Skip to content

Commit

Permalink
Merge pull request docker#138 from ndeloof/eks
Browse files Browse the repository at this point in the history
Document specific steps to run e2e tests against EKS cluster
  • Loading branch information
silvin-lubecki committed Sep 23, 2019
2 parents 46e6eb9 + a45713b commit 6a85478
Showing 1 changed file with 16 additions and 0 deletions.
16 changes: 16 additions & 0 deletions docs/install-on-eks.md
Expand Up @@ -35,3 +35,19 @@ words ClusterIP None <none>

To access our example web application, open a browser and go to `<LoadBalancer external-ip>:33000`.

## Optional: use kubernetes service proxy
** This step is required to run e2e tests against EKS **

Kubernetes API allows accessing a service from client over an authenticated channel by proxying communication. End-2-end
tests do rely

```
+----------+ +---------------+ +-----------------------+ +---------------+ +----------+
| curl | -> | kubectl proxy | ====[tunnel]====> | kubernetes API server | --> | kube proxy | -> | service |
| (client) | | | (authenticated) | (control plane) | (*) | (worker node) | | (tcp:80) |
+----------+ +---------------+ +-----------------------+ +---------------+ +----------+
```
With default setup, EKS cluster is created with network security group to block communication (*) between Kubernetes control
plane and worker nodes on privileged ports (<1024)). For e2e tests to run, or rely on API server proxy for other use
cases, you'll need to lower EKS network security (details [here](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html)).

0 comments on commit 6a85478

Please sign in to comment.