Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add example for VPC-CNI custom networking #778

Merged
merged 3 commits into from
Jul 18, 2022

Conversation

bryantbiggs
Copy link
Contributor

What does this PR do?

  • Adds an example demonstrating how to enable AWS VPC-CNI custom networking
  • Updates terraform-aws-eks module to v18.26.3 which is latest - update is to allow use of dedicated control plane subnets which are recommended for expanding data plane without cluster disruption

Motivation

More

  • Yes, I have tested the PR using my local account setup (Provide any test evidence report under Additional Notes)
  • Yes, I have added a new example under examples to support my PR
  • Yes, I have created another PR for add-ons under add-ons repo (if applicable)
  • Yes, I have updated the docs for this feature
  • Yes, I ran pre-commit run -a with this PR

Note: Not all the PRs required examples and docs except a new pattern or add-on added.

For Moderators

  • E2E Test successfully complete before merge?

Additional Notes

@bryantbiggs bryantbiggs temporarily deployed to EKS Blueprints Test July 16, 2022 00:51 Inactive
@bryantbiggs bryantbiggs temporarily deployed to EKS Blueprints Test July 16, 2022 01:00 Inactive
@aws-ia aws-ia deleted a comment from itsZvn Jul 16, 2022
Copy link
Contributor

@Zvikan Zvikan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dope PR, thank you! should we add this example to our E2E workflow as it'll be a common example by many users IMO.

To teardown and remove the resources created in this example:

```sh
terraform destroy -auto-approve
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Single TF destroy works without any known ENI dangling issues?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, but let me update to align with what we've been recommending

# VPC-CNI Custom Networking ENIConfig
#---------------------------------------------------------------

resource "kubectl_manifest" "eni_config" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

does it matter the order of this resource? should the manifest come first right after the cluster is created AND before the addons?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes order matters - the VPC CNI needs to be updated and the ENIConfig present before nodes are ready. However, since custom networking should be set at cluster creation, the order of operations work out as is naturally

@Zvikan Zvikan temporarily deployed to EKS Blueprints Test July 16, 2022 01:13 Inactive
@bryantbiggs bryantbiggs temporarily deployed to EKS Blueprints Test July 16, 2022 01:24 Inactive
Copy link
Contributor

@askulkarni2 askulkarni2 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Awesome stuff!

@askulkarni2 askulkarni2 merged commit 2eb213a into main Jul 18, 2022
@askulkarni2 askulkarni2 deleted the feat/custom-networking branch July 18, 2022 05:36
@askulkarni2 askulkarni2 mentioned this pull request Jul 18, 2022
6 tasks
}
spec = {
securityGroups = [
module.eks_blueprints.cluster_primary_security_group_id,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

in my testing, i cant get this to work if there are more than one SG in the ENIConfig

allamand pushed a commit to allamand/terraform-aws-eks-blueprints that referenced this pull request Dec 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[FEATURE] Support custom networking
4 participants