Skip to content

Instantly share code, notes, and snippets.

View phivid's full-sized avatar

Vidal Philippe phivid

View GitHub Profile
@phivid
phivid / aws_vpc_link.txt
Created October 7, 2019 09:37
AWS VPC Link timeouts before Availability is set.
@phivid
phivid / gist:da00f878a26d0d54be1a0ceb0b22e763
Created December 2, 2019 22:41
terraform_eks_master_others
resource "aws_cloudwatch_log_group" "example"
resource "aws_iam_role" "eks-cluster"
resource "aws_iam_role_policy_attachment" "cluster-AmazonEKSClusterPolicy"
resource "aws_iam_role_policy_attachment" "cluster-AmazonEKSServicePolicy"
@phivid
phivid / gist:cce6a88d8b36eaebcd25fa979afd02cf
Last active December 2, 2019 22:54
terraform_eks_node_others
resource "aws_iam_role" "eks-node"
resource "aws_iam_role_policy_attachment" "example-AmazonEKSWorkerNodePolicy"
resource "aws_iam_role_policy_attachment" "example-AmazonEKS_CNI_Policy"
resource "aws_iam_role_policy_attachment" "example-AmazonEC2ContainerRegistryReadOnly"
@phivid
phivid / gist:5297f4437265178201d23a0d37e1acf4
Last active December 2, 2019 22:54
terraform_eks_node
resource "aws_eks_node_group" "example" {
for_each = data.aws_subnet_ids.example.ids // la liste des subnets privés créés dans le projet Terraform base.
cluster_name = aws_eks_cluster.example.name
node_group_name = "example-${substr(each.key, 7, length(each.key))}"
node_role_arn = aws_iam_role.eks-node.arn
subnet_ids = [each.key]
scaling_config {
desired_size = 1
@phivid
phivid / gist:7819004a79578ff492a383e8ecba02cd
Created December 2, 2019 23:01
terraform_eks_webidentity
resource "aws_iam_openid_connect_provider" "example" {
client_id_list = ["sts.amazonaws.com"]
thumbprint_list = [lower("9E99A48A9960B14926BB7F3B02E22DA2B0AB7280")]
url = aws_eks_cluster.example.identity.0.oidc.0.issuer
}
resource "null_resource" "install_autoscaler" {
depends_on = [aws_eks_node_group.example]
triggers = {
autoscaler_conf = tostring(data.template_file.autoscaler.rendered)
albingresscontroller_conf = tostring(data.template_file.albingresscontroller.rendered)
}
provisioner "local-exec" {
➜ ~ kubectl logs deployment/alb-ingress-controller -n kube-system
-------------------------------------------------------------------------------
AWS ALB Ingress controller
Release: v1.1.3
Build: git-6101b02d
Repository: https://github.com/kubernetes-sigs/aws-alb-ingress-controller.git
-------------------------------------------------------------------------------
W1202 21:25:18.422337 1 client_config.go:549] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.
I1202 21:25:18.479497 1 controller.go:121] kubebuilder/controller "level"=0 "msg"="Starting EventSource" "controller"="alb-ingress-controller" "source"={"Type":{"metadata":{"creationTimestamp":null}}}
@phivid
phivid / gist:f66072d72cd88e8c52411e0aee1fd1bf
Last active January 6, 2020 14:51
lab-eks_base_tree_project
base
└── terraform
├── README.md
├── outputs.tf
├── route53.tf
├── terraform.tf
└── vpc.tf
@phivid
phivid / gist:233a4f555153a5d4216424f82e8f24b1
Last active January 6, 2020 14:51
lab-eks_eks_tree_project
eks
└── terraform
├── README.md
├── albingresscontroller.yml.tpl
├── autoscaler.yml.tpl
├── data.tf
├── eks.tf
├── eks_addons.tf
├── eks_rbac_iam.tf
├── iam-policy_eks_update_kubeconfig.json
@phivid
phivid / gist:ce6c2db0039a2bfd794d00a2ed604fda
Last active January 7, 2020 06:44
terraform_eks_cluster
resource "aws_eks_cluster" "example" {
depends_on = [aws_cloudwatch_log_group.example]
enabled_cluster_log_types = ["api", "audit"]
name = var.cluster_name
role_arn = aws_iam_role.eks-cluster.arn
vpc_config {
subnet_ids = data.aws_subnet_ids.all.ids