From 649eb76c84029a6043da407e5a9544b87c9a1f99 Mon Sep 17 00:00:00 2001 From: Kelsey Hightower Date: Sun, 11 Sep 2016 05:20:01 -0700 Subject: [PATCH] add support for aws --- docs/09-smoke-test.md | 36 +++++++++++++++++++++++++++++++++--- 1 file changed, 33 insertions(+), 3 deletions(-) diff --git a/docs/09-smoke-test.md b/docs/09-smoke-test.md index 9b11b6f..a812108 100644 --- a/docs/09-smoke-test.md +++ b/docs/09-smoke-test.md @@ -35,9 +35,13 @@ service "nginx" exposed Grab the `NodePort` that was setup for the nginx service: ``` -export NODE_PORT=$(kubectl get svc nginx --output=jsonpath='{range .spec.ports[0]}{.nodePort}') +NODE_PORT=$(kubectl get svc nginx --output=jsonpath='{range .spec.ports[0]}{.nodePort}') ``` +### Create the Node Port Firewall Rule + +#### GCP + ``` gcloud compute firewall-rules create kubernetes-nginx-service \ --allow=tcp:${NODE_PORT} \ @@ -47,10 +51,36 @@ gcloud compute firewall-rules create kubernetes-nginx-service \ Grab the `EXTERNAL_IP` for one of the worker nodes: ``` -export NODE_PUBLIC_IP=$(gcloud compute instances describe worker0 \ +NODE_PUBLIC_IP=$(gcloud compute instances describe worker0 \ --format 'value(networkInterfaces[0].accessConfigs[0].natIP)') ``` +#### AWS + +``` +SECURITY_GROUP_ID=$(aws ec2 describe-security-groups \ + --filters "Name=tag:Name,Values=kubernetes" | \ + jq -r '.SecurityGroups[].GroupId') +``` + +``` +aws ec2 authorize-security-group-ingress \ + --group-id ${SECURITY_GROUP_ID} \ + --protocol tcp \ + --port ${NODE_PORT} \ + --cidr 0.0.0.0/0 +``` + +Grab the `EXTERNAL_IP` for one of the worker nodes: + +``` +NODE_PUBLIC_IP=$(aws ec2 describe-instances \ + --filters "Name=tag:Name,Values=worker0" | \ + jq -j '.Reservations[].Instances[].PublicIpAddress') +``` + +--- + Test the nginx service using cURL: ``` @@ -83,4 +113,4 @@ Commercial support is available at

Thank you for using nginx.

-``` \ No newline at end of file +```