Deploy an EKS Cluster
Table of Contents
Expand all | Collapse all
-
- CN-Series Deployment Checklist
- CN-Series Prerequisites
- Install a Device Certificate on the CN-Series Firewall
- Create Service Accounts for Cluster Authentication
- Install the Kubernetes Plugin and Set up Panorama for CN-Series
- Get the Images and Files for the CN-Series Deployment
- Editable Parameters in CN-Series Deployment YAML Files
- Enable Horizontal Pod Autoscaling on the CN-Series
- Secure 5G With the CN-Series Firewall
- Enable Inspection of Tagged VLAN Traffic
- Enable IPVLAN
- Uninstall the Kubernetes Plugin on Panorama
- Features Not Supported on the CN-Series
Deploy an EKS Cluster
Use Terraform to deploy an EKS cluster.
The repository EKS folder contains a
Terraform plan that deploys a Kubernetes cluster in Amazon's Elastic
Kubernetes Service (EKS). This cluster meets the minimum requirements
to support a CN-Series firewall and can span multiple availability
zones for maximum redundancy and scalability.

- Configure the AWS CLI with your credentials.$ aws configureAWS Access Key ID [None]: AKIAIOSFODNN7EXAMPLE AWS Secret Access Key [None]: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY Default region name [None]: us-west-2 Default output format [None]: ENTER
- Create aterraform.tfvarsfile and add the following variables and their associated values.location = "" # The AWS regionssh_key = "" # The contents of your SSH public key
- Initialize the Terraform providers.terraform init
- Validate the Terraform plan.terraform plan
- Apply the Terraform plan.$ terraform apply
- Update the kubeconfig file with the new cluster's information.$ aws eks update-kubeconfig --name $(terraform output eks_cluster_name)
- Verify the cluster nodes have been built and their status is Ready.$ kubectl get nodesNAME STATUS ROLES AGE VERSION ip-192-168-42-180.us-west-2.compute.internal Ready <none> 42m v1.14.9 ip-192-168-67-38.us-west-2.compute.internal Ready <none> 42m v1.14.9