Documentation for version v0.9.2 is no longer actively maintained. The version you are currently viewing is a static snapshot. For up-to-date documentation, see the latest version.
Antrea may run in networkPolicyOnly mode in some cloud managed clusters. This document describes steps to create EKS using terraform.
bash ls ~/.ssh/ id_rsa id_rsa.pub
Ensures that you have permission to create EKS cluster, and have already
created EKS cluster role as well as worker Node profile.
- TF_VAR_eks_cluster_iam_role_name may be created by following these
- TF_VAR_eks_iam_instance_profile_name may be created by following these
- TF_VAR_eks_key_pair_name is the aws key pair name you have configured by following these
using ssh-pair created in Prerequisites item 4
Create EKS cluster
Interact with EKS cluster
./hack/terraform-eks.sh kubectl ... // issue kubectl commands to EKS cluster
./hack/terraform-eks.sh load ... // load local built images to EKS cluster
./hack/terraform-eks.sh destroy // destroy EKS cluster
and worker Node can be accessed with ssh via their external IPs.
Apply Antrea to EKS cluster
./hack/generate-manifest.sh --encap-mode networkPolicyOnly | ~/terraform/eks kubectl apply -f -