...at an AWS event

Running the workshop at an AWS Event

Only complete this section if you are at an AWS hosted event (such as re:Invent, Kubecon, Immersion Day, or any other event hosted by an AWS employee). If you are running the workshop on your own, go to: Start the workshop on your own.

Login to the AWS Workshop Portal

If you are at an AWS event, an AWS account was created for you to use throughout the workshop. You will need the Event access code provided to you by the event’s organizers.

  1. Connect to the portal by browsing to Workshop Studio.
  2. Sign in by clicking on the Email one-time password (OTP) button.
  3. Enter your email address in the text box, and click Send Passcode. You should receive a passcode within 5 minutes. Enter the passcode in the text box, and click Sign in*.
  4. Enter the Event access code in the text box, and click Next
  5. Review the Terms and Conditions and check the I agree with the Terms and Conditions box, and click Join event
  6. In the left panel, click Open AWS console

You are now logged in to the AWS console in an account that was created for you, and will be available only throughout the workshop run time.

In the interest of time we have deployed everything required to run Karpenter for this workshop. All the pre-requisites and dependencies have been deployed. The resources deployed can befound in this CloudFormation Template (eks-spot-workshop-quickstarter-cnf.yml). The template deploys resourcess such as (a) An AWS Cloud9 workspace with all the dependencies and IAM privileges to run the workshop (b) An EKS Cluster with the name eksworkshop-eksctl and (c) a EKS managed node group with 2 on-demand instances.

Getting access to Cloud9

In this workshop, you’ll need to reference the resources created by the CloudFormation stack.

  1. On the AWS CloudFormation console, select the stack name eks-spot-workshop-quickstart-cnf in the list.

  2. In the stack details pane, click the Outputs tab.


It is recommended that you keep this tab / window open so you can easily refer to the outputs and resources throughout the workshop.

you will notice additional Cloudformation stacks were also deployed which is the result of the stack that starts with mod-. One to deploy the Cloud9 Workspace and two other to create the EKS cluster and managed nodegroup.

Launch your Cloud9 workspace

  • Click on the url against Cloud9IDE from the outputs
  • When it comes up, customize the environment by closing the welcome tab and lower work area, and opening a new terminal tab in the main work area: c9before

  • Your workspace should now look like this: c9after

  • If you like this theme, you can choose it yourself by selecting View / Themes / Solarized / Solarized Dark in the Cloud9 workspace menu.

Note: Cloud9 normally manages IAM credentials dynamically. This isn’t currently compatible with the EKS IAM authentication, so we will disable it and rely on the IAM role instead. To do so, run the following commands in the Cloud9 workspace:

aws cloud9 update-environment --environment-id ${C9_PID} --managed-credentials-action DISABLE
rm -vf ${HOME}/.aws/credentials

Validate the IAM role

Use the GetCallerIdentity CLI command to validate that the Cloud9 IDE is using the correct IAM role.

aws sts get-caller-identity

The output assumed-role name should contain:



If the Arn contains the role name from above and an Instance ID, you may proceed.

    "Account": "123456789012", 
    "UserId": "AROA1SAMPLEAWSIAMROLE:Participant", 
    "Arn": "arn:aws:sts::123456789012:assumed-role/WSParticipantRole/Participant"

You are now ready to Test the Cluster