Skip to main content

Configure storage

By default, SE2 will store compiled extensions and extension source code on the local storage in your Kubernetes cluster. For greater scalability, SE2 can be configured to store artifacts in cloud-based object storage like Amazon S3 or Google Cloud Storage.

Authentication

Bucket authentication varies between cloud providers.

Amazon S3

You will need to supply the AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN and AWS_REGION environment variables to the API for both the control plane and the builder. See the AWS authentication documentation for details. It is also possible to store the configuration as a Kubernetes secret, similar to the Google Cloud Storage configuration.

To configure a storage bucket, provide the SCC_STORAGE_PATH environment variable to both the control plane and builder, e.g. s3://my-bucket for Amazon S3 or gs://my-bucket for Google Cloud Storage. For Kubernetes deployments, this is done in .suborbital/scc-controlplane-deployment.yaml under the controlplane and builder containers sections, and for local docker-compose deployments, this is done in docker-compose.yaml under the scc-control-plane and scc-builder services.

containers:
- name: controlplane
image: suborbital/scc-control-plane:v0.3.0
command: ["controlplane"]

ports:
- containerPort: 8081

env:
- name: SCC_HTTP_PORT
value: "8081"

- name: SCC_LOG_LEVEL
value: 'info'

- name: SCC_HEADLESS
value: "true"

- name: SCC_ENV_TOKEN
value: <your environment token>

- name: SCC_STORAGE_PATH
value: s3://your-s3-storage-bucket>


- name: builder
image: suborbital/scc-builder:v0.3.0
command: ["builder"]

env:
- name: SCC_DOMAIN
value: "domain.example.com"

- name: SCC_TLS_PORT
value: "8443"

- name: SCC_LOG_LEVEL
value: "info"

- name: SCC_CONTROL_PLANE
value: "scc-controlplane-service:8081"

- name: SCC_STORAGE_PATH
value: s3://your-s3-storage-bucket