availability Zones.
2. Create a Kubernetes cluster
CircleCI server installs into an existing Kubernetes cluster. If you have not already created a cluster, you should do so next. There are instructions for creating a cluster below, or if you are installing locally, first consider the sizing, version, and permissions requirements.
Cluster requirements
Compute resources
The application uses a large number of resources. Depending on your usage, your Kubernetes cluster should meet the following requirements:
Number of daily active CircleCI users | Minimum Nodes | Total CPU | Total RAM | NIC speed |
---|---|---|---|---|
< 500 | 4 | 24 cores | 90 GB | 1 Gbps |
500+ | 6 | 48 cores | 240 GB | 10 Gbps |
Supported Kubernetes versions
CircleCI Version | Kubernetes Version |
---|---|
4.7.x | 1.26 - 1.29 |
Minimum permissions requirements
The installing user must have at least admin permissions for the namespace into which CircleCI is to be installed.
EKS
You can learn more about creating an Amazon EKS cluster in the EKS docs. We recommend using eksctl
to create your cluster, which creates a VPC and selects the proper security groups for you.
-
Install
eksctl
. -
Create your cluster by running the following (Cloud formation with
eksctl
and EKS can take more than 20 minutes to complete):eksctl create cluster --name=circleci-server --nodes 4 --node-type m5.2xlarge --with-oidc --region "<your-region>"
--with-oidc
as in the example above is used to add an IAM OIDC provider to your cluster. This provider is necessary for adding the EBS CSI driver and enabling IRSA roles on your cluster. See below for more information.eksctl
may be further extended with other flags to customize your EKS cluster following their documentation -
Once the cluster has been created, you can use the following command to configure
kubectl
access:eksctl utils write-kubeconfig --cluster circleci-server
-
As of EKS 1.24, EKS will no longer have the EBS CSI Driver installed by default. This means that EKS cannot manage the EBS volumes for the persistent volumes of your cluster. CircleCI uses persistent volumes for services such as PostgreSQL, MongoDB, Redis, RabbitMQ and Vault. You may manually provision persistence volumes or you may install the EBS CSI Driver on your cluster following the AWS documentation.
You may see the following error AWS STS Access - cannot get role ARN for current session: InvalidClientTokenID . This means your AWS credentials are invalid, or your IAM user does not have permission to create an EKS cluster. Proper IAM permissions are necessary to use eksctl . See the AWS documentation on IAM permissions. |
3. Create a new GitHub OAuth app
If GitHub Enterprise and CircleCI server are not on the same domain, then images and icons from GHE will fail to load in the CircleCI web app. |
Registering and setting up a new GitHub OAuth app for CircleCI server allows for authorization control to your server installation using GitHub OAuth and for updates to GitHub projects/repos using build status information. The following steps apply for both GitHub.com and GitHub Enterprise.
-
In your browser, navigate to menu:Your-GitHub-instance[User Settings>Developer Settings>OAuth Apps] and select New OAuth App.
Figure 1. New GitHub OAuth App -
Complete the following fields, based on your planned installation:
-
Homepage URL: The URL of your planned CircleCI installation.
-
Authorization callback URL: The authorization callback URL is the URL of your planned CircleCI installation followed by
/auth/github
-
-
Once completed, you will be shown the Client ID. Select Generate a new Client Secret to generate a Client Secret for your new OAuth App. You will need these values when you configure CircleCI server.
Figure 2. Client ID and Secret
GitHub Enterprise
If using GitHub Enterprise, you also need a personal access token and the domain name of your GitHub Enterprise instance.
Create the defaultToken
by navigating to User Settings > Developer Settings > Personal access tokens. The default token requires no scopes. You will need this value when you configure CircleCI server.
4. Static IP addresses
It is recommended to provision a static IP address to assign to the load balancer created by the cluster. While this is not necessary, it does eliminate the need to update DNS records if the service-created load balancer is reprovisioned.
AWS: Reserve an elastic IP address
To reserve an elastic IP address in AWS, run the following AWS CLI commands in your desired environment.
This command needs to be run to generate an address for every subnet the load balancer deploys into - default 3.
# Run x times per x subnets (default 3)
aws ec2 allocate-address
# {
# "PublicIp": "10.0.0.1,
# "AllocationId": "eipalloc-12345",
# "PublicIpv4Pool": "amazon",
# "NetworkBorderGroup": "us-east-1",
# "Domain": "vpc"
#}
Make note of each of the returned AllocationId
values from the CLI for use in the values.yaml
file.
5. Frontend TLS certificates
By default, CircleCI server creates self-signed certificates to get you started. In production, you should supply a certificate from a trusted certificate authority. The Let’s Encrypt certificate authority, for example, can issue a free certificate using their Certbot tool. The sections below cover using Google Cloud DNS and AWS Route 53.
It is important that your certificate contains both your domain and the app.* subdomain as subjects. For example, if you host your installation at server.example.com , your certificate must cover app.server.example.com and server.example.com . |
Once you have created your certificates using one of the methods described below, you can use the following commands to retrieve the certificates later when you need them during this installation:
ls -l /etc/letsencrypt/live/<CIRCLECI_SERVER_DOMAIN>
cat /etc/letsencrypt/live/<CIRCLECI_SERVER_DOMAIN>/fullchain.pem
cat /etc/letsencrypt/live/<CIRCLECI_SERVER_DOMAIN>/privkey.pem
AWS Route 53
-
If you are using AWS Route 53 for DNS, you need the
certbot-route53
plugin installed. You can install the plugin with the following command:python3 -m pip install certbot-dns-route53
-
Then execute this example to create a private key and certificate (including intermediate certificates) locally in
/etc/letsencrypt/live/<CIRCLECI_SERVER_DOMAIN>
:certbot certonly --dns-route53 -d "<CIRCLECI_SERVER_DOMAIN>" -d "app.<CIRCLECI_SERVER_DOMAIN>"
AWS Certificate Manager
Instead of provisioning your own TLS certificates, if you are setting up CircleCI server in an AWS environment, you can have AWS provision TLS certificates using Certificate Manager.
aws acm request-certificate \
--domain-name <CIRCLECI_SERVER_DOMAIN> \
--subject-alternative-names app.<CIRCLECI_SERVER_DOMAIN> \
--validation-method DNS \
--idempotency-token circle
After running this command, navigate to the Certificate Manager AWS console and follow the wizard to provision the required DNS validation records with Route53. Take note of the ARN of the certificate once it is issued.
Upstream TLS termination
You may have a requirement to terminate TLS for CircleCI server outside the application. This is an alternate method to using ACM or supplying the certificate chain during Helm deployment. An example would be a proxy running in front of the CircleCI installation providing TLS termination for your domain name. In this case the CircleCI application acts as the backend for your load balancer or proxy.
CircleCI server listens on the following port numbers, which need to be configured depending how you are routing the traffic:
-
Frontend / API Gateway [TCP 80, 443]
-
Nomad server [TCP 4647]
Depending on your requirements you may choose to terminate TLS for only the frontend/api-gateway or provide TLS for services listening on all the ports.
6. Encryption/signing keys
The keysets generated in this section are used to encrypt and sign artifacts generated by CircleCI. You will need these values to configure server.
Store these values securely. If they are lost, job history and artifacts will not be recoverable. |
a. Artifact signing key
To generate an artifact signing key, run the following command:
docker run circleci/server-keysets:latest generate signing -a stdout
b. Encryption signing key
To generate an encryption signing key, run the following command:
docker run circleci/server-keysets:latest generate encryption -a stdout
7. Object storage and permissions
CircleCI server v4.7 hosts build artifacts, test results, and other state object storage. The following storage options are supported:
While any S3 compatible object storage may work, we test and support AWS S3 and MinIO. Follow the instructions below to create a bucket and access method for AWS S3 or GCS.
If you are installing locally rather than in AWS or GCP, follow the MinIO instructions in the Air-gapped installation docs.
If you are installing behind a proxy, object storage should be behind this proxy also. Otherwise, proxy details will need to be supplied at the job level within every project .circleci/config.yml to allow artifacts, test results, cache save and restore, and workspaces to work. For more information see the Installing server behind a proxy guide. |
AWS S3 storage
a. Create AWS S3 bucket
aws s3api create-bucket \
--bucket <YOUR_BUCKET_NAME> \
--region <YOUR_REGION> \
--create-bucket-configuration LocationConstraint=<YOUR_REGION>
b. Enable bucket versioning
To use the Docker layer caching (DLC) feature in CircleCI, bucket versioning needs to be enabled. Run the following command to enable bucket versioning on the bucket created in the previous step:
aws s3api put-bucket-versioning \
--bucket <YOUR_BUCKET_NAME> \
--region <YOUR_REGION> \
--versioning-configuration Status=Enabled
c. Set up authentication
Authenticate CircleCI with S3 in one of two ways:
-
IAM Roles for Service Accounts (IRSA) - recommended
-
IAM access keys