Microservice Project
  • 🤓11 Microservice CICD Pipeline using Jenkins, EKS and CloudFormation
  • Installing Tools
  • 🤖Jenkins setup
    • Installing Plugins in jenkins
  • 🐳Docker Setup
  • 🏃‍♂️Continuous Integration with GitHub and Jenkins
  • 🏃‍♂️Continuous Deployment with EKS
    • Create Service Account, Role & Assign that role
  • 👷Project Structure & summary.
Powered by GitBook
On this page
  • Now copy the URL and SSH into the instance
  • Installing AWS CLI
  • Installing KUBECTL
  • Installing EKSCTL
  • Create EKS CLUSTER

Installing Tools

Installing tools by using Command Line Interface (CLI)

Previous🤓11 Microservice CICD Pipeline using Jenkins, EKS and CloudFormationNext🤖Jenkins setup

Last updated 1 year ago

Now copy the URL and SSH into the instance

#sudo apt update 

The sudo apt update command is used on Debian-based Linux distributions like Ubuntu to update the package lists for repositories configured in the system.

Installing AWS CLI

curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
sudo apt install unzip
unzip awscliv2.zip
sudo ./aws/install
aws configure

Installing KUBECTL

curl -o kubectl https://amazon-eks.s3.us-west-2.amazonaws.com/1.19.6/2021-01-05/bin/linux/amd64/kubectl
chmod +x ./kubectl
sudo mv ./kubectl /usr/local/bin
kubectl version --short --client

Installing EKSCTL

curl --silent --location "https://github.com/weaveworks/eksctl/releases/latest/download/eksctl_$(uname -s)_amd64.tar.gz" | tar xz -C /tmp
sudo mv /tmp/eksctl /usr/local/bin
eksctl version

##For all these commands First make one directory using any name >> go to the directory>> execute these commands.

## By using the command "aws configure" log into the instance

#aws configure

Create EKS CLUSTER

eksctl create cluster --name=EKS-1 \
                      --region=ap-south-1 \
                      --zones=ap-south-1a,ap-south-1b \
                      --without-nodegroup
                      

The command you provided is used to associate an IAM OIDC identity provider for an Amazon EKS cluster. It allows the Kubernetes API server to authenticate service accounts using IAM roles.

eksctl utils associate-iam-oidc-provider \
    --region ap-south-1 \
    --cluster EKS-1 \
    --approve

This command creates a managed node group named "node2" within the Amazon EKS cluster "EKS-1" in the Asia Pacific (Mumbai) region. It consists of 3 nodes with a minimum of 2 and a maximum of 4, using t3.medium instances with 20GB disk volumes. SSH access is enabled with the "DevOps" public key. The group has permissions for Auto Scaling, ExternalDNS, Amazon ECR, AWS App Mesh, and AWS ALB Ingress Controller.

eksctl create nodegroup --cluster=EKS-1 \
                       --region=ap-south-1 \
                       --name=node2 \
                       --node-type=t3.medium \
                       --nodes=3 \
                       --nodes-min=2 \
                       --nodes-max=4 \
                       --node-volume-size=20 \
                       --ssh-access \
                       --ssh-public-key=DevOps \
                       --managed \
                       --asg-access \
                       --external-dns-access \
                       --full-ecr-access \
                       --appmesh-access \
                       --alb-ingress-access