You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to deploy Solr reliably to cloud.gov, the Data.gov SSB Team wants to define the processes and logistics surrounding self-managing an EKS cluster to support our Solr deployments.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
GIVEN a new EKS cluster needs to be deployed
WHEN a data.gov admin follows the process created here
THEN an EKS cluster is deployed
AND it is connected to the SolrCloud Broker
AND a new SolrCloud service can be created.
Background
[Any helpful contextual notes or links to artifacts/evidence, if needed]
User Story
In order to deploy Solr reliably to cloud.gov, the Data.gov SSB Team wants to define the processes and logistics surrounding self-managing an EKS cluster to support our Solr deployments.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
WHEN a data.gov admin follows the process created here
THEN an EKS cluster is deployed
AND it is connected to the SolrCloud Broker
AND a new SolrCloud service can be created.
Background
[Any helpful contextual notes or links to artifacts/evidence, if needed]
Security Considerations (required)
[Any security concerns that might be implicated in the change. "None" is OK, just be explicit here!]
Sketch
datagov-brokerpak-eks
to allow an S3 Backend for terraform statesterraform init/apply
inprovision
directoryterraform init/apply
inbind
directoryThe text was updated successfully, but these errors were encountered: