Connect Kubernetes Cluster in your cloud account to TrueFoundry Control Plane
ArgoCD (Essential)
Istio (Essential)
ArgoRollouts (Essential)
Prometheus (Essential)
ArgoWorkflows (Optional)
Keda (Optional)
Loki (Optional)
GPU Operator (Optional)
Grafana (Optional)
[AWS Only] Metrics-Server (Essential)
[AWS Only] AWS EBS CSI Driver (Essential)
[AWS Only] AWS EFS CSI Driver (Essential)
[AWS Only] AWS Load Balancer Controller Essential)
[AWS Only] TFY Inferentia Operator (Optional)
Cert-Manager (Optional)
*.example.com
(wildcard domain) to the load balancer, the services will be exposed like service1.example.com
, service2.example.com
etc. However, if you point a domain like tfy.example.com
(non-wildcard domain) to the load balancer, the services will be exposed like tfy.example.com/service1
, tfy.example.com/service2
etc. Many frontend applications do not work with path based routing (the latter case) and hence we recommend using wildcard domains. We also need to provision certificates to terminate the TLS traffic on the load balancer. For this we can use the AWS Certificate Manager or cert-manager with GCP Cloud DNS or Azure DNS. You can also bring your pre-created certificates.