Getting Started with EKS¶
Overview¶
This self-paced guide helps you explore the platform's capabilities for lifecycle management of EKS clusters on AWS using system templates from the template catalog.
Why Use System Templates for EKS on AWS?¶
System templates streamline the creation and management of EKS clusters by offering pre-configured, customizable templates. These templates:
- Ensure consistency and reduce setup time
- Enable organization administrators to enforce standards while allowing teams to customize configurations
- Simplify workflows by integrating tools like ServiceNow or Jira
- Enhance collaboration and efficiency in managing EKS on AWS environments
Prerequisites¶
Before proceeding, ensure the following:
- Access to an AWS environment
- Sufficient privileges to create EKS clusters on AWS
- Rafay Agent deployed in your network (an AWS EC2 machine with permissions to interact with AWS). Follow these instructions to deploy an agent
- A Rafay API key. Follow these instructions to generate an API key
- An AWS Role ARN or AWS Access Key & Secret with EKS Permissions to create EKS clusters and resources
Note on Agent Deployment and Permissions
When deploying the Rafay agent, ensure that the EC2 instance where the agent is running has an IAM role attached with the required permissions. This role should allow the agent to interact with AWS services, which is critical for the agent to assume roles during execution. The agent must have permissions to perform actions such as listing resources and fetching metadata.
If you prefer to provide an AWS Role ARN instead of Access Key and Secret as input in the template, the EC2 instance must have the necessary permissions to assume that role for driving the execution.
Role-Based Credentials Setup¶
1. Create Required Roles¶
EC2 Machine Role¶
This role is attached to the EC2 instance where the Rafay agent is deployed:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": "sts:*",
"Resource": "*"
},
{
"Sid": "iam",
"Effect": "Allow",
"Action": [
"iam:PassRole"
],
"Resource": "*"
}
]
}
IAM Policy
The above policy provides broad permissions (sts:*
) to all AWS Security Token Service (STS) actions. While this works, it's recommended to restrict the permissions to only what's needed:
- Replace
sts:*
with specific actions likests:AssumeRole
,sts:GetCallerIdentity
- Limit the
Resource
field to specific role ARNs instead of*
- Consider adding conditions to restrict which roles can be assumed
System Template Role¶
Create a role for the System Template with the required EKS Permissions.
2. Configure Trust Relationships¶
The EC2 Machine IAM Role needs a trust relationship policy to assume Role:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "ec2.amazonaws.com",
"AWS": "arn:aws:iam::xxxxxxx:role/eks-cluster-provisioning-role"
},
"Action": "sts:AssumeRole"
}
]
}
Note
Replace arn:aws:iam::xxxxxxx:role/eks-cluster-provisioning-role
with your System Template Role.
Part 1: Select and Share the AWS EKS Cluster System Template¶
This section guides you through selecting and sharing the AWS EKS system template with a central project where the Org admin can customize it before sharing it with other projects.
Step 1: Create a Project¶
To begin, create a logically isolated “operating environment” (sub-tenant):
- Navigate to Home > Your Projects.
- Click Create a New Project and name it
eks-template
.
Step 2: Select and Share the AWS EKS System Template¶
- As an Org Admin, go to Settings > Template Catalog.
- Select the Cluster LCM category and choose the AWS EKS System template.
- Click Get Started.
- Provide the following details:
- A unique name for the shared template.
- A version name (e.g.,
v1
). -
Select the project to share the template with (e.g.,
eks-template
). -
After sharing, the platform redirects you to the selected project (
eks-template
).
- Go to Agents and configure the required Agent to drive the workflow. If an Agent is already added and deployed on the AWS Private Network (as part of the prerequisites), you can select and use that Agent.
Configuration Customization¶
-
Customize and templatize all EKS-related configurations using input variables, including:
- Networking: VPC ID, Subnets, Security Groups etc
- Node Groups: Instance types, Node counts etc
-
Restrict user edits for specific variables by:
- Setting overrides to Not Allowed
- Defining default values
-
Pre-configure up to 45 parameters, ensuring a minimal, user-friendly setup with reduced manual input.
- Provide AWS credentials by either using an AWS Access Key and Secret or an AWS Role ARN. Navigate to Config Context and edit the configuration as shown below. If you prefer not to provide the Access Key and Secret, ensure that the machine where the agent is deployed has the necessary permissions to assume the role for driving the execution.
This ensures consistency and prevents unauthorized changes by end users.
- Save the template as a Draft to allow ongoing edits until the configuration is finalized. Once all changes are complete, set it as an Active Version to freeze the version. Learn more about version management.
Part 2: Launch the Template to Create an EKS Cluster¶
You can launch the template within the same project or share it with other projects for end-user access.
-
Go to the Environments section within the
eks-template
project or the shared project. -
The shared template will be listed and ready for use.
-
Click Launch.
-
Provide only the configuration options exposed to the template consumer, such as:
- Kubernetes Version
- Blueprint Name and Version
- Node Group Configuration
-
All other EKS configurations are pre-configured and set as override: Not Allowed to ensure a simple and streamlined experience for the end user.
Part 3: Day 2 Operations on the Created EKS Cluster¶
Upgrading Kubernetes Control Plane and Node Groups¶
-
Navigate to the environment of the created EKS cluster.
-
To upgrade the control plane:
- Click Edit and update the Kubernetes version from 1.31 to 1.32.
- Click Redeploy to initiate the control plane upgrade.
-
To upgrade managed node groups:
- Edit the environment and update the node group version
cluster_version
- Click Redeploy to apply the node group upgrade.
- Edit the environment and update the node group version
Note: Control plane and node groups can be upgraded independently of each other.
Deleting/Destroying the EKS Cluster¶
- Navigate to the environment of the created EKS cluster.
- Click Destroy and confirm the action by selecting Yes.
- This will delete the EKS cluster along with all dependent resources created as part of the cluster.
For detailed examples of EKS system template configurations, please refer to our EKS System Template Examples guide.
Conclusion¶
By following these steps, you have successfully:
- Selected and shared the AWS EKS system template.
- Used the template to do Lifecycle Management of AWS EKS cluster.
These system templates simplify EKS cluster management, ensure compliance with organizational standards, and provide flexibility for specific workflows.
-
Free Org
Sign up for a free Org and try the Rafay Platform with our Get Started guides.
-
Live Demo
Schedule time with us to watch a demo in action.