From d01d964fc11bd812984a2d4b6579c7cb6bf3f583 Mon Sep 17 00:00:00 2001 From: vchintal Date: Thu, 27 Jul 2023 14:45:06 -0700 Subject: [PATCH] Clean up of the README --- examples/privatelink-access/README.md | 119 +++++++++++++++-------- examples/privatelink-access/outputs.tf | 19 +++- examples/privatelink-access/variables.tf | 1 - 3 files changed, 93 insertions(+), 46 deletions(-) diff --git a/examples/privatelink-access/README.md b/examples/privatelink-access/README.md index 427f4dd71f..2eb6d1ff71 100644 --- a/examples/privatelink-access/README.md +++ b/examples/privatelink-access/README.md @@ -2,7 +2,8 @@ This example demonstrates how to access a private EKS cluster using AWS PrivateLink. -Refer to the [documentation](https://docs.aws.amazon.com/vpc/latest/privatelink/concepts.html) for further details on `AWS PrivateLink`. +Refer to the [documentation](https://docs.aws.amazon.com/vpc/latest/privatelink/concepts.html) +for further details on `AWS PrivateLink`. ## Prerequisites: @@ -14,7 +15,9 @@ Ensure that you have the following tools installed locally: ## Deploy -To provision this example, first deploy the Lambda function that responds to `CreateNetworkInterface` API calls. This needs to exist before the cluster is created so that it can respond to the ENIs created by the EKS control plane: +To provision this example, first deploy the Lambda function that responds to +`CreateNetworkInterface` API calls. This needs to exist before the cluster is +created so that it can respond to the ENIs created by the EKS control plane: ```sh terraform init @@ -35,62 +38,98 @@ Enter `yes` at command prompt to apply ### Network Connectivity -1. An output `ssm_test` has been provided to aid in quickly testing the connectivity from the client EC2 instance to the private EKS cluster via AWS Privatelink. Copy the output value and paste it into your terminal to execute and check the connectivity. If configured correctly, the value returned should be `ok`. +An output `ssm_test` has been provided to aid in quickly testing the +connectivity from the client EC2 instance to the private EKS cluster via AWS +PrivateLink. Copy the output value and paste it into your terminal to execute +and check the connectivity. If configured correctly, the value returned should +be `ok`. ```sh -COMMAND_ID=$(aws ssm send-command --region us-west-2 --document-name "AWS-RunShellScript" \ ---parameters 'commands=["curl -ks https://0218D48323E3E7D404D98659F1D097DD.gr7.us-west-2.eks.amazonaws.com/readyz"]' \ ---targets "Key=instanceids,Values=i-0280cf604085f4a44" --query 'Command.CommandId' --output text) - -aws ssm get-command-invocation --region us-west-2 --command-id $COMMAND_ID --instance-id i-0280cf604085f4a44 --query 'StandardOutputContent' --output text +COMMAND="curl -ks https://9A85B21811733524E3ABCDFEA8714642.gr7.us-west-2.eks.amazonaws.com/readyz" + +COMMAND_ID=$(aws ssm send-command --region us-west-2 \ +--document-name "AWS-RunShellScript" \ +--parameters "commands=[$CURL_COMMAND]" \ +--targets "Key=instanceids,Values=i-0a45eff73ba408575" \ +--query 'Command.CommandId' \ +--output text) + +aws ssm get-command-invocation --region us-west-2 \ +--command-id $COMMAND_ID \ +--instance-id i-0a45eff73ba408575 \ +--query 'StandardOutputContent' \ +--output text ``` ### Cluster Access -To test access to the cluster, you will need to execute Kubernetes API calls from within the private network to access the cluster. An EC2 instance has been deployed to simulate this scenario, where the EC2 is deployed into a "client" VPC. However, since the EKS cluster was created with your local IAM identity, the `aws-auth` ConfigMap will only have your local identity that is permitted to access the cluster. Since cluster's API endpoint is private, we cannot use Terraform to reach it to additional entries to the ConfigMap; we can only access the cluster from within the private network of the cluster's VPC or from the client VPC using AWS PrivateLink access. +To test access to the cluster, you will need to execute Kubernetes API calls +from within the private network to access the cluster. An EC2 instance has been +deployed into a "client" VPC to simulate this scenario. However, since the EKS +cluster was created with your local IAM identity, the `aws-auth` ConfigMap will +only have your local identity that is permitted to access the cluster. Since +cluster's API endpoint is private, we cannot use Terraform to reach it to +add additional entries to the ConfigMap; we can only access the cluster from +within the private network of the cluster's VPC or from the client VPC using AWS +PrivateLink access. -:warning: The "client" EC2 instance provided and copying of AWS credentials to that instance are merely for demonstration purposes only. Please consider alternate methods of network access such as AWS Client VPN to provide more secure access. +> :warning: The "client" EC2 instance provided and copying of AWS credentials to + that instance are merely for demonstration purposes only. Please consider + alternate methods of network access such as AWS Client VPN to provide more + secure access. -Perform the following steps to access the cluster with `kubectl` from the provided "client" EC2 instance. +Perform the following steps to access the cluster with `kubectl` from the +provided "client" EC2 instance. -1. Execute the command below on your local machine to get temporary credentials that will be used on the "client" EC2 instance: +1. Execute the command below on your local machine to get temporary credentials +that will be used on the "client" EC2 instance: -```sh -aws sts get-session-token --duration-seconds 3600 --output yaml -``` + ```sh + aws sts get-session-token --duration-seconds 3600 --output yaml + ``` -2. Start a new SSM session on the "client" EC2 instance using the provided `ssm_start_session` output value. Your terminal will now be connected to the "client" EC2 instance. +2. Start a new SSM session on the "client" EC2 instance using the provided +`ssm_start_session` output value. Copy the output value and paste it into your +terminal to execute. Your terminal will now be connected to the "client" EC2 +instance. -```sh -ssm_start_session = "aws ssm start-session --region us-west-2 --target i-0280cf604085f4a44" -``` + ```sh + aws ssm start-session --region us-west-2 --target i-0280cf604085f4a44 + ``` -3. Once logged in, export the following environment variables from the output of step 1. Note - the session credentials are only valid for 1 hour; you can adjust the session duration in the command provided in step 1: +3. Once logged in, export the following environment variables from the output +of step #1: -```sh -export AWS_ACCESS_KEY_ID=XXXX -export AWS_SECRET_ACCESS_KEY=YYYY -export AWS_SESSION_TOKEN=ZZZZ -``` + > :exclamation: The session credentials are only valid for 1 hour; you can + adjust the session duration in the command provided in step #1 -4. Update the local `~/.kube/config` file to enable access to the cluster: + ```sh + export AWS_ACCESS_KEY_ID=XXXX + export AWS_SECRET_ACCESS_KEY=YYYY + export AWS_SESSION_TOKEN=ZZZZ + ``` -```sh -aws eks update-kubeconfig --region us-west-2 --name privatelink-access -``` +4. Run the following command to update the local `~/.kube/config` file to enable +access to the cluster: -5. Test access by listing the pods running on the clsuter: + ```sh + aws eks update-kubeconfig --region us-west-2 --name privatelink-access + ``` + +5. Test access by listing the pods running on the cluster: + + ```sh + kubectl get pods -A + ``` + + The test succeeded if you see an output like the one shown below: + + NAMESPACE NAME READY STATUS RESTARTS AGE + kube-system aws-node-4f8g8 1/1 Running 0 1m + kube-system coredns-6ff9c46cd8-59sqp 1/1 Running 0 1m + kube-system coredns-6ff9c46cd8-svnpb 1/1 Running 0 2m + kube-system kube-proxy-mm2zc 1/1 Running 0 1m -```sh -sh-4.2$ kubectl get pods -A - -# Output -NAMESPACE NAME READY STATUS RESTARTS AGE -kube-system aws-node-4f8g8 1/1 Running 0 1m -kube-system coredns-6ff9c46cd8-59sqp 1/1 Running 0 1m -kube-system coredns-6ff9c46cd8-svnpb 1/1 Running 0 2m -kube-system kube-proxy-mm2zc 1/1 Running 0 1m -``` ## Destroy diff --git a/examples/privatelink-access/outputs.tf b/examples/privatelink-access/outputs.tf index fde8ce5d18..47c7a795a3 100644 --- a/examples/privatelink-access/outputs.tf +++ b/examples/privatelink-access/outputs.tf @@ -4,12 +4,21 @@ output "ssm_start_session" { } output "ssm_test" { - description = "SSM start session command to connect to remote host created" + description = "SSM commands to test connectivity from client EC2 instance to the private EKS cluster" value = <<-EOT - COMMAND_ID=$(aws ssm send-command --region ${local.region} --document-name "AWS-RunShellScript" \ - --parameters 'commands=["curl -ks ${module.eks.cluster_endpoint}/readyz"]' \ - --targets "Key=instanceids,Values=${module.client_ec2_instance.id}" --query 'Command.CommandId' --output text) + COMMAND="curl -ks ${module.eks.cluster_endpoint}/readyz" + + COMMAND_ID=$(aws ssm send-command --region ${local.region} \ + --document-name "AWS-RunShellScript" \ + --parameters "commands=[$CURL_COMMAND]" \ + --targets "Key=instanceids,Values=${module.client_ec2_instance.id}" \ + --query 'Command.CommandId' \ + --output text) - aws ssm get-command-invocation --region ${local.region} --command-id $COMMAND_ID --instance-id ${module.client_ec2_instance.id} --query 'StandardOutputContent' --output text + aws ssm get-command-invocation --region ${local.region} \ + --command-id $COMMAND_ID \ + --instance-id ${module.client_ec2_instance.id} \ + --query 'StandardOutputContent' \ + --output text EOT } diff --git a/examples/privatelink-access/variables.tf b/examples/privatelink-access/variables.tf index 8b13789179..e69de29bb2 100644 --- a/examples/privatelink-access/variables.tf +++ b/examples/privatelink-access/variables.tf @@ -1 +0,0 @@ -