Cilium CNI
KinD cluster on AWS EC2 with Remote Access
Solution tested with MacOS client.
Build Ubuntu VM on AWS EC2
Note: The EC2 instance created by this CloudFormation template is pre-configured to provide the following:
- 64bit (x86) Ubuntu 22.04 in us-west-2 region
- Docker Engine
- EC2 Instance Connect support
- AWS Systems Manager (SSM) support
Using VCert Playbooks
An example based upon documentation here
This code has been tested on x86 Ubuntu
Prerequisites
Firefly Quick Start
These instructions aim to simplify those already laid out here.
The following assumes your AWS CLI has been pre-authenticated with an AWS account.
Create an Ubuntu EC2 Instance with Docker installed
stack_id=$( \
aws cloudformation create-stack \
--stack-name ubuntu-docker-firefly \
Preparing TLSPC PEM files for AWS ACM
Assuming we have cert-chain and private key files extracted from TLSPC via DigiCert (let's call them my-cert.chain
and my-cert.key
),
how do we get them prepared for AWS ACM import.
In this case my-cert.chain
is a full chain and my-cert.key
is an encrypted private key.
Requirements
As such we need to cope with two requirements:
Installing the TLSPK agent without jsctl
Steps as follows
Lightweight cluster creation
Create a disposable KinD cluster as follows.
nickname=<YOUR_NICKNAME>
echo '"region","instance-id","instance-type","tags-name","tags-auto-owner"' | |
for region in $(aws ec2 describe-regions --query 'Regions[*].[RegionName]' --output text); do | |
aws ec2 describe-instances \ | |
--region ${region} \ | |
--filters "Name=instance-state-name,Values=running" \ | |
--output json | \ | |
jq --arg region $region -r \ | |
'.Reservations[].Instances[] | [$region, .InstanceId, .InstanceType, (.Tags[] | select(.Key=="Name") | .Value), (.Tags[] | select(.Key=="auto:owner") | .Value)] | @csv' | |
done |
Comparing cert-manager CSI drivers
You will see the following cert-manager CSI drivers side-by-side:
Lightweight cluster creation
Create a disposable KinD cluster as follows.
Python Notes
Virtual Environments
Python virtual environments are used to create an isolated environment for Python projects. Each virtual environment has its own set of Python packages installed, separate from the global Python installation.
This helps provide:
- Dependency management
- Isolation