eks-quickstart | AWS Cloud Development Kit and the AWS Elastic | Continuous Deployment library
kandi X-RAY | eks-quickstart Summary
kandi X-RAY | eks-quickstart Summary
This project is an example of how you can combine the AWS Cloud Development Kit (CDK) and the AWS Elastic Kubernetes Serivce (EKS) to quickly deploy a more complete and "production ready" Kubernetes environment on AWS. I describe it a bit more in a recent blog post -
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of eks-quickstart
eks-quickstart Key Features
eks-quickstart Examples and Code Snippets
Community Discussions
Trending Discussions on eks-quickstart
QUESTION
We're trying to setup logging using an EKS cluster. We're currently running a cluster with a single EC2 instance. AWS has provided kubectl commands that create the necessary kubernetes config.
When applying this to our existing EKS setup, we cannot properly define the instance role that has the permissions to write to CloudWatch.
the cloudwatch agent shows these errors in its pod logs:
...ANSWER
Answered 2020-Jan-27 at 23:07You can set the policy after creating the cluster on the DefaultCapacity
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install eks-quickstart
You can either deploy this from your machine or leverge CodeBuild.
We've deployed Flux to deploy - and then keep in sync via GitOps - our default Gatekeeper policies and constraints. In order for that to work, though, we'll need to get the SSH key that Flux generated and add it to GitHub to give us the required access.
Connect to the Bastion via Systems Manager Session Manager or code-server
Run fluxctl identity --k8s-fwd-ns kube-system
Take the SSH key that has been ouput and add it to GitHub by following these instructions - https://docs.github.com/en/github/authenticating-to-github/adding-a-new-ssh-key-to-your-github-account
(Optional) If you don't want to wait up to 5 minutes for Flux to sync you can run fluxctl sync --k8s-fwd-ns kube-system
If you set deploy_vpn to True in eks_cluster.py then the template will deploy a Client VPN. Note that you'll also need to create client and server certificates and upload them to ACM by following these instructions - https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/client-authentication.html#mutual - and update ekscluster.py with the certificate ARNs for this to work.
Open the AWS VPC Console and go to the Client VPN Endpoints on the left panel
Click the Download Client Configuration button
Edit the downloaded file and add: A section at the bottom for the server cert in between and Then under that a section for the client private key between and
Install the AWS Client VPN Client - https://aws.amazon.com/vpn/client-vpn-download/
Create a new profile pointing it at that configuration file
Connect to the VPN
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page