404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.140.188.79: ~ $
**To create a new cluster**

This example command creates a cluster named ``prod`` in your default region.

Command::

  aws eks create-cluster --name prod \
  --role-arn arn:aws:iam::012345678910:role/eks-service-role-AWSServiceRoleForAmazonEKS-J7ONKE3BQ4PI \
  --resources-vpc-config subnetIds=subnet-6782e71e,subnet-e7e761ac,securityGroupIds=sg-6979fe18

Output::

    {
        "cluster": {
            "name": "prod",
            "arn": "arn:aws:eks:us-west-2:012345678910:cluster/prod",
            "createdAt": 1527808069.147,
            "version": "1.10",
            "roleArn": "arn:aws:iam::012345678910:role/eks-service-role-AWSServiceRoleForAmazonEKS-J7ONKE3BQ4PI",
            "resourcesVpcConfig": {
                "subnetIds": [
                    "subnet-6782e71e",
                    "subnet-e7e761ac"
                ],
                "securityGroupIds": [
                    "sg-6979fe18"
                ],
                "vpcId": "vpc-950809ec"
            },
            "status": "CREATING",
            "certificateAuthority": {}
        }
    }

**To create a new cluster with private endpoint access and logging enabled**

This example command creates a cluster named ``example`` in your default region with public endpoint access disabled, private endpoint access enabled, and all logging types enabled.

Command::

  aws eks create-cluster --name example --kubernetes-version 1.12 \
  --role-arn arn:aws:iam::012345678910:role/example-cluster-ServiceRole-1XWBQWYSFRE2Q \
  --resources-vpc-config subnetIds=subnet-0a188dccd2f9a632f,subnet-09290d93da4278664,subnet-0f21dd86e0e91134a,subnet-0173dead68481a583,subnet-051f70a57ed6fcab6,subnet-01322339c5c7de9b4,securityGroupIds=sg-0c5b580845a031c10,endpointPublicAccess=false,endpointPrivateAccess=true \
  --logging '{"clusterLogging":[{"types":["api","audit","authenticator","controllerManager","scheduler"],"enabled":true}]}'

Output::

  {
      "cluster": {
          "name": "example",
          "arn": "arn:aws:eks:us-west-2:012345678910:cluster/example",
          "createdAt": 1565804921.901,
          "version": "1.12",
          "roleArn": "arn:aws:iam::012345678910:role/example-cluster-ServiceRole-1XWBQWYSFRE2Q",
          "resourcesVpcConfig": {
              "subnetIds": [
                  "subnet-0a188dccd2f9a632f",
                  "subnet-09290d93da4278664",
                  "subnet-0f21dd86e0e91134a",
                  "subnet-0173dead68481a583",
                  "subnet-051f70a57ed6fcab6",
                  "subnet-01322339c5c7de9b4"
              ],
              "securityGroupIds": [
                  "sg-0c5b580845a031c10"
              ],
              "vpcId": "vpc-0f622c01f68d4afec",
              "endpointPublicAccess": false,
              "endpointPrivateAccess": true
          },
          "logging": {
              "clusterLogging": [
                  {
                      "types": [
                          "api",
                          "audit",
                          "authenticator",
                          "controllerManager",
                          "scheduler"
                      ],
                      "enabled": true
                  }
              ]
          },
          "status": "CREATING",
          "certificateAuthority": {},
          "platformVersion": "eks.3"
      }
  }

Filemanager

Name Type Size Permission Actions
update-kubeconfig Folder 0755
create-cluster.rst File 3.26 KB 0644
delete-cluster.rst File 154 B 0644
describe-cluster.rst File 2.34 KB 0644
describe-update.rst File 753 B 0644
get-token.rst File 435 B 0644
list-clusters.rst File 250 B 0644
list-updates.rst File 289 B 0644
update-cluster-config.rst File 1.58 KB 0644
update-cluster-version.rst File 700 B 0644
update-kubeconfig.rst File 311 B 0644
wait.rst File 354 B 0644