Create your first EKS Cluster using AWS Management Console

From wikieduonline
Revision as of 20:50, 18 May 2022 by Welcome (talk | contribs) (Created page with ":0) Prerequisites: <code>kubectl</code> and <code>aws-iam-authenticator</code> (a tool to authenticate to Kubernetes using AWS IAM credentials)<ref>https://docs.aws.am...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
0) Prerequisites: kubectl and aws-iam-authenticator (a tool to authenticate to Kubernetes using AWS IAM credentials)[1]
On macOS: brew install aws-iam-authenticator and brew install kubernetes-cli
1) Create a new service role
2) Create a new VPC for you new EKS Cluster using this CloudFormation template from AWS: https://docs.aws.amazon.com/eks/latest/userguide/getting-started.html
3) Create EKS Cluster from AWS Webconsole, user used for creating EKS Cluster will be the initial administrator.
4) Create Worker Nodes using AWS Cloudformation template https://github.com/awslabs/amazon-eks-ami/blob/master/amazon-eks-nodegroup.yaml
5) Install Kubernetes dashboard[2]

See also:


EKS, eksctl, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize, aws-iam-authenticator, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage, aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s, EKS security, EKS Best Practices Guides, hardeneks, EKS versions, fargate-scheduler, eks-connector, Resilience in Amazon EKS, EKS control plane logging, Security groups for Pods in EKS

Advertising: