Book Image

Mastering Elastic Kubernetes Service on AWS

By : Malcolm Orr, Yang-Xin Cao (Eason)
5 (1)
Book Image

Mastering Elastic Kubernetes Service on AWS

5 (1)
By: Malcolm Orr, Yang-Xin Cao (Eason)

Overview of this book

Kubernetes has emerged as the de facto standard for container orchestration, with recent developments making it easy to deploy and handle a Kubernetes cluster. However, a few challenges such as networking, load balancing, monitoring, and security remain. To address these issues, Amazon EKS offers a managed Kubernetes service to improve the performance, scalability, reliability, and availability of AWS infrastructure and integrate with AWS networking and security services with ease. You’ll begin by exploring the fundamentals of Docker, Kubernetes, Amazon EKS, and its architecture along with different ways to set up EKS. Next, you’ll find out how to manage Amazon EKS, encompassing security, cluster authentication, networking, and cluster version upgrades. As you advance, you’ll discover best practices and learn to deploy applications on Amazon EKS through different use cases, including pushing images to ECR and setting up storage and load balancing. With the help of several actionable practices and scenarios, you’ll gain the know-how to resolve scaling and monitoring issues. Finally, you will overcome the challenges in EKS by developing the right skill set to troubleshoot common issues with the right logic. By the end of this Kubernetes book, you’ll be able to effectively manage your own Kubernetes clusters and other components on AWS.
Table of Contents (28 chapters)
1
Part 1: Getting Started with Amazon EKS
7
Part 2: Deep Dive into EKS
13
Part 3: Deploying an Application on EKS
20
Part 4: Advanced EKS Service Mesh and Scaling
24
Part 5: Overcoming Common EKS Challenges

Summary

We started by describing how IPv6 can be configured in a new cluster to provide almost limitless IP addresses that don’t require NATing. We also discussed that IPv6 does have limits in terms of what it can communicate with and how techniques such as the host-local plugin, DNS64, and NAT64 can be used to provide IPv6 to IPv4 translation.

We then looked at how the Calico policy engine can be used to enhance the capabilities of EKS by providing IPv4 L3/L4 network policies (just like a traditional firewall) that can be used to limit access between Pods and external IP addresses.

Finally, we looked at how a CNI works with plugins and chaining and using Multus as an example, how the AWS VPC CNI can be replaced and the advantages that brings, but also the complexity it can add. We also briefly discussed that there are some valid use cases where a different CNI will be required but that the one that used to be the main driver, VPC IP exhaustion, can now be solved using...