Here in this article we will try to setup AWS Gateway API Controller implementation to provide service to service traffic routing capability on EKS kubernetes cluster.
Gateway API is an add-on containing API kinds that provide dynamic infrastructure provisioning and advanced traffic routing features. Gateway API is a set of specifications that are defined as custom resources and are supported by many implementations.
Gateway API Resources
Gateway API has three stable API kinds:
GatewayClass: Defines a set of gateways with common configuration and managed by a controller that implements the class.
Gateway: Defines an instance of traffic handling infrastructure, such as cloud load balancer.
HTTPRoute: Defines HTTP-specific rules for mapping traffic from a Gateway listener to a representation of backend network endpoints. These endpoints are often represented as a Service.
What is AWS Gateway API Controller
The AWS Gateway API Controller is an open-source project and fully supported by Amazon. AWS Gateway API Controller integrates with Amazon VPC Lattice and allows you to manage the following communications.
Handle network connectivity seamlessly between services across VPCs and accounts
If you are interested in watching the video. Here is the YouTube video on the same step by step procedure outlined below.
Procedure
Step1: Setup AWS CLI
As a first step we need to ensure that we have the AWS CLI installed and configured on our workstation from where we want to manage the AWS servers. Here are the instructions for the same.
Here we will install the jq package for some of our CLI commands usage.
$ sudodnf installjq
Step5: Setup AWS Region and Cluster Name as environment variables
Setup the following environment variables as per your requirements which will be used further in the commands.
$ exportAWS_REGION=us-east-1
$ exportCLUSTER_NAME=kubestack
Step6: Create cluster with AWS EC2 instance managed nodes
Here we are going to create AWS EKS cluster with AWS EC2 instances as managed worker nodes for the hosting the kubernetes workloads. This command is going to create two cloudformation templates to provision the cluster itself and the initial managed nodegroup consisting of two ec2 instances.
customresourcedefinition.apiextensions.k8s.io/gatewayclasses.gateway.networking.k8s.io created
customresourcedefinition.apiextensions.k8s.io/gateways.gateway.networking.k8s.io created
customresourcedefinition.apiextensions.k8s.io/grpcroutes.gateway.networking.k8s.io created
customresourcedefinition.apiextensions.k8s.io/httproutes.gateway.networking.k8s.io created
customresourcedefinition.apiextensions.k8s.io/referencegrants.gateway.networking.k8s.io created
Step8: Allow traffic from Amazon VPC Lattice
First identify the EKS created security group applied to ENI that is attached to EKS Control Plane master nodes, as well as any managed workloads. Update the Security group ingress rules to allow VPC traffic.
Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that Amazon EC2 instance profiles provide credentials to Amazon EC2 instances.
Amazon EKS Pod Identity provides credentials to the workloads with an additional EKS Auth API and an agent pod that runs on each node.
Step13: Create a trust policy file for the IAM role
This is trust relationship policy allows pods in eks cluster to assume the attached role.
$ cat >trust-relationship.json <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowEksAuthToAssumeRoleForPodIdentity",
"Effect": "Allow",
"Principal": {
"Service": "pods.eks.amazonaws.com"
},
"Action": [
"sts:AssumeRole",
"sts:TagSession"
]
}
]
}
EOF
An IAM role is similar to an IAM user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS.
$ aws iam create-role --role-name VPCLatticeControllerIAMRole --assume-role-policy-document file://trust-relationship.json --description "IAM Role for AWS Gateway API Controller for VPC Lattice"
$ aws iam attach-role-policy --role-name VPCLatticeControllerIAMRole --policy-arn=$VPCLatticeControllerIAMPolicyArn
$ exportVPCLatticeControllerIAMRoleArn=$(aws iam list-roles --query 'Roles[?RoleName==`VPCLatticeControllerIAMRole`].Arn'--output text)
Instead of creating and distributing your AWS credentials to the containers or using the Amazon EC2 instance’s role, we associate an IAM role with a Kubernetes service account and configure the Pods to use the service account.
Step16: Create the amazon-vpc-lattice GatewayClass
Gateways can be implemented by different controllers, often with different configurations. A Gateway must reference a GatewayClass that contains the name of the controller that implements the class.
A Gateway describes an instance of traffic handling infrastructure. It defines a network endpoint that can be used for processing traffic, i.e. filtering, balancing, splitting, etc. for backends such as a Service. For example, a Gateway may represent a cloud load balancer or an in-cluster proxy server that is configured to accept HTTP traffic.
Leave a Reply
You must be logged in to post a comment.