All Projects → marcincuber → eks

marcincuber / eks

Licence: other
AWS EKS - kubernetes project

Programming Languages

HCL
1544 projects
python
139335 projects - #7 most used programming language
Makefile
30231 projects
shell
77523 projects

Projects that are alternatives of or similar to eks

Eksctl
The official CLI for Amazon EKS
Stars: ✭ 3,550 (+2282.55%)
Mutual labels:  aws-eks, eks
eks-hpa-profile
An eksctl gitops profile for autoscaling with Prometheus metrics on Amazon EKS on AWS Fargate
Stars: ✭ 26 (-82.55%)
Mutual labels:  eks, metrics-server
aws-eks-orb
An orb to simplify deployments to Amazon Elastic Container Service for Kubernetes (Amazon EKS)
Stars: ✭ 16 (-89.26%)
Mutual labels:  aws-eks, eks
eks-with-istio
Terraform template for a production ready EKS Cluster and ISTIO Service Mesh 🐳 📦 🚀
Stars: ✭ 32 (-78.52%)
Mutual labels:  cluster-autoscaler, eks
ecs-drain-lambda
Automation of Draining ECS instances with Lambda, based on Autoscaling Group Lifecycle hooks or Spot Instance Interruption Notices
Stars: ✭ 56 (-62.42%)
Mutual labels:  lambda, ec2-spot
aws-eks-accelerator-for-terraform
Configure and deploy complete EKS clusters.
Stars: ✭ 1,220 (+718.79%)
Mutual labels:  cluster-autoscaler, eks
eksutil
Sample project to call Kubernetes API of an Amazon EKS cluster from AWS Lambda
Stars: ✭ 26 (-82.55%)
Mutual labels:  lambda, eks
terraform-aws-eks-node-group
Terraform module to provision EKS Managed Node Group
Stars: ✭ 14 (-90.6%)
Mutual labels:  aws-eks, eks
py-lambda-action
A Github Action to deploy AWS Lambda functions written in Python with their dependencies in a separate layer.
Stars: ✭ 49 (-67.11%)
Mutual labels:  lambda
IdentityServer4.PhoneNumberAuth
Sample passwordless phone number authentication using OAuth in ASP.NET Core 2.2
Stars: ✭ 83 (-44.3%)
Mutual labels:  oidc
java-functional-features-tutorial
This repo is DEPRECATED. Please use https://github.com/bobocode-projects/java-fundamentals-course
Stars: ✭ 15 (-89.93%)
Mutual labels:  lambda
amazon-eventbridge-producer-consumer-example
A simple producer/consumer example for Amazon EventBridge. Questions? @jbesw.
Stars: ✭ 49 (-67.11%)
Mutual labels:  lambda
ekz
An EKS-D Kubernetes distribution for desktop
Stars: ✭ 87 (-41.61%)
Mutual labels:  eks
recipeek
🍽️ Recipe search app
Stars: ✭ 20 (-86.58%)
Mutual labels:  lambda
serverless-plugin-bespoken
⚡ Serverless plugin to use our bst proxy tool
Stars: ✭ 29 (-80.54%)
Mutual labels:  lambda
serverless-email-scheduler
Schedule future emails with AWS Lambda and Step Functions
Stars: ✭ 29 (-80.54%)
Mutual labels:  lambda
ebs-backup
Backup EBS Volumes
Stars: ✭ 34 (-77.18%)
Mutual labels:  lambda
iskan
Kubernetes Native, Runtime Container Image Scanning
Stars: ✭ 35 (-76.51%)
Mutual labels:  eks
schematics
Schematics for adding Okta Auth to your projects
Stars: ✭ 60 (-59.73%)
Mutual labels:  oidc
eks-nvme-ssd-provisioner
EKS NVMe SSD provisioner for Amazon EC2 Instance Stores
Stars: ✭ 50 (-66.44%)
Mutual labels:  eks

EKS

Implementation of EKS setup using Terraform and Cloudformation. Fully functional templates to deploy your VPC and Kubernetes clusters together with all the essential tags and addons. Also, worker nodes are part of AutoScallingGroup which consists of spot and on-demand instances.

Templates support deployment to different AWS partitions. I have tested it with public and china partitions. I am actively using this configuration to run EKS setup in Ireland(eu-west-1), North Virginia(us-east-1) and Beijing(cn-north-1).

terraform-aws and terraform-k8s templates

Latest configuration templates used by me can be found in terraform-aws for aws provider and terraform-k8s for kubernetes provider. Once you configure your environment variables in ./terraform-aws/vars ./terraform-k8s/vars, you can use makefile commands to run your deployments. Resources that will be created after applying templates:

You will find latest setup of following components:

  1. VPC with public/private subnets, enabled flow logs and VPC endpoints for ECR and S3
  2. EKS controlplane
  3. EKS worker nodes in private subnets (spot and ondemnd instances based on variables)
  4. Option to used Managed Node Groups
  5. Dynamic basion host
  6. Automatically configure aws-auth configmap for worker nodes to join the cluster
  7. OpenID Connect provider which can be used to assign IAM roles to service accounts in k8s
  8. NodeDrainer lambda which will drain worker nodes during rollingUpdate of the nodes (This is only applicable to spot worker nodes, managed node groups do not require this lambda). Node drainer lambda is maintained in https://github.com/marcincuber/tf-k8s-node-drainer
  9. IAM Roles for service accounts such as aws-node, cluster-autoscaler, alb-ingress-controller, external-secrets (Role arns are used when you deploy kubernetes addons with Service Accounts that make use of OIDC provider)
  10. For spot termination handling use aws-node-termination-handler from k8s_templates/aws-node-termination-handler.
  11. EKS cluster add-ons (CoreDNS + kube-proxy)

Kubernetes YAML templates

All the templates for additional deployments/daemonsets can be found in k8s_templates.

To apply templates simply run kubectl apply -f . from a desired folder. Ensure to put in correct Role arn in service accounts configuration. Also, check that environment variables are correct.

You will find templates for the following Kubernetes components:

  • ALB ingress controller
  • AWS Load Balancer controller
  • AWS node termination handler
  • Calico
  • Cert Manager
  • Cluster Autoscaler
  • CoreDns
  • Dashboard
  • External-DNS
  • External Secrets
  • Kube Proxy
  • Kube2iam
  • Metrics server
  • NewRelic
  • Reloader
  • Spot Interrupt Handler
  • Vertical Pod Autoscaler with cert-manager certificate
  • VPC CNI Plugin
  • Secrets CSI Driver

Docs and other additional resources

Check out my stories on medium if you interested in finding out more on specific topics.

Amazon EKS upgrade 1.21 to 1.22

Amazon EKS upgrade journey from 1.21 to 1.22

Amazon EKS upgrade 1.20 to 1.21

Amazon EKS upgrade journey from 1.20 to 1.21

Amazon EKS upgrade 1.19 to 1.20

Amazon EKS upgrade journey from 1.19 to 1.20

Amazon EKS upgrade 1.18 to 1.19

Amazon EKS upgrade journey from 1.18 to 1.19

Amazon EKS upgrade 1.17 to 1.18

Amazon EKS upgrade journey from 1.17 to 1.18

Amazon EKS upgrade 1.16 to 1.17

Amazon EKS upgrade journey from 1.16 to 1.17

Amazon EKS upgrade 1.15 to 1.16

Amazon EKS upgrade journey from 1.15 to 1.16

Amazon EKS Addons

Amazon EKS Addons

EKS + Kube-bench

Kube-bench implementation with EKS

Amazon EKS design, use of spot instances and cluster scaling

More about my configuration can be found in the blog post I have written recently -> EKS design

IAM Roles for specific namespaces

Amazon EKS- RBAC with IAM access

IAM Roles for service accounts using OpenID Connect

Using OIDC provider to allow service accounts to assume IAM role

Kube2iam

More about kube2iam configuration can be found in the blog post I have written recently -> EKS and kube2iam

External DNS

Amazon EKS, setup external DNS with OIDC provider and kube2iam

EKS Managed Node Groups

Amazon EKS + managed node groups

Terraform module written by me can be found in -> https://registry.terraform.io/modules/umotif-public/eks-node-group

Gitlab runners on EKS

Kubernetes GitLab Runners on Amazon EKS

Useful resources

EKS platforms information Worker nodes upgrades

Generate kubeconfig file

On user's machine who has been added to EKS, they can configure .kube/config file using the following command:

$ aws eks list-clusters
$ aws eks update-kubeconfig --name ${cluster_name}
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].