README ¶
AWS Pod EIP Controller
The AWS Pod EIP Controller (PEC) offers a function to automatically allocate and release Elastic IPs via annotations.
Overview
The solution processes EIPs for Pods through the following steps:
- Informers listen for Pod events through List and Watch.
- The Controller pushes the corresponding Pod keys from the acquired events to the WorkQueue.
- The Worker gets the Pod key from the WorkQueue and acquires the related Pod information from the Indexer.
- Based on the Pod's annotation information, the Worker uses the AWS SDK to allocate and associate an EIP for the Pod or disassociate and release the EIP.
Annotations
Name | Type | Default | Location |
---|---|---|---|
aws-samples.github.com/aws-pod-eip-controller-type | string | auto | pod |
aws-samples.github.com/aws-pod-eip-controller-public-ipv4-pool | string | pod |
Config
Flag | Chart Value | Type | Default | Describetion |
---|---|---|---|---|
N/A | image | string | '' | aws pod eip controller docker image to deploy |
kubeconfig | N/A | string | '' | kubeconfig path, need to provide when debugging locally |
vpc-id | vpcID | string | '' | need to provide when debugging locally or deploying in fargate |
region | region | string | '' | need to provide when debugging locally or deploying in fargate |
watch-namespace | watchNamespace | string | '' | which namespace to listen on only, empty to listen to all |
cluster-name | clusterName | string | '' | eks cluster name |
log-level | logLevel | string | info | log level: debug, info, warn, error |
N/A | createServiceAccount | boolean | false | whether the helm chart should create service account |
resync-period | resyncPeriod | int | 0 | the resync-period for informer |
N/A | serviceAccountName | string | '' | The serviceaccount name used by Pod EIP controller |
Prerequisites
- Install eksctl.
- Install helm
- Install AWS CLI.
- Install kubectl.
- install git.
- install docker.
- install docker buildx.
Walkthrough
Create an EKS cluster
Set the current account and region
export ACCOUNT_ID=$(aws sts get-caller-identity --output text --query Account)
export AWS_REGION=<your-region>
Note: Replace <your-region> with the region where your EKS cluster is located.
This command will create a nodegroup called main at the same time, which contains two instances of type m5.large, and deploy them in the public subnet.
cat << EOF > eip-demo-cluster.yaml
apiVersion: eksctl.io/v1alpha5
kind: ClusterConfig
metadata:
name: eip-controller-demo
region: ${AWS_REGION}
version: "1.28"
iam:
withOIDC: true
managedNodeGroups:
- name: main
instanceType: m6i.large
desiredCapacity: 2
privateNetworking: false
EOF
eksctl create cluster -f eip-demo-cluster.yaml
kubectl get nodes
Build image and push to Amazon Elastic Container Registry
Create ECR repository and login.
aws ecr create-repository --repository-name aws-pod-eip-controller
aws ecr get-login-password --region ${AWS_REGION} \
| docker login --username AWS \
--password-stdin ${ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com
Download the sample Pod EIP Controller code, build the image and push it to ECR.
git clone https://github.com/aws-samples/aws-pod-eip-controller.git
cd aws-pod-eip-controller
docker buildx build \
--tag ${ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com/aws-pod-eip-controller:latest \
--platform linux/amd64,linux/arm64 \
--push .
Deploy Pod EIP controller
Create the IAM policy needed for the controller.
cat << EOF > iam-policy.json
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:CreateTags",
"ec2:ReleaseAddress",
"ec2:DisassociateAddress",
"ec2:DeleteTags",
"ec2:DescribeAddresses",
"ec2:DescribeNetworkInterfaces"
],
"Resource": "*"
}
]
}
EOF
aws iam create-policy \
--policy-name AWSPodEIPControllerIAMPolicy \
--policy-document file://iam-policy.json
Create an IAM role and Kubernetes ServiceAccount for the controller.
eksctl create iamserviceaccount \
--cluster=eip-controller-demo \
--namespace=kube-system \
--name=aws-pod-eip-controller \
--attach-policy-arn=arn:aws:iam::${ACCOUNT_ID}:policy/AWSPodEIPControllerIAMPolicy \
--override-existing-serviceaccounts \
--region ${AWS_REGION} \
--approve
Deploy aws-pod-eip-controller helm chart
helm install aws-pod-eip-controller ./charts/aws-pod-eip-controller \
--namespace kube-system \
--set image=${ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com/aws-pod-eip-controller:latest \
--set clusterName=eip-controller-demo \
--set serviceAccountName=aws-pod-eip-controller \
--wait
This command will create the aws-pod-eip-controller deployment in the kube-system namespace.
Usage example
cat << EOF > nginx.demo.yaml
---
apiVersion: v1
kind: Namespace
metadata:
name: nginx-demo-ns
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-user
namespace: nginx-demo-ns
---
apiVersion: apps/v1
kind: Deployment
metadata:
namespace: nginx-demo-ns
name: app-nginx-demo
labels:
app.kubernetes.io/name: app-nginx-demo
version: v1
spec:
replicas: 1
selector:
matchLabels:
app: app-nginx-demo
template:
metadata:
labels:
app: app-nginx-demo
annotations:
aws-samples.github.com/aws-pod-eip-controller-type: auto
spec:
serviceAccountName: nginx-user
containers:
- image: nginx:1.20
name: nginx
ports:
- containerPort: 80
protocol: TCP
resources:
limits:
cpu: "0.5"
memory: "512Mi"
requests:
cpu: "0.1"
memory: "128Mi"
volumeMounts:
- name: podinfo
mountPath: /etc/podinfo
initContainers:
- image: busybox:1.28
name: innit
command: ['timeout', '-t' ,'60', 'sh','-c', "until grep -E '^aws-pod-eip-controller-public-ip?' /etc/podinfo/labels; do echo waiting for labels; sleep 2; done"]
volumeMounts:
- name: podinfo
mountPath: /etc/podinfo
volumes:
- name: podinfo
downwardAPI:
items:
- path: "labels"
fieldRef:
fieldPath: metadata.labels
EOF
kubectl apply -f nginx.demo.yaml
Run this command to see the name of the Pod.
kubectl get pod -n nginx-demo-ns
Run this command to see the associated EIP.
kubectl get pods <your-pod-name> \
-o=custom-columns=NAME:.metadata.name,STATUS:.status.phase,PODIP:.status.podIP,EIP:.metadata.labels.aws-pod-eip-controller-public-ip \
-n nginx-demo-ns \
-w
Note: You need to replace <your-pod-name> with the actual name of your nginx Pod.
Note: In the security group where this EIP is located, adding an access rule for port 80 will allow you to access the Pod through the EIP.
Note: Similarly, you can also mount the relevant labels to the file system through the downwardAPI for access. As shown in the example, they are mounted to the /etc/podinfo/labels path.
Cleanup
To avoid charges, delete your AWS resources.
kubectl delete -f nginx.demo.yaml
Note: Deleting the deployment will cause the controller to release the associated EIP.
eksctl delete cluster -f eip-demo-cluster.yaml
aws iam delete-policy \
--policy-arn arn:aws:iam::${ACCOUNT_ID}:policy/AWSPodEIPControllerIAMPolicy
aws ecr delete-repository --repository-name aws-pod-eip-controller --force
Note: Execute the command in the folder where eip-demo-cluster.yaml is located.
Conclusion
In this post, you deployed the EIP controller in an EKS cluster. By listening to Pod creation and deletion events, it associates and disassociates EIP for Pods annotated with specific annotations. This simplifies application access. Pods can be directly accessed via EIP without needing additional Load Balancers or Ingress Controllers. It enables automated operations. The annotations and controller approach fully automates the EIP allocation and release process without requiring human intervention.
Documentation ¶
There is no documentation for this package.