Skip to content

aws-samples/aws-do-eks

aws-do-cli

AWS do EKS (aws-do-eks)
Create and Manage your Amazon EKS clusters using the do-framework


Fig. 1 - EKS cluster sample

Overview

As described in the Amazon EKS User Guide, creating an EKS cluster can be done using eksctl, the AWS console, or the aws cli. Terraform can also be used to create and manage your EKS infrastructure. Regardless of your choice, each of these tools has its specifics and requires learning.
The do-framework strives to simplify DevOps and MLOps tasks by automating complex operations into intuitive action scripts. For example, instead of running an eksctl command with several command line arguments to create an EKS cluster, aws-do-eks provides an eks-create.sh script which wraps any of the supported tools including eksctl or terraform and provides a simplified and intuitive user experience. The only prerequisite needed to build and run this project is Docker. The main use case of this project is to specify a desired cluster configuration, then create or manage the EKS cluster by executing the corresponding script. This process is described in further detail below.

Configure

Configuration items are located in three configuration files at the project, container, and cluster level.

The .env file in the project's root contains all project-level settings and is used when building and running the aws-do-eks project. To edit this configuration, execute the ./config.sh script, or simply open the .env file in your favorite editor.

The conf/env.conf file has container environment settings and is used by the scripts that create, update, or delete your EKS cluster. The most important settings in this file are the implementation of cluster tooling (IMPL) (eksctl, terraform, etc) and the path to your cluster configuration (CONF). To edit this file, execute ./env-config.sh or open conf/env.conf in your favorite editor. By default the environment is configured to use impl/eksctl/yaml as implementation and conf/eksctl/yaml/eks.yaml as cluster configuration. If you prefer to use Terraform instead of eksctl, set IMPL to impl/terraform and CONF to the variables.tf file of your terraform template (e.g. conf/terraform/eks/variables.tf). If you prefer to use eksctl with a properties-style environment configuration file, set IMPL to impl/eksctl/env and CONF to the path of your configuration file (e.g. conf/eksctl/env/eks.conf). Heterogeneous clusters are supported. For example, in eks.conf you can specify the list of nodegroups to be added to the cluster and their scale. Following the same pattern this project can be extended to support other toolsets for creation and management of EKS infrastructure (e.g. CDK).

The cluster-level configuration is stored in the location, specified by you in the CONF variable. Typically this is in a subdirectory of the conf/ directory. The project comes with a collection of pre-configured clusters that can be used immediately, or you can use the provided examples as a template and create your own cluster configuration.

AWS Credentials can be configured at the instance level through an instance role or injected into the aws-do-eks container using volume or secrets mounting. To configure credentials, run aws configure. Credentials you configure on the host will be mounted into the aws-do-eks container according to the VOL_MAP setting in .env.

Build

This project follows the Depend on Docker template to build a container including all needed tools and utilities for creation and management of your EKS clusters. Please execute the ./build.sh script to create the aws-do-eks container image. If desired, the image name or registry address can be modified in the project configuration file .env.

Run

The ./run.sh script starts the project container. After the container is started, use the ./exec.sh script to open a bash shell in the container. All necessary tools to allow creation, management, and operation of EKS are available in this shell.

ENV Configure

Once you have opened the aws-do-eks shell you will be dropped in the /eks directory where you will find the EKS control scripts. Execute ./env-config.sh to edit the current environment settings. Here you can select the tooling implementation (IMPL) and your target cluster configuration (CONF).

EKS Configure

The ./eks-config.sh script opens the current cluster configuration in the default editor. You can adjust nodegroups and many other settings of the cluster through this configuration.

EKS Create

Execute the ./eks-create.sh script to create the configured cluster. This operation will take a while as it involves creation of a VPC, Subnets, Autoscaling groups, the EKS cluster, its nodes and any other necessary resources. Upon successful completion of this process, your shell will be configured for kubectl access to the created EKS cluster.

EKS Status

To view the current status of the cluster execute the eks-status.sh script. It will display the cluster information as well as details about any of its nodegroups.

EKS Update

To make changes to your existing cluster or set the sizes of your cluster node groups, afer editing the cluster configuration via eks-config.sh, then run ./eks-update.sh.

EKS Delete

To decomission your cluster and remove all AWS resources associated with it, execute the ./eks-delete.sh script. This is a destructive operation. If there is anything in your cluster that you need saved, please persist it outside of the cluster VPC before executing this script.

Shell customiazations

When you open a shell into a running aws-do-eks container via ./exec.sh, you will be able to execute kubectl, aws,eksctl, and terraform commands. There are other tools and shell customizations that are installed in the container for convenience.

Tools and customizations

  • kubectx - show or set current Kubernetes context
  • kubens - show or set current namespace
  • kubetail - tail the logs of pods that have a name matching a specified pattern
  • kubectl-node-shell - open an interactive shell into a kubernetes node using a privileged mode (Do not use in production)
  • kubeps1 - customize shell prompt with cluster info

Aliases

alias dp='pod-describe.sh'
alias egrep='egrep --color=auto'
alias fgrep='fgrep --color=auto'
alias grep='grep --color=auto'
alias k='kubectl'
alias kc='kubectx'
alias kctl='kubectl'
alias kctx='kubectx'
alias kdp='pod-describe.sh'
alias ke='pod-exec.sh'
alias kgn='nodes-list.sh'
alias kgnt='nodes-types-list.sh'
alias kgp='pods-list.sh'
alias kl='pod-logs.sh'
alias kn='kubens'
alias kns='kubens'
alias koff='rm -f ~/.kubeon; source ~/.bashrc'
alias kon='touch ~/.kubeon; source ~/.bashrc'
alias ks='kubectl node-shell'
alias kt='kubetail'
alias l='ls -CF'
alias la='ls -A'
alias ll='ls -alh --color=auto'
alias lns='nodes-list.sh'
alias lnt='nodes-types-list.sh'
alias lp='pods-list.sh'
alias ls='ls --color=auto'
alias nl='nodes-list.sh'
alias ntl='nodes-types-list.sh'
alias nv='eks-node-viewer'
alias pe='pod-exec.sh'
alias pl='pod-logs.sh'
alias t='terraform'
alias tf='terraform'
alias tx='torchx'
alias wkgn='watch-nodes.sh'
alias wkgnt='watch-node-types.sh'
alias wkgp='watch-pods.sh'
alias wn='watch-nodes.sh'
alias wnt='watch-node-types.sh'
alias wp='watch-pods.sh'

Other scripts

Infrastructure

The eks folder contains vpc, ops, conf and impl subfolders. These subfolders contain cluster-level scripts that are used by the scripts in the main folder or can be invoked independently.

Deployment

The deployment folder contains scripts for deploying system-level capabilities like cluster-autoscaler, aws-load-balancer-controller, nvidia-gpu-operator, etc. to the EKS cluster. If you would like cluster-autoscaler deployed automatically when the cluster is created, set CLUSTER_AUTOSCALER_DEPLOY="true" in eks.conf. To deploy the cluster-autoscaler to an EKS cluster that has already been created, change your current directory to deployment/cluster-autoscaler, then execute ./deploy-cluster-autoscaler.sh. Follow a similar pattern for other deployments.

Operations

The ops folder contains scripts for management and operation of workloads on the EKS cluster. The goal of these scripts is to provide shorthand for commonly used kubectlcommand lines. Aliases of these scripts have been configured as described above to further simplify operations.

Container

The project home folder offers a number of additional scripts for management of the aws-do-eks container.

  • ./login.sh - use the currently configured aws settings to authenticate with the configured registry
  • ./push.sh - push aws-do-eks container image to configured registry
  • ./pull.sh - pull aws-do-eks container image from a configured existing registry
  • ./status.sh - show current status of aws-do-eks container
  • ./start.sh - start the aws-do-eks container if is currently in "Exited" status
  • ./stop.sh - stop and remove the aws-do-eks container
  • ./test.sh - run container unit tests

Examples

These examples assume that you have opened the aws-do-eks shell and the current working directory is /eks.

1. Create EKS Cluster with P4de nodegroup and EFA networking using eksctl and on-demand capacity reservation

1.1. Configure environment

./env-config.sh

Set:

export IMPL=impl/eksctl/yaml
export CONF=conf/eksctl/yaml/eks-gpu-p4de-odcr.yaml

1.2. Configure cluster

./eks-config.sh

Set:

    capacityReservation:
      capacityReservationTarget:
        capacityReservationID: "cr-xxxxxxxxxxxxxxxxx"

Use the actual capacityReservaationID of your ODCR. Also ensure the availabilityZones reflect the one from the capacity reservation.

1.3. Create cluster

./eks-create.sh

2. Create EKS Cluster with P5 nodegroup and EFA networking using Terraform and on-demand capacity reservation

2.1. Configure environment

./env-config.sh

Set:

export IMPL=impl/terraform
export CONF=conf/terraform/eks-p5/variables.tf

2.2. Configure cluster

./eks-config.sh

Set odcr_id. Set other variables as needed.

2.3. Create cluster

./eks-create.sh

Troubleshooting

  • eksctl authentication errors - execute "aws configure --profile <profile_name>" and provide access key id and secret access key to configure access.
Create a new profile, different than default:
aws configure --profile <profile-name>

Update kubeconfig with profile::
aws eks update-kubeconfig --region <region> --name <cluster-name> --profile <profile-name>

Check that <profile-name> is in ~/.kube/config

user:
    exec:
      apiVersion: client.authentication.k8s.io/v1alpha1
      args:
      - --region
      - <region>
      - eks
      - get-token
      - --cluster-name
      - <cluster-name>
      command: aws
      env:
      - name: AWS_PROFILE
        value: <profile-name>

Alternatively check ~/.aws/credentials and remove any session_id entries.

Another solution is to export AWS_ACCESS_KEY_ID=<your_access_key_id>, export AWS_SECRET_ACCESS_KEY=<your_secret_access_key>, and export AWS_DEFAULT_REGION=<your_cluster_aws_region> in your environment.

  • timeouts from eksctl api - the cloudformation apis used by eksctl are throttled, normally eksctl will retry when a timeout occurs
  • context deadline exceeded - when executing eksctl commands you may see this error message. In this case please retry running the same command after the failure occurs. The cloud formation stack may have completed successfully already, but that information may not be known to eksctl. Running the command again updates the status and checks if all necessary objects have been created.

Security

See CONTRIBUTING for more information.

License

This project is licensed under the MIT-0 License. See the LICENSE file.

Disclaimer

This sample code should not be used in production accounts, on production workloads, or on production or other critical data. You are responsible for testing, securing, and optimizing the sample code as appropriate for production-grade use based on your specific quality control practice and standards.

References