Amazon EKS Private and Public Ingress example¶
This example demonstrates how to provision an Amazon EKS cluster with two ingress-nginx controllers; one to expose applications publicly and the other to expose applications internally. It also assigns security groups to the Network Load Balancers used to expose the internal and external ingress controllers.
This solution:
- Installs an ingress-nginx controller for public traffic
- Installs an ingress-nginx controller for internal traffic
To expose your application services via an Ingress
resource with this solution you can set the respective ingressClassName
as either ingress-nginx-external
or ingress-nginx-internal
.
Refer to the documentation for AWS Load Balancer controller
configuration options.
Deploy¶
See here for the prerequisites and steps to deploy this pattern.
Validate¶
TODO
Add in validation steps
Destroy¶
terraform destroy -target="module.eks_blueprints_addons" -auto-approve
terraform destroy -target="module.eks" -auto-approve
terraform destroy -auto-approve
See here for more details on cleaning up the resources created.