automation-suite
2023.10
false
- Overview
- Requirements
- Installation
- Post-installation
- Migration and upgrade
- Upgrading Automation Suite on EKS/AKS
- Step 1: Moving the Identity organization data from standalone to Automation Suite
- Step 2: Restoring the standalone product database
- Step 3: Backing up the platform database in Automation Suite
- Step 4: Merging organizations in Automation Suite
- Step 5: Updating the migrated product connection strings
- Step 6: Migrating standalone Orchestrator
- Step 7: Migrating standalone Insights
- Step 8: Deleting the default tenant
- Performing a single tenant migration
- Migrating from Automation Suite on Linux to Automation Suite on EKS/AKS
- Monitoring and alerting
- Cluster administration
- Product-specific configuration
- Troubleshooting
- The backup setup does not work due to a failure to connect to Azure Government
- Pods in the uipath namespace stuck when enabling custom node taints
- Unable to launch Automation Hub and Apps with proxy setup
- Pods cannot communicate with FQDN in a proxy environment
- Test Automation SQL connection string is ignored
- EKS backup failure due to Velero version

Automation Suite on EKS/AKS installation guide
Last updated Dec 4, 2025
If you use a proxy setup, you may run into issues when trying to launch Automation Hub and Apps.
You can fix the issue by taking the following steps:
-
Capture the existing
corednsconfigmap from the running cluster:kubectl get configmap -n kube-system coredns -o yaml > coredns-config.yamlkubectl get configmap -n kube-system coredns -o yaml > coredns-config.yaml - Edit the
coredns-config.yamlfile to append the FQDN rewrite to the config.-
Rename the configmap to
coredns-custom. - Apply the correct configuration depending on your platform:
- For AKS, define a new CoreDNS zone for the FQDN, as shown in the following example:
apiVersion: v1 kind: ConfigMap metadata: name: coredns-custom namespace: kube-system data: <FQDN>.server: | <FQDN>:53 { errors log health rewrite stop { name exact <FQDN> istio-ingressgateway.istio-system.svc.cluster.local } kubernetes cluster.local in-addr.arpa ip6.arpa { pods insecure fallthrough in-addr.arpa ip6.arpa } prometheus :9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance }apiVersion: v1 kind: ConfigMap metadata: name: coredns-custom namespace: kube-system data: <FQDN>.server: | <FQDN>:53 { errors log health rewrite stop { name exact <FQDN> istio-ingressgateway.istio-system.svc.cluster.local } kubernetes cluster.local in-addr.arpa ip6.arpa { pods insecure fallthrough in-addr.arpa ip6.arpa } prometheus :9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance } - For EKS, it is enough to add only the rewrite block to the existing CoreDNS Corefile:
rewrite stop { name exact <FQDN> istio-ingressgateway.istio-system.svc.cluster.local }rewrite stop { name exact <FQDN> istio-ingressgateway.istio-system.svc.cluster.local }
- For AKS, define a new CoreDNS zone for the FQDN, as shown in the following example:
-
-
Create the
coredns-customconfigmap:kubectl apply -f coredns-config.yamlkubectl apply -f coredns-config.yaml -
Replace the volume reference from
corednstocoredns-customin thecorednsdeployment inkube-systemnamespace:volumes: - emptyDir: {} name: tmp - configMap: defaultMode: 420 items: - key: Corefile path: Corefile name: coredns-custom name: config-volumevolumes: - emptyDir: {} name: tmp - configMap: defaultMode: 420 items: - key: Corefile path: Corefile name: coredns-custom name: config-volume -
Restart the
corednsdeployment and ensure thecorednspods are up and running without any issues:kubectl rollout restart deployment -n kube-system corednskubectl rollout restart deployment -n kube-system coredns -
You should now be able to launch Automation Hub and Apps.