You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Verify Cluster, Node Groups, EC2 Instances, IAM Policies and Node Groups
Step-01: Create EKS Cluster using eksctl
It will take 15 to 20 minutes to create the Cluster Control Plane
# Create Cluster
eksctl create cluster --name=eksdemo1 \
--region=us-east-1 \
--zones=us-east-1a,us-east-1b \
--without-nodegroup
# Get List of clusters
eksctl get cluster
Step-02: Create & Associate IAM OIDC Provider for our EKS Cluster
In the context of EKS, OIDC is used to integrate Kubernetes with AWS Identity and Access Management (IAM). The purpose of OIDC in EKS is to establish a trust relationship between the Kubernetes cluster and AWS IAM, allowing you to use IAM roles to manage access to your EKS cluster.
To enable and use AWS IAM roles for Kubernetes service accounts on our EKS cluster, we must create & associate OIDC identity provider.
To do so using eksctl we can use the below command.
Use latest eksctl version (as on today the latest version is 0.21.0)
Verify NodeGroup subnets to confirm EC2 Instances are in Public Subnet
Verify the node group subnet to ensure it created in public subnets
Go to Services -> EKS -> eksdemo -> eksdemo1-ng1-public
Click on Associated subnet in Details tab
Click on Route Table Tab.
We should see that internet route via Internet Gateway (0.0.0.0/0 -> igw-xxxxxxxx)
Verify Cluster, NodeGroup in EKS Management Console
Go to Services -> Elastic Kubernetes Service -> eksdemo1
List Worker Nodes
# List EKS clusters
eksctl get cluster
# List NodeGroups in a cluster
eksctl get nodegroup --cluster=<clusterName>
# List Nodes in current kubernetes cluster
kubectl get nodes -o wide
# Our kubectl context should be automatically changed to new cluster
kubectl config view --minify
Verify Worker Node IAM Role and list of Policies
Go to Services -> EC2 -> Worker Nodes
Click on IAM Role associated to EC2 Worker Nodes
Verify Security Group Associated to Worker Nodes
Go to Services -> EC2 -> Worker Nodes
Click on Security Group associated to EC2 Instance which contains remote in the name.
Verify CloudFormation Stacks
Verify Control Plane Stack & Events
Verify NodeGroup Stack & Events
Login to Worker Node using Keypai kube-demo
Login to worker node
# For MAC or Linux or Windows10
ssh -i kube-demo.pem ec2-user@<Public-IP-of-Worker-Node>
# For Windows 7
Use putty
Step-06: Update Worker Nodes Security Group to allow all traffic
We need to allow All Traffic on worker node security group