forked from kubernetes-sigs/kind
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CLOUD-46] fully private aws/eks #425
Open
lreciomelero
wants to merge
33
commits into
Stratio:master
Choose a base branch
from
lreciomelero:feature/CLOUD-46_fully-private-aws
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
[CLOUD-46] fully private aws/eks #425
lreciomelero
wants to merge
33
commits into
Stratio:master
from
lreciomelero:feature/CLOUD-46_fully-private-aws
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
mark release v0.17.0
fix kind version in readme
…e-buildcontext comments-update-buildcontext
Branch 0.17.0 0.1
…re/CLOUD-46_fully-private-aws
…om/lreciomelero/kind into feature/CLOUD-46_fully-private-aws
lreciomelero
changed the title
[CLOUDS-46] fully private aws/eks
[CLOUD-46] fully private aws/eks
Feb 26, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Para probar esta PR se ha generado una AMI en AWS de la que será necesario lanzar el bastión. En ella ya se encuentran todos los ficheros necesarios y sw instalado. La AMI es: offline-bastion-ami.
En ella encontramos, bajo el path: /home/ubuntu, en binario cloud-provisioner, secrets.yml y los descriptores tanto para aws como eks, con los que realizar las pruebas. Además de la imagen de stratio-capi ya construida.
En la creación de la máquina EC2, se tiene que tener en cuenta:
4.1. Seleccionar la VPC de offline-vpc
4.2. Subnet offline-public-subnet-1a
4.3. Asignar automáticamente la IP pública habilitado
4.4. Asignar sg: offline-demo-bastion-sg
5.1. Metadatos accesibles habilitado
Una vez se haya creado la EC2 y el par de claves ya podrías comenzar a probar.
En esta PR, junto a su parte del cluster-operator: https://github.com/Stratio/cluster-operator/pull/157. Se añade la funcionalidad de clusters fully-private en AWS VMs y EKS. Para ello, se han añadido 2 campos al keoscluster:
Y cobra mayor importancia el campo spec.private_registry de clusterConfig.
AWS VMS
Para instalar cluster fully private en AWS VMS es necesario indicar el campo spec.controlplane.public a false, de esta forma el lb que expone los controlplane tendra esquema internal, en lugar de internet-facing. Por otro lado, puesto que se debe instalar en VMs sin salida a internet, es necesario que spec.private_registry sea true, de modo que las imágenes del cluster se recuperen de un registry privado.
EKS
En EKS, además de lo mencionado para AWS VMS, es necesario indicar el campo spec.networks.additional_sg_id para permitir que los distintos workers se comuniquen con los cp y se unan al cluster. Este sg debe permitir todo el tráfico en la VPC y en este caso ya se encuentra creado: offline-sg-eks