Skip to content

Instantly share code, notes, and snippets.

@marcelbirkner
Created September 14, 2020 06:53
Show Gist options
  • Save marcelbirkner/93389774ecee0dba59450d438dda4cc6 to your computer and use it in GitHub Desktop.
Save marcelbirkner/93389774ecee0dba59450d438dda4cc6 to your computer and use it in GitHub Desktop.

Revisions

  1. marcelbirkner created this gist Sep 14, 2020.
    76 changes: 76 additions & 0 deletions eks-pink-config.yaml
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,76 @@
    apiVersion: eksctl.io/v1alpha5
    kind: ClusterConfig

    metadata:
    name: k8s-pink
    region: us-west-2
    version: "1.17"

    vpc:
    id: "vpc-12345678"
    clusterEndpoints:
    publicAccess: true
    privateAccess: true
    subnets:
    private:
    us-west-2a:
    id: "subnet-1234"
    us-west-2b:
    id: "subnet-5678"
    public:
    us-west-2a:
    id: "subnet-4321"
    us-west-2b:
    id: "subnet-8765"

    managedNodeGroups:
    - name: private-tenantunit-0
    instanceType: r5.4xlarge
    privateNetworking: true
    labels: {instanaGroup: tenantUnit, vendor: instana, zone: private}
    minSize: 1
    maxSize: 50
    iam:
    withAddonPolicies:
    autoScaler: true
    externalDNS: true
    certManager: true
    tags:
    instanaGroup: tenantUnit
    vendor: instana
    zone: private

    - name: private-core-0
    instanceType: r5.4xlarge
    privateNetworking: true
    labels: {instanaGroup: core, vendor: instana, zone: private}
    minSize: 1
    maxSize: 20
    iam:
    withAddonPolicies:
    autoScaler: true
    externalDNS: true
    certManager: true
    tags:
    instanaGroup: core
    vendor: instana
    zone: private

    - name: private-acceptor-0
    instanceType: c5.4xlarge
    privateNetworking: true
    labels: {instanaGroup: acceptor, vendor: instana, zone: private}
    minSize: 1
    maxSize: 20
    iam:
    withAddonPolicies:
    autoScaler: true
    externalDNS: true
    certManager: true
    tags:
    instanaGroup: acceptor
    vendor: instana
    zone: private

    secretsEncryption:
    keyARN: "arn:aws:kms:us-west-2:<YOUR AWS ACCOUNT>:key/<KMS KEY ID>"