Installation: Kubernetes: AWS EKS

In this walkthrough, we will set up a Kubernetes RavenDB cluster in EKS. The guide assumes prior knowledge of basic Kubernetes concepts. For more information please refer to the Kubernetes official documentation.

Setting Up the Environment

Follow the Getting Started Guide, up to the point where you have installed the AWS Cli and Kubectl and you have a running 3-node cluster. You should complete the first 4 steps in the guide:
- Prerequisites
- Step 1: Create Your Amazon EKS Cluster
- Step 2: Configure kubectl for Amazon EKS
- Step 3: Launch and Configure Amazon EKS Worker Nodes.


It is important to wait until each step is completed before starting the next. For example, don't launch worker nodes until the cluster in is the ACTIVE state.

In this guide, we create a 3-node Standard Cluster with the most basic default settings. We use the Service Role, VPC, subnets and security group which were created earlier in Step1.

aws eks create-cluster --name RavenDBCluster --role-arn arn:aws:iam::xxxxxxxxxxxx:role/eksServiceRole --resources-vpc-config subnetIds=subnet-0288eed287111aeb2,subnet-04dda7c6e45e6b84d,subnet-0fcfc595512851aa8,securityGroupIds=sg-03945782faf884513

Your cluster is ready when you run the following command and get 3 nodes in the READY state.

kubectl get node

Deploying secrets

For setting up a secured Kubernetes cluster, you must have your own domain and certificate. The RavenDB setup wizard with Let's Encrypt is not supported for this scenario.

There are a few ways you can get a certificate. One way is to purchase it from a well-known certificate authority.

Let's Encrypt is a certificate authority which provides free certificates. There are many tools available online that automate the process of getting the certificate from Let's Encrypt. Two examples are Certbot and a C# client called Certes.

RavenDB will accept PFX server certificates which contain the private key, are not expired, and have the following fields:

  • KeyUsage: DigitalSignature, KeyEncipherment
  • ExtendedKeyUsage: Client Authentication, Server Authentication

If you wish to use a self-signed certificate, you must register the CA certificate in the OS. A Docker image can be created based on the RavenDB image:

FROM ravendb/ravendb:latest
ADD my-ca.crt /usr/local/share/ca-certificates/my-ca.crt
RUN update-ca-certificates

In this guide, we are going to use a wildcard certificate for * and a RavenDB developer license (get a license here).

You first need to convert the license and certificate files to base64. For example, in C# it can be done like this:

Or in powershell:

Download secrets.yaml and edit it with the base64 values of the license and certificate. Then deploy it to the cluster.

kubectl create -f .\secrets.yaml

Deploying the HAProxy Ingress Controller

Kubernetes ingress is a collection of routing rules which define how external users access services running in a Kubernetes cluster. In order for the Ingress resource to work, the cluster must have an ingress controller running. There are many third-party implementations and for this example, we chose to work with HAProxy.

First, we need to label all of our cluster nodes:

kubectl label node role=ingress-controller --all

Then we deploy the ingress controller with all of the necessary RBAC (Role Based Access Control) rules.

Download haproxy.yaml and deploy it to the cluster:

kubectl create -f .\haproxy.yaml

You may check that the command was executed by asking Kubectl to list all the pods and services in the default namespace. Take a look at the External-IP field. About a minute after deploying, you will receive a public DNS name for your cluster.

kubectl get svc
kubectl get pod


Deploying the RavenDB StatefulSet

Download ravendb.yaml, edit the ConfigMap and Ingress objects with your personal domain information, and deploy it to the cluster:

kubectl create -f .\ravendb.yaml

This will deploy the RavenDB StatefulSet and the RavenDB pods will be created by order.

RavenDB should be deployed in a StatefulSet (and not in a Deployment or ReplicaSet) which guarantees the following:

  • Stable, unique network identifiers.
  • Stable, persistent storage.
  • Ordered, graceful deployment and scaling.
  • Ordered, automated rolling updates.

To view the status of the cluster, run the following commands:

kubectl get pod
kubectl get svc


While the RavenDB pods are being created, you may already set DNS records. Go to your domain provider and create an "A Record" with the External-IP of the HAProxy service.

In our example, we create an "A Record" for * and set the Alias DNS name to "" and the TTL to 1 second.


Before trying to access the cluster, please register your wildcard server certificate in the OS (User Certificates Store). This will allow Chrome to recognize it and be able to use it to authenticate to the cluster. After the cluster is set up, you should use the RavenDB Studio to create a ClusterAdmin client certificate, and use it instead of the server certificate.

Open Chrome and go to, then use the Cluster View in the Studio to add the other nodes to the RavenDB cluster.



If pods or services are not running or if they have errors you can issue a few commands that will help debug the problem.

The logs command displays the standard error of the pod. In case RavenDB threw a startup exception, it will be shown there.

kubectl logs ravendb-0

Running the describe command on any Kubernetes object (sts, svc, ingress, pod) will show details about the deployment of that object and in some cases relevant errors will be written there.

kubectl describe pod haproxy-ingress-5d4d8d95d8-5rtqh

If you need to restart a pod, simply delete it and it will terminate and then come back.

kubectl delete pod ravendb-2

If you delete the entire StatefulSet, the pods will be terminated by order of creation.

kubectl delete sts ravendb