This document highlights special considerations when using Amazon Elastic Kubernetes Service (EKS) in your team development AWS accounts.
Review Note: This is a draft document.
eksctl CLI to Create a Clustereksctl and kubectl per Getting Started with eksctl.
eksctl version 0.14.0 so that permissions boundary support is available.eksctl does not get installed, you might need to replace the latest_release portion of the download path with the explicit version of interest. For example, 0.14.0.VPC service within the AWS Management Console.eksctl.nikki-cluster.yml
apiVersion: eksctl.io/v1alpha5
kind: ClusterConfig
metadata:
name: nikki-dev
region: us-east-2
iam:
serviceRolePermissionsBoundary: arn:aws:iam::123456789012:policy/example-dev-infra-team-boundary
fargatePodExecutionRolePermissionsBoundary: arn:aws:iam::123456789012:policy/example-dev-infra-team-boundary
vpc:
subnets:
public:
us-east-2a: { id: subnet-... }
us-east-2b: { id: subnet-... }
us-east-2c: { id: subnet-... }
private:
us-east-2a: { id: subnet-... }
us-east-2b: { id: subnet-... }
us-east-2c: { id: subnet-... }
nodeGroups:
- name: ng-1
instanceType: m5.large
desiredCapacity: 1
iam:
instanceRolePermissionsBoundary: arn:aws:iam::123456789012:policy/example-dev-infra-team-boundary
create cluster:./eksctl create cluster --config-file nikki-cluster.yml
$ aws eks --region us-east-2 describe-cluster --name nikki-dev --query cluster.status