Skip to main content

Prerequisites

Before installing AI/Run CodeMie, review the prerequisites and requirements.

Prerequisites Checklist

GCP Account Access Requirements

  • Active GCP Account with administrative access

  • User credentials with role permissions to create and manage IAM Roles and Policy Documents

  • Enabled GCP APIs in your GCP project:

    info

    Make sure you are familiar with Gemini models, their parameters, available regions and other crucial details in Vertex AI documentation.

  • User needs to be able to bind the following roles to service accounts:

    • roles/aiplatform.user
    • roles/storage.admin
    • roles/cloudkms.cryptoKeyEncrypterDecrypter

Domain Name

External Connections

  • Firewall or VPC firewall rules of GKE cluster allow outbound access to:
    • AI/Run CodeMie container registry – europe-west3-docker.pkg.dev
    • 3rd party container registries – quay.io, docker.io, registry.developers.crunchydata.com
    • Any service you're planning to use with AI/Run CodeMie (for example, GitLab instance)
info

AI/Run CodeMie can be deployed with mock LLM configurations initially. Real configurations can be provided later if client-side approvals require additional time.

User Permissions and Admission Control Requirements for GKE

  • Admin GKE permissions with rights to create namespaces

  • Admission webhook allows creation of Kubernetes resources listed below (applicable when deploying onto an existing GKE cluster with enforced policies):

AI/Run CodeMie ComponentKubernetes APIsDescription
NATSServiceNATS messaging system requires a LoadBalancer service type for client-server communication. When running codemie-plugins:
– within the same VPC as the EKS cluster – Internal LoadBalancer configured for secure, private network communication
– outside the EKS cluster's VPC – Public LoadBalancer required for cross-network communication
keycloak-operatorClusterRole, ClusterRoleBinding, Role, RoleBinding, CRDs, CRsCluster-wide permissions required for managing Keycloak configuration, including realms, clients, and user federation settings
Postgres-operatorClusterRole, ClusterRoleBinding, CRDs, CRsCluster-wide permissions required for managing PostgreSQL instances and their lifecycle
All componentsPod(securityContext)All components require SecurityContext with readOnlyRootFilesystem: false for proper operation

Deployer Instance Requirements

info

Repositories can be extracted as archives and uploaded to a VDI if direct repository access is not available.