GitXplorerGitXplorer
m

eks

public
300 stars
165 forks
0 issues

Commits

List of commits on branch main.
Verified
8ca8603a8efe0edc66d4f0c4ce1bdceb1320c0ac

Update README.md

mmarcincuber committed 2 months ago
Verified
b2f38148f485345cdefb6c0c8798edb9af5458d0

Update eks-nodes-karpenter.tf

mmarcincuber committed 2 months ago
Verified
ce5171f21a2ffa452cc5f56478c4a564e82ae5ba

Update eks-managed-node-group-al2023.tf

mmarcincuber committed 2 months ago
Verified
78800a4e516843abc54b81433ceea4bc48410800

Update eks-cluster.tf managed policy block

mmarcincuber committed 2 months ago
Verified
6d0c49f2ee991ec54b61b5aa636d22c7f3922d03

Updates to vpc and vpc endpoints

mmarcincuber committed 2 months ago
Verified
328573ae6beffe121971c77e81e67fa3ddfd5e8d

Update versions.tf

mmarcincuber committed 2 months ago

README

The README file for this repository.

EKS

Implementation of EKS setup using Terraform. Terraform module located in terraform directory supports deployment to different AWS partitions. I have tested it with commercial and china partitions. I am actively using this configuration to run EKS setup in Ireland(eu-west-1), London(eu-west-2), North Virginia(us-east-1) and Beijing(cn-north-1).

Module details

Module creates:

  • VPC
  • VPC Endpoints- S3, ECR, STS, APS, GuardDuty
  • EKS Cluster
  • EKS Node Group to run cluster critical services
  • EKS Addons- coredns, kube-proxy, guardduty, aws-ebs-csi-driver, adot (requires cert-manger to be installed), kubecost, cloudwatch observability, snapshot-controller and identity agent
  • IAM Roles for worker nodes and Karpenter nodes
  • Additional IAM Roles for operators- load-balancer-controller, external-dns, cert-manager, adot-collector
  • SQS queue configuration to be used with Karpeneter while utlising Spot Instances.
  • CloudWatch log groups used by container insights.

Kubernetes addons and operators

I am utilising Flux2 to deploy all additional configurations. You can find them at https://github.com/marcincuber/kubernetes-fluxv2 I have built this as a separate repository to show how to develop a successful configuration for your own cluster using GitOps FluxV2 and Helm.

You will find configurations for:

  • AWS Load Balancer controller
  • AWS node termination handler
  • Cert Manager
  • External-DNS
  • External Secrets Operator
  • Metrics server
  • Reloader
  • VPC CNI Plugin
  • EBS CSI Driver
  • and more :)

Docs and other additional resources

Check out my stories on Medium if you want to learn more about specific topics.

Amazon EKS upgrade 1.30 to 1.31

Amazon EKS upgrade journey from 1.30 to 1.31

Amazon EKS upgrade 1.29 to 1.30

Amazon EKS upgrade journey from 1.29 to 1.30

Amazon EKS upgrade 1.28 to 1.29

Amazon EKS upgrade journey from 1.28 to 1.29

Amazon EKS upgrade 1.27 to 1.28

Amazon EKS upgrade journey from 1.27 to 1.28

Amazon EKS upgrade 1.26 to 1.27

Amazon EKS upgrade journey from 1.26 to 1.27

Amazon EKS upgrade 1.25 to 1.26

Amazon EKS upgrade journey from 1.25 to 1.26

Recover image from EKS node and push it back to ECR

Recovering Images from EKS node back to ECR

Karpenter Upgrade guide from Beta to v1 API version

Karpenter Upgrade guide from Beta to v1 API version

Karpenter Upgrade guide from alpha to beta API version

Migrate Karpenter resources from alpha to beta API version

Amazon EKS Addons

Amazon EKS Addons

EKS + Kube-bench

Kube-bench implementation with EKS

EKS and ECR Pull-through cache implementation using Terraform

ECR pull through cache for DockerHub, Github, Quay, ECR public and kubernetes

Amazon EKS design, use of spot instances, and cluster scaling

More about my configuration can be found in the blog post I have written recently -> EKS design

IAM Roles for specific namespaces

Amazon EKS- RBAC with IAM access

IAM Roles for service accounts using OpenID Connect

Using OIDC provider to allow service accounts to assume IAM role

External DNS

Amazon EKS, setup external DNS with OIDC provider and kube2iam

EKS Managed Node Groups

Amazon EKS + managed node groups

Terraform module written by me can be found in -> https://registry.terraform.io/modules/umotif-public/eks-node-group

Gitlab runners on EKS

Kubernetes GitLab Runners on Amazon EKS

Useful resources

EKS platforms information Worker nodes upgrades

Generate kubeconfig file

On user's machine who has been added to EKS, they can configure .kube/config file using the following command:

$ aws eks list-clusters
$ aws eks update-kubeconfig --name ${cluster_name}