Skip to main content

Prerequisites

This page outlines the requirements and prerequisites necessary for deploying AI/Run CodeMie on Amazon Web Services. Please ensure all requirements are met before proceeding with the installation.

AWS Account Requirements

Required Access and Permissions

To deploy AI/Run CodeMie on AWS, you need:

  • Active AWS Account with preferred region for deployment
  • Programmatic Access with credentials that have permissions to create and manage IAM Roles and Policy Documents
  • Sufficient Quota for the required resources (EKS, RDS, networking, storage, etc.)
    Complete Resource List

    For a detailed list of all AWS resources that will be provisioned, refer to the Infrastructure Deployment section or review the Terraform modules in the deployment repository.

Network Requirements

DNS and Certificate Requirements

AI/Run CodeMie requires proper DNS and TLS certificate configuration:

  • Route 53 Hosted Zone with available wildcard DNS configuration
  • Automatic Certificate Management - AI/Run CodeMie Terraform modules will automatically create:
    • DNS Records in Route 53
    • TLS certificates through AWS Certificate Manager for ALB and NLB
Automatic Setup

DNS and certificate provisioning is fully automated through Terraform when using AI/Run CodeMie-managed infrastructure. You only need to provide the hosted zone. However, if you're using self-provisioned infrastructure, you will need to handle DNS records and certificates for it.

Network Requirements

Outbound Connectivity

Your EKS cluster's Security Groups and Network ACLs must allow outbound access to the following endpoints:

DestinationPurpose
europe-west3-docker.pkg.devAI/Run CodeMie container registry (Google Container Registry)
quay.ioThird-party container images
docker.ioDocker Hub container images
registry.developers.crunchydata.comPostgreSQL operator images
Your integration servicesGitLab, GitHub, or other services you plan to use with CodeMie
Container Registry Access

AI/Run CodeMie container images are hosted on Google Container Registry (GCR). You will need gcloud CLI installed on your deployment machine to authenticate and pull helm charts from GCR.

Inbound Connectivity on Corporate Services

If you plan to integrate AI/Run CodeMie with external corporate services (e.g., GitLab, GitHub, internal APIs):

  • Configure the firewall on your external service to allow inbound traffic from the AI/Run CodeMie NAT Gateway public IP address
  • This allows AI/Run CodeMie to make outbound API calls to your external services (e.g., GitLab API, GitHub API, internal services)
warning

The AI/Run CodeMie NAT Gateway public IP address will only be available after infrastructure deployment. You will need to configure external service firewalls after the installation is complete.

Access Control Network List

To restrict access to AI/Run CodeMie and prevent unauthorized access from the public internet, prepare a list of allowed networks:

  • Corporate network CIDR ranges from which users will access AI/Run CodeMie
  • VPN network ranges if remote users connect via VPN
  • Office locations and their public IP addresses or CIDR blocks
  • Any other trusted networks that require access to the platform

Kubernetes Cluster Requirements

Requirements for EKS cluster deployment.

Administrative Permissions

The deployment user must have:

  • EKS Admin permissions with the ability to create and manage namespaces
  • Access to configure cluster-level resources (if deploying to an existing cluster)

Admission Control and Resource Requirements

If deploying to an existing EKS cluster, ensure that admission webhooks allow the creation of the following Kubernetes resources:

Kubernetes API: Service (LoadBalancer type)

Purpose: NATS is a core component of the CodeMie Plugin Engine, providing messaging infrastructure for communication between the codemie-plugins CLI tool with MCP and the AI/Run CodeMie platform.

The LoadBalancer configuration depends on where the CLI tool will be executed:

CLI Tool Execution LocationLoadBalancer TypeDescription
Same VPC as EKS clusterInternal LoadBalancerSecure, private network communication within the VPC
External to EKS VPCPublic LoadBalancerCross-network communication when CLI is run outside the VPC

Deployment Machine Requirements

Required Software Tools

The following tools must be pre-installed and properly configured on your deployment machine (laptop, workstation, or VDI instance):

ToolVersionPurpose
Terraform1.5.7Infrastructure as Code provisioning
kubectllatestKubernetes cluster management
Helm3.16.0+Kubernetes package management
gcloud CLIlatestAuthentication to AI/Run CodeMie container registry (GCR)
DockerlatestContainer operations
natsclilatestNATS messaging CLI
nsclatestNATS security configuration
jqlatestJSON processing and parsing
curllatestHTTP requests and file transfers
htpasswdlinux packagePassword hash generation

Cloud-Specific Tools:

ToolVersionPurpose
AWS CLIlatestAWS resource management

Required Repository Access

You will need access to the following repositories to complete the deployment:

Air-Gapped Environments

If your deployment machine operates in an isolated environment without direct internet or repository access, the repositories can be provided as ZIP/TAR archives and transferred through approved channels.

Next Steps

Once all prerequisites are met, proceed to the Architecture Overview to understand the deployment architecture, or continue directly to Infrastructure Deployment to begin the installation process.