Custom IAM and VPC config¶
This example shows how to create a cluster reusing pre-existing IAM and VPC resources:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 | apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig metadata: name: my-test region: us-east-1 vpc: id: "vpc-11111" cidr: "152.28.0.0/16" subnets: private: us-east-1d: id: "subnet-1111" cidr: "152.28.152.0/21" us-east-1c: id: "subnet-11112" cidr: "152.28.144.0/21" us-east-1a: id: "subnet-11113" cidr: "152.28.136.0/21" iam: serviceRoleARN: "arn:aws:iam::11111:role/eks-base-service-role" nodeGroups: - name: ng-1 instanceType: m5.large desiredCapacity: 3 iam: instanceProfileARN: "arn:aws:iam::11111:instance-profile/eks-nodes-base-role" instanceRoleARN: "arn:aws:iam::1111:role/eks-nodes-base-role" privateNetworking: true securityGroups: withShared: true withLocal: true attachIDs: ['sg-11111', 'sg-11112'] ssh: publicKeyName: 'my-instance-key' tags: 'environment:basedomain': 'example.org' managedNodeGroups: - name: managed-1 instanceType: m5.large minSize: 2 desiredCapacity: 3 maxSize: 4 availabilityZones: ["us-west-2a", "us-west-2b"] volumeSize: 20 ssh: allow: false labels: {role: worker} tags: 'environment:basedomain': 'example.org' iam: instanceRoleARN: "arn:aws:iam::1111:role/eks-nodes-base-role" withAddonPolicies: externalDNS: true certManager: true |