Deploy an EKS cluster - PaloAltoNetworks/cn-series-deploy GitHub Wiki

The /eks folder contains a Terraform plan that deploys a Kubernetes cluster in Amazon's Elastic Kubernetes Service (EKS). The cluster design meets the minimum requirements to support a CN-Series Next-Generation Firewall and will span across multiple availability zones for maximum redundancy and scalability.

multi az cluster

Usage

  1. Configure the AWS CLI with your credentials.
$ aws configure
AWS Access Key ID [None]: AKIAIOSFODNN7EXAMPLE
AWS Secret Access Key [None]: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Default region name [None]: us-west-2
Default output format [None]: ENTER
  1. Create a terraform.tfvars file and add the following variables and their associated values.
location     = ""                            # The AWS region
ssh_key_name = ""                            # The contents of your SSH public key
  1. Initialize the Terraform providers.
$ terraform init
  1. Validate the Terraform plan.
$ terraform plan
  1. Apply the Terraform plan.
$ terraform apply
  1. Update the kubeconfig file with the new cluster's information.
$ aws eks update-kubeconfig --name $(terraform output eks_cluster_name)
  1. Verify the cluster nodes have been built and are in a Ready status.
$ kubectl get nodes
NAME                                           STATUS   ROLES    AGE   VERSION
ip-192-168-42-180.us-west-2.compute.internal   Ready    <none>   42m   v1.14.9
ip-192-168-67-38.us-west-2.compute.internal    Ready    <none>   42m   v1.14.9
  1. You are now ready to deploy the CN‐Series Firewall.
⚠️ **GitHub.com Fallback** ⚠️