add support for aws

pull/48/merge
Kelsey Hightower 2016-09-11 05:20:01 -07:00
parent 41eae9dbfa
commit 649eb76c84
1 changed files with 33 additions and 3 deletions

View File

@ -35,9 +35,13 @@ service "nginx" exposed
Grab the `NodePort` that was setup for the nginx service: Grab the `NodePort` that was setup for the nginx service:
``` ```
export NODE_PORT=$(kubectl get svc nginx --output=jsonpath='{range .spec.ports[0]}{.nodePort}') NODE_PORT=$(kubectl get svc nginx --output=jsonpath='{range .spec.ports[0]}{.nodePort}')
``` ```
### Create the Node Port Firewall Rule
#### GCP
``` ```
gcloud compute firewall-rules create kubernetes-nginx-service \ gcloud compute firewall-rules create kubernetes-nginx-service \
--allow=tcp:${NODE_PORT} \ --allow=tcp:${NODE_PORT} \
@ -47,10 +51,36 @@ gcloud compute firewall-rules create kubernetes-nginx-service \
Grab the `EXTERNAL_IP` for one of the worker nodes: Grab the `EXTERNAL_IP` for one of the worker nodes:
``` ```
export NODE_PUBLIC_IP=$(gcloud compute instances describe worker0 \ NODE_PUBLIC_IP=$(gcloud compute instances describe worker0 \
--format 'value(networkInterfaces[0].accessConfigs[0].natIP)') --format 'value(networkInterfaces[0].accessConfigs[0].natIP)')
``` ```
#### AWS
```
SECURITY_GROUP_ID=$(aws ec2 describe-security-groups \
--filters "Name=tag:Name,Values=kubernetes" | \
jq -r '.SecurityGroups[].GroupId')
```
```
aws ec2 authorize-security-group-ingress \
--group-id ${SECURITY_GROUP_ID} \
--protocol tcp \
--port ${NODE_PORT} \
--cidr 0.0.0.0/0
```
Grab the `EXTERNAL_IP` for one of the worker nodes:
```
NODE_PUBLIC_IP=$(aws ec2 describe-instances \
--filters "Name=tag:Name,Values=worker0" | \
jq -j '.Reservations[].Instances[].PublicIpAddress')
```
---
Test the nginx service using cURL: Test the nginx service using cURL:
``` ```