Installing Che on AWS

This article describes how to deploy Eclipse Che on the Amazon Web Services (AWS) cloud.

Preparing the AWS system for installing Che

The following sections describe how to Configure Kubernetes for Eclipse Che on Amazon Elastic Compute Cloud (Amazon EC2).

  • A running instance of Kubernetes, version 1.19 or higher, and Ingress.

  • The kubectl tool installed.

  • The chectl tool installed.

Installing Kubernetes on Amazon EC2

  1. Configure the AWS Command Line Interface (AWS CLI). For detailed installation instructions, see Installing the AWS CLI.

  2. Check the PATH environment variable if the aws tool is not available.

  3. Install Kubernetes on EC2. There are several ways to have a running Kubernetes instance on EC2. Here, the kops tool is used to install Kubernetes. For details, see Installing Kubernetes with kops.

This document assumes that Eclipse Che must be configured to run on the following domain:


Setting up DNS

One way to Configure Domain Name System (DNS) is to create the Amazon Route53 to manage the domain.

To Configure DNS:

  1. Create the zone on AWS:

    $ aws route53 create-hosted-zone --name --caller-reference 1
     "Location": "<ZONE-ID>",
     "HostedZone": \{
     "Id": "/hostedzone/<ZONE-ID>",
     "Name": "",
     "CallerReference": "1",
     "Config": \{
     "PrivateZone": false
     "ResourceRecordSetCount": 2
     "ChangeInfo": \{
     "Id": "/change/C1ZNLBU45DJUJL",
     "Status": "PENDING",
     "SubmittedAt": "2019-07-08T08:14:39.772Z"
     "DelegationSet": \{
     "NameServers": [
  2. Configure the four DNS nameservers on the DNS. Note that when a custom DNS provider, updating the record takes a few hours.

    DNS name servers
  3. Create the Simple Storage Service (s3) storage to store the kops configuration.

    $ aws s3 mb s3://
  4. Inform kops of this new service:

    $ export KOPS_STATE_STORE=s3://
  5. Create the kops cluster by providing the cluster zone. For example, for Europe, the zone is eu-west-1c.

    $ kops create cluster --zones=eu-west-1c
  6. Create the cluster:

    $ kops update cluster --yes
  7. After the cluster is ready, validate it:

    $ kops validate cluster
    Using cluster from {orch-cli}  context:
    Validating cluster
    master-eu-west-1c   Master  m3.medium    1    1    eu-west-1c
    nodes               Node    t2.medium    2    2    eu-west-1c
    NAME                                         ROLE    READY   node    True  node    True  master  True
    Your cluster is ready
  8. Check the cluster using the kubectl ` command. The `kubectl ` context is also configured automatically by the `kops tool:

    $ {orch-cli} config current-context
    $ {orch-cli} get pods --all-namespaces
    All the pods in the running state are displayed.

Installing Ingress-nginx

To install Ingress-nginx:

  1. Install the configuration for AWS.

    $ {orch-cli} apply \

    The following output confirms that the Ingress controller is running.

    $ {orch-cli} get pods --namespace ingress-nginx
    NAME                                        READY   STATUS    RESTARTS   AGE
    nginx-ingress-controller-76c86d76c4-gswmg   1/1     Running   0          9m3s
  2. Find the external IP of ingress-nginx.

    $ {orch-cli} get services --namespace ingress-nginx -o jsonpath='{.items[].status.loadBalancer.ingress[0].hostname}'

    Troubleshooting: If the output is empty, it implies that the cluster has configuration issues. Use the following command to find the cause of the issue:

    $ {orch-cli} describe service -n ingress-nginx ingress-nginx

    Output similar to the following means a needed role must be created manually:

    arn:aws:sts::269287474311:assumed-role...4bff is not authorized to perform: iam:CreateServiceLinkedRole on resource: arn:aws:iam::269287474311:role/aws-service-role/

    Run the following command to create the role:

    $ aws iam create-service-linked-role --aws-service-name ""
  3. Add hosts on route 53 with this given hostname Ensure that you include the colon (:) at the end of this URL.

  4. Create the wildcard DNS (for with the previous hostname and ensure to add the dot (.) at the end of the hostname. In the Type drop-down list, select CNAME.

    create record set

    The following is an example of the resulting window after adding all the values.

    create record set all values

    The address must resolve to an IP address.

    $ host is an alias for has address

    The existing Kubernetes instance is prepare to host an Che installation.

Enabling the TLS and DNS challenge

To use the Cloud DNS and TLS, some service accounts must be enabled to have cert-manager managing the DNS challenge for the Let’s Encrypt service.

  1. Create a new permission file.

  2. Use the following command to obtain the zone ID:

    $ aws route53 list-hosted-zones
        "HostedZones": [
                "Id": "/hostedzone/ABCDEFGH",
                "Name": "",
                "CallerReference": "1",
                "Config": {
                    "PrivateZone": false
                "ResourceRecordSetCount": 5
  3. Copy the following content and replace INSERT_ZONE_ID with the route53 zone ID:

        "Version": "2012-10-17",
        "Statement": [
                "Effect": "Allow",
                "Action": [
                "Resource": [
                "Effect": "Allow",
                "Action": [
                "Resource": [
  4. In the EC2 Dashboard, identify the IAM role used by the master node.

    start AWS instance

    It is located under the Description tab, in the IAM role field.

    Description tab IAM role
  5. Click the IAM role link (, in this case).

  6. Click the Add inline policy link at the bottom of the window.

    AWS summary IAM role
  7. In the Create policy window, on the JSON tab, paste the content of the JSON file created earlier and click the Review policy button.

    aws create policy
  8. In the Name field, type eclipse-che-route53 and click Create Policy.

    create policy review policy

Installing cert-manager

  1. To install cert-manager, run the following commands (for details, see Installing Cert on Kubernetes):

    $ {orch-cli} create namespace cert-manager
    namespace/cert-manager created
    $ {orch-cli} label namespace cert-manager
    namespace/cert-manager labeled
  2. Set validate=false. If set to true, it will only work with the latest Kubernetes:

    $ {orch-cli} apply \
      -f \
  3. Create the Che namespace if it does not already exist:

    $ kubectl create namespace eclipse-che
    namespace/eclipse-che created
  4. Create the cert-manager user:

    $ aws iam create-user --user-name cert-manager
        "User": {
            "Path": "/",
            "UserName": "cert-manager",
            "userId": "ABCDEF",
            "Arn": "arn:aws:iam::1234:user/cert-manager",
            "CreateDate": "2019-07-30T13:50:48Z"
  5. Create the access key:

    $ aws iam create-access-key --user-name cert-manager
        "AccessKey": {
            "UserName": "cert-manager",
            "AccessKeyId": "ABCDEF",
            "Status": "Active",
            "SecretAccessKey": "mySecret",
            "CreateDate": "2019-07-30T13:52:59Z"
    Remember the access key for later use.
  6. Create a secret from the SecretAccessKey content.

    $ {orch-cli} create secret generic aws-cert-manager-access-key \
      --from-literal=CLIENT_SECRET=<REPLACE WITH SecretAccessKey content> -n cert-manager
  7. Use the Add inline policy link to add the inline policy to AWS Cert-Manager.

    AWS summary IAM role
  8. Paste the following inline policy in the JSON tab:

        "Version": "2012-10-17",
        "Statement": [
                "Effect": "Allow",
                "Action": "route53:GetChange",
                "Resource": "arn:aws:route53:::change/*"
                "Effect": "Allow",
                "Action": "route53:ChangeResourceRecordSets",
                "Resource": "arn:aws:route53:::hostedzone/*"
                "Effect": "Allow",
                "Action": "route53:ListHostedZonesByName",
                "Resource": "*"
    json review policy
  9. Click Review policy.

    create policy review
  10. In the Name field, type route53, and click Create policy.

  11. To create the certificate issuer, change the email address and specify the accessKeyID:

    $ cat <<EOF | {orch-cli} apply -f -
    kind: ClusterIssuer
      name: che-certificate-issuer
      namespace: cert-manager
          name: letsencrypt
        - selector:
              - "YOUR DOMAIN"
              region: eu-west-1
              accessKeyID: <USE ACCESS_KEY_ID_CREATED_BEFORE>
                name: aws-cert-manager-access-key
                key: CLIENT_SECRET
  12. Add the certificate by editing the domain name value (, in this case) and the dnsName value:

    $ cat <<EOF | {orch-cli} apply -f -
    kind: Certificate
     name: che-tls
     namespace: __<{prod-namespace}>__
     secretName: che-tls
       name: che-certificate-issuer
       kind: ClusterIssuer
       - '*'
         - dns01:
             provider: route53
             - '*'
  13. Check if the issuerRef name is the same as the ClusterIssuer. A new DNS challenge is being added to the DNS zone for Let’s encrypt.

    AWS hosted zones DNS

    The cert-manager logs contain information about the DNS challenge.

  14. Obtain the name of the Pods:

    $ {orch-cli} get pods --namespace cert-manager
    NAME                                       READY   STATUS    RESTARTS   AGE
    cert-manager-6587688cb8-wj68p              1/1     Running   0          6h
    cert-manager-cainjector-76d56f7f55-zsqjp   1/1     Running   0          6h
    cert-manager-webhook-7485dd47b6-88m6l      1/1     Running   0          6h
  15. Obtain the logs using the following command (here, cert-manager-8d478bb45-sdfmz is the name of the cert-manager Pod):

    $ {orch-cli} logs -f cert-manager-8d478bb45-sdfmz -n cert-manager
    I0730 14:46:25.382385       1 sync.go:274] Need to create 0 challenges
    I0730 14:46:25.382401       1 sync.go:319] Waiting for all challenges for order "che-tls-3365293372" to enter 'valid' state
    I0730 14:46:25.382431       1 controller.go:204] cert-manager/controller/orders "level"=0 "msg"="finished processing work item" "key"="che/che-tls-3365293372"
    I0730 14:46:25.382813       1 controller.go:219] cert-manager/controller/challenges "level"=0 "msg"="finished processing work item" "key"="che/che-tls-3365293372-0"
    I0730 14:46:25.382843       1 controller.go:213] cert-manager/controller/challenges "level"=0 "msg"="syncing resource" "key"="che/che-tls-3365293372-0"
    I0730 14:46:25.383037       1 dns.go:101] Presenting DNS01 challenge for domain ""
    I0730 14:47:03.061546       1 dns.go:112] Checking DNS propagation for "" using name servers: []
    I0730 14:47:03.220952       1 dns.go:124] Waiting DNS record TTL (60s) to allow propagation of DNS record for domain "”
  16. Ensure that the certificate is ready:

    $ kubectl describe certificate/che-tls -n eclipse-che
        Last Transition Time:  2019-07-30T14:46:23Z
        Message:               Certificate issuance in progress. Temporary certificate issued.
        Reason:                TemporaryCertificate
        Status:                False
        Type:                  Ready
      Type    Reason        Age   From          Message
      ----    ------        ----  ----          -------
      Normal  OrderCreated  50s   cert-manager  Created Order resource "che-tls-3365293372"
  17. Wait for the status to become OK and ensure that the log contains the following entry:

    I0729 13:56:26.140886       1 conditions.go:143] Found status change for Certificate "che-tls" condition "Ready": "False" -> "True"; setting lastTransitionTime to 2019-07-29 13:56:26.140866531 +0000 UTC m=+4557.134131468
  18. Ensure that the status is up-to-date using the following command:

    $ kubectl describe certificate/che-tls -n eclipse-che
        Last Transition Time:  2019-07-30T14:48:07Z
        Message:               Certificate is up to date and has not expired
        Reason:                Ready
        Status:                True
        Type:                  Ready
      Not After:               2019-10-28T13:48:05Z
      Type    Reason         Age    From          Message
      ----    ------         ----   ----          -------
      Normal  OrderCreated   5m29s  cert-manager  Created Order resource "che-tls-3365293372"
      Normal  OrderComplete  3m46s  cert-manager  Order "che-tls-3365293372" completed successfully
      Normal  CertIssued     3m45s  cert-manager  Certificate issued successfully

Installing Che on Kubernetes using chectl

Kubernetes is an open source system for automating deployment, scaling, and managing containerized applications. The following section describes the process of deploying Che on Kubernetes by using the chectl tool.

  1. Install Che on Kubernetes:

    $ chectl server:deploy --platform=k8s
    › Current Kubernetes context: 'current-context'
      ✔ Verify Kubernetes API...OK
      ✔ 👀  Looking for an already existing Eclipse Che instance
        ✔ Verify if Eclipse Che is deployed into namespace "eclipse-che" is not
      ✔ ✈️  Kubernetes preflight checklist
        ✔ Verify if kubectl is installed
        ✔ Verify remote kubernetes status...done.
        ✔ Check Kubernetes version: Found v1.22.2.
        ✔ Verify domain is set...set to
        ↓ Check if cluster accessible [skipped]
      ✔ Following Eclipse Che logs
        ✔ Start following Operator logs...done
        ✔ Start following Eclipse Che Server logs...done
        ✔ Start following PostgreSQL logs...done
        ✔ Start following Keycloak logs...done
        ✔ Start following Plug-in Registry logs...done
        ✔ Start following Devfile Registry logs...done
        ✔ Start following Eclipse Che Dashboard logs...done
        ✔ Start following namespace events...done
     ›   Warning: Consider using the more reliable 'OLM' installer when deploying a stable release of Eclipse Che (--installer=olm).
      ✔ Create Namespace eclipse-che...[Exists]
      ✔ 🏃‍  Running the Eclipse Che operator
        ✔ Create ServiceAccount che-operator in namespace eclipse-che...done.
        ✔ Read Roles and Bindings...done.
        ✔ Creating Roles and Bindings...done.
        ✔ Create CRD
        ✔ Create backup and restore CRDs...done.
        ✔ Waiting 5 seconds for the new Kubernetes resources to get flushed...done.
        ✔ Create deployment che-operator in namespace eclipse-che...done.
        ✔ Operator pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Prepare Eclipse Che cluster CR...Done.
        ✔ Create the Custom Resource of type in the namespace eclipse-che...done.
      ✔ ✅  Post installation checklist
        ✔ PostgreSQL pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Keycloak pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Devfile Registry pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Plug-in Registry pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Eclipse Che Dashboard pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Eclipse Che Server pod bootstrap
          ✔ Scheduling...done
          ✔ Downloading images...done
          ✔ Starting...done
        ✔ Eclipse Che status check...done
      ✔ Retrieving Che self-signed CA certificate...OK
      ✔ Prepare post installation output...done
      ✔ Show important messages
        ✔ Eclipse Che 7.43 has been successfully deployed.
        ✔ Documentation             :
        ✔ -------------------------------------------------------------------------------
        ✔ Users Dashboard           :
        ✔ Admin user login          : "XXX:XXX". NOTE: must change after first login.
        ✔ -------------------------------------------------------------------------------
        ✔ Plug-in Registry          :
        ✔ Devfile Registry          :
        ✔ -------------------------------------------------------------------------------
        ✔ Identity Provider URL     :
        ✔ Identity Provider login   : "XXX:XXX".
        ✔ -------------------------------------------------------------------------------
        ✔ [ACTION REQUIRED] Please add Che self-signed CA certificate into your browser: /tmp/cheCA.crt.
       Documentation how to add a CA certificate into a browser:
    Command server:deploy has completed successfully in 04:25.
Verification steps
  1. Investigate the Che logs:

    $ chectl server:logs --namespace eclipse-che
  2. Verify that the certificate settings are correct.

    1. Open Eclipse Che server URL from the output of the previous command.

    2. Click on the lock icon in the address bar.

    3. Verify that the pop-up window displays the Connection is secure message.

Additional resources