Accessing Instance for Debugging
In some situations, a Gitpod employee may reach out and ask the customer to access their AWS account to help debug the instance. Find out more about the permissions used in the role assumed via AWS IAM permission requirements. Gitpod itself cannot access the AWS account of the instance nor assume the role used below - this needs to be done by a user in the account of the customer.
In order to help debug, a Gitpod employee will ask to perform the following steps. Upon completion, the user will have access to the Kubernetes cluster(s) used to run Gitpod:
-
Sign in to AWS account of the Gitpod instance
-
Connect to instance:
- Go to EC2
- Find an instance in the appropriate cluster, e.g. one of the
workspace-*
ormeta-*
instances. - Click Actions -> Connect -> Session Manager -> Connect
-
Configure AWS CLI, i.e. set
AWS_*
environment variables manually- From the AWS console, create credentials programatically for your current user account and then set these as environment variables:
Configure AWS Environment Variables
- From the AWS console, create credentials programatically for your current user account and then set these as environment variables:
-
Configure
kubectl
access -
You should now have
kubectl
access, to verify runkubectl get pods
Was this page helpful?