1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82
| [centos@ip-10-100-4-240 ~]$ cat /data/shelley/cluster.yaml apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig metadata: name: cs-k8s-cluster region: us-west-2 version: '1.16' tags: 'Owner': 'SoftwareDevDept' vpc: id: "vpc-05b756b29c94fef66" # (optional, must match VPC ID used for each subnet below) cidr: "10.100.0.0/16" # (optional, must match CIDR used by the given VPC) subnets: # must provide 'private' and/or 'public' subnets by availibility zone as shown public: us-west-2a: id: "subnet-093837539ccacaae8" cidr: "10.100.0.0/19" # (optional, must match CIDR used by the given subnet) us-west-2b: id: "subnet-0b6b35e29c009928a" cidr: "10.100.32.0/19" # (optional, must match CIDR used by the given subnet) us-west-2c: id: "subnet-01e3bfde4755f67e2" cidr: "10.100.64.0/19" # (optional, must match CIDR used by the given subnet) us-west-2d: id: "subnet-0286c131713e85585" cidr: "10.100.96.0/19" # (optional, must match CIDR used by the given subnet) private: us-west-2a: id: "subnet-0ca641ee980ff32f9" cidr: "10.100.128.0/19" # (optional, must match CIDR used by the given subnet) us-west-2b: id: "subnet-08c29d1387063d44e" cidr: "10.100.160.0/19" # (optional, must match CIDR used by the given subnet) us-west-2c: id: "subnet-09c6c0901fb5237a4" cidr: "10.100.192.0/19" # (optional, must match CIDR used by the given subnet) us-west-2d: id: "subnet-00d5c0082c082cf54" cidr: "10.100.224.0/19" # (optional, must match CIDR used by the given subnet)
iam: serviceRoleARN: "arn:aws:iam::211394563914:role/eksServiceRole" managedNodeGroups: - name: managed-public labels: { role: public } availabilityZones: ["us-west-2a", "us-west-2b", "us-west-2c", "us-west-2d"] instanceType: t2.medium minSize: 1 maxSize: 5 desiredCapacity: 1 volumeSize: 100 tags: 'Owner': 'SoftwareDevDept' 'snapshot_days': '7' ssh: allow: true publicKeyName: "Oregon_k8s" sourceSecurityGroupIds: ["sg-029e90d289e61032a"] - name: managed-private labels: { role: private } availabilityZones: ["us-west-2a", "us-west-2b", "us-west-2c", "us-west-2d"] instanceType: t2.medium privateNetworking: true minSize: 1 maxSize: 10 desiredCapacity: 1 volumeSize: 100 tags: 'Owner': 'SoftwareDevDept' 'snapshot_days': '7' ssh: allow: true publicKeyName: "Oregon_k8s" sourceSecurityGroupIds: ["sg-029e90d289e61032a"] cloudWatch: clusterLogging: # enable specific types of cluster control plane logs enableTypes: ["audit", "authenticator", "controllerManager", "api", "scheduler"] # all supported types: "api", "audit", "authenticator", "controllerManager", "scheduler" # supported special values: "*" and "all" [centos@ip-10-100-4-240 ~]$ eksctl create cluster -f cluster.yaml
|