Overview
This page covers the original Terraform-based Amazon EKS deployment path. It is documented for customers who deployed Poolside before the Helm-based path became the default and who have not yet migrated. In this path, you run Poolside-provided deployment containers and scripts in your AWS account to create and manage the infrastructure, provision Kubernetes resources, and deploy the platform. You can use either local GPU-backed inference or Amazon Bedrock for model inference.Model options
Local GPU inference
Run the platform on Amazon EKS and serve models from GPU-backed inference workloads in your cluster.
Amazon Bedrock
Run the platform on Amazon EKS and use Amazon Bedrock for model inference without local GPU nodes.
Deployment management
Poolside provides the deployment bundle, deployment containers, and documentation for this path. You run the installation, update, and removal workflow in your AWS account.Regional availability
You can configure this deployment path in any AWS region that supports the required services. For local GPU inference, the deployment region must support the required GPU instance types and the rest of the AWS platform services that Poolside uses. For Amazon Bedrock, the deployment region must support Amazon Bedrock and the Poolside models you plan to use. For cross-region Amazon Bedrock deployments and data handling considerations, see Amazon Bedrock data privacy.Costs
For a breakdown of AWS infrastructure and inference costs that applies to both the Helm-based and Terraform-based paths, see AWS cost modeling.Security
In this deployment path:- Deploying Poolside does not require
rootaccess. Follow AWS best practices for securing the root user. - Protect AWS resources used by Poolside, such as Amazon S3 and Amazon RDS, with appropriate access controls because they contain sensitive data.
- Supported AWS deployment modalities encrypt data at rest by default. Poolside uses customer-managed AWS Key Management Service (KMS) keys when provided. Otherwise, it falls back to AWS-managed KMS keys for each service.
- The deployment stores the secrets and credentials that Poolside requires in AWS Systems Manager Parameter Store. AWS Secrets Manager is not supported for this path, and external credential rotation can disrupt service operation.
Backup and recovery
AWS provides infrastructure availability features, but you are responsible for implementing and testing backup and disaster recovery procedures for your deployment. When you plan backup and recovery, pay particular attention to:- model artifacts stored in Amazon S3
- database state in Amazon RDS
- deployment configuration
- container images stored in Amazon ECR