Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Devops Exercises | 58,297 | a day ago | 50 | other | Python | |||||
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions | ||||||||||
Pulumi | 17,679 | 132 | 481 | 17 hours ago | 3,897 | July 26, 2023 | 1,952 | apache-2.0 | Go | |
Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀 | ||||||||||
Kubespray | 14,492 | 18 hours ago | 215 | apache-2.0 | Jinja | |||||
Deploy a Production Ready Kubernetes Cluster | ||||||||||
Awesome Kubernetes | 14,249 | 12 days ago | 7 | other | Shell | |||||
A curated list for awesome kubernetes sources :ship::tada: | ||||||||||
Terraformer | 10,831 | 1 | 2 days ago | 20 | November 15, 2021 | 63 | apache-2.0 | Go | ||
CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code | ||||||||||
Devops Resources | 7,566 | 2 months ago | 14 | Groovy | ||||||
DevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP | ||||||||||
Ansible For Devops | 7,491 | 6 days ago | 92 | mit | Python | |||||
Ansible for DevOps examples. | ||||||||||
Metaflow | 6,995 | 1 | 19 | 15 hours ago | 91 | July 17, 2023 | 295 | apache-2.0 | Python | |
:rocket: Build and manage real-life data science projects with ease! | ||||||||||
External Dns | 6,702 | 9 | 19 hours ago | 137 | May 24, 2023 | 244 | apache-2.0 | Go | ||
Configure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services | ||||||||||
Docker Android | 6,115 | 8 days ago | 84 | other | Python | |||||
Android in docker solution with noVNC supported and video recording |
eksctl
- The official CLI for Amazon EKS ! eksctl
is a simple CLI tool for creating clusters on EKS - Amazon's new managed Kubernetes service for EC2. It is written in Go, and uses CloudFormation.
You can create a cluster in minutes with just one command eksctl create cluster
!
Need help? Join Eksctl Slack.
eksctl
is available to install from official releases as described below. We recommend that you install eksctl
from only the official GitHub releases. You may opt to use a third-party installer, but please be advised that AWS does not maintain nor support these methods of installation. Use them at your own discretion.
You will need to have AWS API credentials configured. What works for AWS CLI or any other tools (kops, Terraform, etc.) should be sufficient. You can use ~/.aws/credentials
file
or environment variables. For more information read AWS documentation.
You will also need AWS IAM Authenticator for Kubernetes command (either aws-iam-authenticator
or aws eks get-token
(available in version 1.16.156 or greater of AWS CLI) in your PATH
.
The IAM account used for EKS cluster creation should have these minimal access levels.
AWS Service | Access Level |
---|---|
CloudFormation | Full Access |
EC2 | Full: Tagging Limited: List, Read, Write |
EC2 Auto Scaling | Limited: List, Write |
EKS | Full Access |
IAM | Limited: List, Read, Write, Permissions Management |
Systems Manager | Limited: List, Read |
The inline policy json is listed in Minimal IAM Policies.
To download the latest release, run:
# for ARM systems, set ARCH to: `arm64`, `armv6` or `armv7`
ARCH=amd64
PLATFORM=$(uname -s)_$ARCH
curl -sLO "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_$PLATFORM.tar.gz"
# (Optional) Verify checksum
curl -sL "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_checksums.txt" | grep $PLATFORM | sha256sum --check
tar -xzf eksctl_$PLATFORM.tar.gz -C /tmp && rm eksctl_$PLATFORM.tar.gz
sudo mv /tmp/eksctl /usr/local/bin
Make sure to unzip the archive to a folder in the PATH
variable.
Optionally, verify the checksum:
CertUtil
's output to the checksum file downloaded.REM Replace amd64 with armv6, armv7 or arm64
CertUtil -hashfile eksctl_Windows_amd64.zip SHA256
-eq
operator to get a True
or False
result:# Replace amd64 with armv6, armv7 or arm64
(Get-FileHash -Algorithm SHA256 .\eksctl_Windows_amd64.zip).Hash -eq ((Get-Content .\eksctl_checksums.txt) -match 'eksctl_Windows_amd64.zip' -split ' ')[0]
# for ARM systems, set ARCH to: `arm64`, `armv6` or `armv7`
ARCH=amd64
PLATFORM=windows_$ARCH
curl -sLO "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_$PLATFORM.zip"
# (Optional) Verify checksum
curl -sL "https://github.com/eksctl-io/eksctl/releases/latest/download/eksctl_checksums.txt" | grep $PLATFORM | sha256sum --check
unzip eksctl_$PLATFORM.zip -d $HOME/bin
rm eksctl_$PLATFORM.zip
The eksctl
executable is placed in $HOME/bin
, which is in $PATH
from Git Bash.
For every release and RC a container image is pushed to ECR repository public.ecr.aws/eksctl/eksctl
. Learn more about the usage on ECR Public Gallery - eksctl. For example,
docker run --rm -it public.ecr.aws/eksctl/eksctl version
brew tap weaveworks/tap
brew install weaveworks/tap/eksctl
port install eksctl
choco install eksctl
scoop install eksctl
To create a basic cluster, run:
eksctl create cluster
A cluster will be created with default parameters
m5.large
nodes (this instance type suits most common use-cases, and is good value for money)us-west-2
regionOnce you have created a cluster, you will find that cluster credentials were added in ~/.kube/config
. If you have kubectl
as well as aws-iam-authenticator
commands in your PATH
, you should be
able to use kubectl
. You will need to make sure to use the same AWS API credentials for this also. Check EKS docs for instructions.
Example output:
$ eksctl create cluster
[] eksctl version 0.143.0
[] using region eu-west-2
[] setting availability zones to [eu-west-2a eu-west-2c eu-west-2b]
[] subnets for eu-west-2a - public:192.168.0.0/19 private:192.168.96.0/19
[] subnets for eu-west-2c - public:192.168.32.0/19 private:192.168.128.0/19
[] subnets for eu-west-2b - public:192.168.64.0/19 private:192.168.160.0/19
[] nodegroup "ng-ac4c787c" will use "" [AmazonLinux2/1.25]
[] using Kubernetes version 1.25
[] creating EKS cluster "attractive-sculpture-1685534556" in "eu-west-2" region with managed nodes
[] will create 2 separate CloudFormation stacks for cluster itself and the initial managed nodegroup
[] if you encounter any issues, check CloudFormation console or try 'eksctl utils describe-stacks --region=eu-west-2 --cluster=attractive-sculpture-1685534556'
[] Kubernetes API endpoint access will use default of {publicAccess=true, privateAccess=false} for cluster "attractive-sculpture-1685534556" in "eu-west-2"
[] CloudWatch logging will not be enabled for cluster "attractive-sculpture-1685534556" in "eu-west-2"
[] you can enable it with 'eksctl utils update-cluster-logging --enable-types={SPECIFY-YOUR-LOG-TYPES-HERE (e.g. all)} --region=eu-west-2 --cluster=attractive-sculpture-1685534556'
[]
2 sequential tasks: { create cluster control plane "attractive-sculpture-1685534556",
2 sequential sub-tasks: {
wait for control plane to become ready,
create managed nodegroup "ng-ac4c787c",
}
}
[] building cluster stack "eksctl-attractive-sculpture-1685534556-cluster"
[] deploying stack "eksctl-attractive-sculpture-1685534556-cluster"
[] waiting for CloudFormation stack "eksctl-attractive-sculpture-1685534556-cluster"
[] building managed nodegroup stack "eksctl-attractive-sculpture-1685534556-nodegroup-ng-ac4c787c"
[] deploying stack "eksctl-attractive-sculpture-1685534556-nodegroup-ng-ac4c787c"
[] waiting for CloudFormation stack "eksctl-attractive-sculpture-1685534556-nodegroup-ng-ac4c787c"
[] waiting for the control plane to become ready
[] all EKS cluster resources for "attractive-sculpture-1685534556" have been created
[] nodegroup "ng-ac4c787c" has 2 node(s)
[] node "ip-192-168-20-235.eu-west-2.compute.internal" is ready
[] node "ip-192-168-80-49.eu-west-2.compute.internal" is ready
[] waiting for at least 2 node(s) to become ready in "ng-ac4c787c"
[] nodegroup "ng-ac4c787c" has 2 node(s)
[] node "ip-192-168-20-235.eu-west-2.compute.internal" is ready
[] node "ip-192-168-80-49.eu-west-2.compute.internal" is ready
[] kubectl command should work with ".../.kube/config", try 'kubectl get nodes'
[] EKS cluster "attractive-sculpture-1685534556" in "eu-west-2" region is ready
$
Install eksctl
following the installation instructions.
To learn more about what eksctl
can do check eksctl.io. A good place to start is
Getting Started. The full list of features can be found
here.
Code contributions are very welcome. If you are interested in helping make eksctl
great then see our contributing guide.
We follow the CNCF Code of Conduct.
Minor releases of eksctl
should be expected every two weeks and patch releases will be made available as needed.
One or more release candidate(s) (RC) builds will be made available prior to each minor release. RC builds are intended only for testing purposes.
If you discover a potential security issue in eksctl
project, please
follow AWS Vulnerability Reporting process.
Do not open security related issues in the open source project.
Create an issue, or login to Eksctl Community Slack (#eksctl) (signup).
Logo Credits
Original Gophers drawn by Ashley McNamara, unique E, K, S, C, T & L Gopher identities had been produced with Gopherize.me.