Skip to main content

super-eks is a CDK construct that provides a preconfigured EKS installation with batteries included.

Project description

:no_entry_sign: This project is now archived and exists only for reference :no_entry_sign:

Try https://github.com/aws-quickstart/cdk-eks-blueprints instead!

:superhero_woman: super-eks

:warning: This branch is using cdk v2: If you are looking for the old cdk v1 version go here

super-eks is a CDK construct that provides a preconfigured EKS installation with batteries included. Even when using best practices for your EKS cluster, picking the right setup can be overwhelming. super-eks solves this problem by making a few choices for you as outlined below.

:sparkles: Features

  • :white_check_mark: DNS management with external-dns
  • :white_check_mark: Forwarding logs to CloudWatch Logs with fluent-bit
  • :white_check_mark: Ingress management with the AWS Load Balancer Controller
  • :white_check_mark: Isolated node groups, one for the shipped components, the other one for your workloads
  • :white_check_mark: Hardened node setup, deny nodes altering the VPC setup.
  • :white_check_mark: Default to managed cluster add-ons where possible.
  • :white_check_mark: Setup kubernetes-external-secrets to integrate AWS Secrets Manager

:world_map: Roadmap

  • :hammer_and_wrench: Monitoring with Prometheus and CloudWatch #21
  • :hammer_and_wrench: Backup solution for cluster recovery #386
  • :hammer_and_wrench: Authentication/authorization for workloads with Amazon Cognito #383
  • :hammer_and_wrench: Autoscaling for pods #385
  • :hammer_and_wrench: Autoscaling for cluster #382
  • :hammer_and_wrench: CDK v2 support #387

:clapper: Quick Start

The quick start shows you how to setup a super-eks cluster.

Prerequisites

  • A working aws CLI installation with access to an account and administrator privileges
  • You'll need a recent NodeJS installation
  • kubectl to interact with your fresh cluster
  • An editor of your choice
  • Roughly 30 minutes of your time and a :coffee:, :tea: or :beverage_box:

To get going you'll need a CDK project. For details please refer to the detailed guide for CDK.

Create an empty directory on your system.

mkdir super-eks-setup && cd super-eks-setup

Bootstrap your CDK project, we will use TypeScript, but you can switch to any other supported language.

npx cdk init sample-app --language typescript
npx cdk bootstrap # Has to be done once for your AWS account

Now install the super-eks library.

npm i @superluminar-io/super-eks

You need to provide a Route53 Hosted zone and super-eks will take care of the rest.

npm i @aws-cdk/aws-route53

Paste the snippet into lib/super-eks-setup-stack.ts.

import * as cdk from "@aws-cdk/core";
import { HostedZone } from "@aws-cdk/aws-route53";
import { SuperEks } from "@superluminar-io/super-eks";

export class SuperEksSetupStack extends cdk.Stack {
  constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
    super(scope, id, props);

    // Assumes you already have a Route53 zone in your account
    const hostedZone = HostedZone.fromLookup(this, "MyZone", {
      domainName: "example.com", // Your domain goes here
    });

    // Setup super-eks
    const superEks = new SuperEks(this, "hello-eks", {
      hostedZone: hostedZone,
    });

    // Add nginx installation for testing
    superEks.cluster.addHelmChart("nginx", {
      createNamespace: true,
      namespace: "nginx",
      repository: "https://charts.bitnami.com/bitnami",
      chart: "nginx",
      release: "nginx",
      version: "8.5.2",
      values: {
        ingress: {
          enabled: true,
          hostname: `nginx.${hostedZone.zoneName}`,
          annotations: {
            "kubernetes.io/ingress.class": "alb",
            "alb.ingress.kubernetes.io/scheme": "internet-facing",
            "alb.ingress.kubernetes.io/target-type": "ip",
          },
        },
      },
    });
  }
}

Now deploy the stack.

npx cdk deploy

If everything works, you should see some output.

   IntegrationTestsStack

Outputs:
IntegrationTestsStack.EksClusterConfigCommandAEB22784 = aws eks update-kubeconfig --name EksCluster3394B24C-86f946f02a67416c80413e123d58b628 --region eu-central-1 --role-arn arn:aws:iam::123456789012:role/IntegrationTestsStack-EksClusterMastersRoleA746276-GNW143CGOXG7
IntegrationTestsStack.EksClusterGetTokenCommand53BD6035 = aws eks get-token --cluster-name EksCluster3394B24C-86f946f02a67416c80413e123d58b628 --region eu-central-1 --role-arn arn:aws:iam::123456789012:role/IntegrationTestsStack-EksClusterMastersRoleA746276-GNW143CGOXG7

Stack ARN:
arn:aws:cloudformation:eu-central-1:123456789012:stack/IntegrationTestsStack/06273460-660e-11eb-b4d9-06da4ef2f41a
✨  Done in 1757.52s.
✨  Done in 1757.79s.

Paste the aws eks update-kubeconfig command into your shell. This will update your kubeconfig.

aws eks update-kubeconfig --name EksCluster3394B24C-86f946f02a67416c80413e123d58b628 --region eu-central-1 --role-arn arn:aws:iam::123456789012:role/IntegrationTestsStack-EksClusterMastersRoleA746276-GNW143CGOXG7
Added new context arn:aws:eks:eu-central-1:123456789012:cluster/EksCluster3394B24C-86f946f02a67416c80413e123d58b628 to /home/super-eks/.kube/config

Now let's see if it works.

NAMESPACE      NAME                                            READY   STATUS    RESTARTS   AGE
dns            external-dns-7d4d69545d-r5w68                   1/1     Running   0          14m
logging        aws-for-fluent-bit-qwhwb                        1/1     Running   0          14m
logging        aws-for-fluent-bit-s7wnj                        1/1     Running   0          14m
ingress        aws-load-balancer-controller-5b9cbc5497-smfrt   1/1     Running   0          14m
kube-system    aws-node-lscgc                                  1/1     Running   0          18m
kube-system    aws-node-zfcdl                                  1/1     Running   0          18m
kube-system    coredns-59b69b4849-9gstn                        1/1     Running   0          25m
kube-system    coredns-59b69b4849-bssnr                        1/1     Running   0          25m
kube-system    kube-proxy-9sgtt                                1/1     Running   0          18m
kube-system    kube-proxy-r4gzg                                1/1     Running   0          18m
nginx          nginx-67cb444d48-lqzkg                          1/1     Running   0          14m

Voila! :tada: You now have a super EKS cluster with batteries included!

:lock_with_ink_pen: Configuring external secrets

External secrets in EKS is automatically deployed and configured. We configure it in such a way that if you tag your secrets with SuperEKS: secrets, external secrets will have access. You can follow the documentation to setup secrets but need to tag your secrets in secrets manager, e.g., when creating:

aws secretsmanager create-secret --name hello-service/password --secret-string "1234" --tags Key=SuperEKS,Value=secrets

The service account that will be used by external secrets uses a condition in the IAM policy so that access will be automatically granted. To keep the setup secure and sound you have to set namespace annotations for secrets as described in the original documentation.

:open_book: API documentation

See the API documentation for details.

:gear: Development

:question: FAQ

Frequently asked questions are answered here.

What do you mean by "batteries included"?

Batteries included is a term that comes from the philosophy behind the Python programming language. It means, that super-eks ships with all necessary parts. You don't need additional things, like in this case Helm charts, manifests etc. apart from the workload you want to run on Kubernetes.

Why did you choose to include component X?

We try to include components, that are seen as community standards. On the other hand we choose components, that work best in combination with AWS.

Where are the advanced settings? I want to do things differently

super-eks makes some decisions for you. If you want an expert setup maybe super-eks isn't for you. If you believe core functionality is missing please open a GitHub issue.

Our approach is to offer opinionated solutions, but we aim to offer the possibility to opt out, as well.

I don't want to use CDK? Do you offer alternatives?

No, not for now.

:balance_scale: License

super-eks is distributed under the Apache License, Version 2.0.

See LICENSE for more information.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

superluminar-io.super-eks-0.2.21.tar.gz (38.5 MB view details)

Uploaded Source

Built Distribution

superluminar_io.super_eks-0.2.21-py3-none-any.whl (38.5 MB view details)

Uploaded Python 3

File details

Details for the file superluminar-io.super-eks-0.2.21.tar.gz.

File metadata

File hashes

Hashes for superluminar-io.super-eks-0.2.21.tar.gz
Algorithm Hash digest
SHA256 a4135ff07a2f838f08e59353f5206bc299b282fe9c81d216729435ea29948e4f
MD5 9c5f1842e3944bb257e317190bf8fdd6
BLAKE2b-256 6c407910954f745a4d92872ab3b4e69c6359357a198172a4a1cd2720a02bc16b

See more details on using hashes here.

File details

Details for the file superluminar_io.super_eks-0.2.21-py3-none-any.whl.

File metadata

File hashes

Hashes for superluminar_io.super_eks-0.2.21-py3-none-any.whl
Algorithm Hash digest
SHA256 657c7647028602a7870729ad06c6d58c6bef2a5cff5fca273f2965d7e6d9fa2a
MD5 de12c80aff7925fdb1247d4c62f79382
BLAKE2b-256 65003782923c4432aed465970ad2a100a7760d4feaf2a8d5315ea7214257da7c

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page