Documentation for version v0.10.0 is no longer actively maintained. The version you are currently viewing is a static snapshot. For up-to-date documentation, see the latest version.
Antrea may run in networkPolicyOnly mode in some cloud managed clusters. This document describes steps to create EKS using terraform.
bash ls ~/.ssh/ id_rsa id_rsa.pub
Ensures that you have permission to create EKS cluster, and have already created EKS cluster role as well as worker Node profile.
export TF_VAR_eks_cluster_iam_role_name=YOUR_EKS_ROLE export TF_VAR_eks_iam_instance_profile_name=YOUR_EKS_WORKER_NODE_PROFILE export TF_VAR_eks_key_pair_name=YOUR_KEY_PAIR_TO_ACCESS_WORKER_NODE
Where - TF_VAR_eks_cluster_iam_role_name may be created by following these instructions - TF_VAR_eks_iam_instance_profile_name may be created by following these instructions - TF_VAR_eks_key_pair_name is the aws key pair name you have configured by following these instructions, using ssh-pair created in Prerequisites item 4
Create EKS cluster
Interact with EKS cluster
./hack/terraform-eks.sh kubectl ... // issue kubectl commands to EKS cluster ./hack/terraform-eks.sh load ... // load local built images to EKS cluster ./hack/terraform-eks.sh destroy // destroy EKS cluster
and worker Node can be accessed with ssh via their external IPs.
Apply Antrea to EKS cluster
./hack/generate-manifest.sh --encap-mode networkPolicyOnly | ~/terraform/eks kubectl apply -f -