Back to Marketplace
FREE
Unvetted
Coding

aws-eks

Amazon Elastic Kubernetes Service (EKS) for running Kubernetes on AWS. Use for container orchestration, deploying applications, managing clusters, and Kubernetes workloads on AWS.

Install in one line

mfkvault install rish2jain-aws-eks

Requires the MFKVault CLI. Prefer MCP?

New skill
No reviews yet
New skill
🤖 Claude Code Cursor💻 Codex
FREE

Free to install — no account needed

Copy the command below and paste into your agent.

Instant access • No coding needed • No account needed

What you get in 5 minutes

  • Full skill code ready to install
  • Works with 3 AI agents
  • Lifetime updates included
SecureBe the first

Description

# Aws-Eks Skill Comprehensive assistance with aws-eks development, generated from official documentation. ## When to Use This Skill This skill should be triggered when: - Working with aws-eks - Asking about aws-eks features or APIs - Implementing aws-eks solutions - Debugging aws-eks code - Learning aws-eks best practices ## Quick Reference ### Common Patterns **Pattern 1:** Determine the name and version of the add-on you want to download attributions for. Update the following command with the name and version: curl -O https://amazon-eks-docs.s3.amazonaws.com/attributions/<add-on-name>/<add-on-version>/attributions.zip For example: curl -O https://amazon-eks-docs.s3.amazonaws.com/attributions/kube-state-metrics/v2.14.0-eksbuild.1/attributions.zip Use the command to download the file. ``` curl -O https://amazon-eks-docs.s3.amazonaws.com/attributions/<add-on-name>/<add-on-version>/attributions.zip ``` **Pattern 2:** For example: ``` curl -O https://amazon-eks-docs.s3.amazonaws.com/attributions/kube-state-metrics/v2.14.0-eksbuild.1/attributions.zip ``` **Pattern 3:** Create a Kubernetes namespace called game-2048 with the --save-config flag. kubectl create namespace game-2048 --save-config You should see the following response output: namespace/game-2048 created Deploy the 2048 Game Sample application. kubectl apply -n game-2048 -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.8.0/docs/examples/2048/2048_full.yaml This manifest sets up a Kubernetes Deployment, Service, and Ingress for the game-2048 namespace, creating the necessary resources to deploy and expose the game-2048 application within the cluster. It includes the creation of a service named service-2048 that exposes the deployment on port 80, and an Ingress resource named ingress-2048 that defines routing rules for incoming HTTP traffic and annotations for an internet-facing Application Load Balancer (ALB). You should see the following response output: namespace/game-2048 configured deployment.apps/deployment-2048 created service/service-2048 created ingress.networking.k8s.io/ingress-2048 created Run the following command to get the Ingress resource for the game-2048 namespace. kubectl get ingress -n game-2048 You should see the following response output: NAME CLASS HOSTS ADDRESS PORTS AGE ingress-2048 alb * k8s-game2048-ingress2-eb379a0f83-378466616.region-code.elb.amazonaws.com 80 31s You’ll need to wait several minutes for the Application Load Balancer (ALB) to provision before you begin the following steps. Open a web browser and enter the ADDRESS from the previous step to access the web application. For example: k8s-game2048-ingress2-eb379a0f83-378466616.region-code.elb.amazonaws.com You should see the 2048 game in your browser. Play! ``` game-2048 ``` **Pattern 4:** Open a web browser and enter the ADDRESS from the previous step to access the web application. For example: ``` ADDRESS ``` **Pattern 5:** If you want to specify one or more security groups that Amazon EKS assigns to the network interfaces that it creates, specify the securityGroup option. Whether you choose any security groups or not, Amazon EKS creates a security group that enables communication between your cluster and your VPC. Amazon EKS associates this security group, and any that you choose, to the network interfaces that it creates. For more information about the cluster security group that Amazon EKS creates, see View Amazon EKS security group requirements for clusters. You can modify the rules in the cluster security group that Amazon EKS creates. If you want to specify which IPv4 Classless Inter-domain Routing (CIDR) block Kubernetes assigns service IP addresses from, specify the serviceIPv4CIDR option. Specifying your own range can help prevent conflicts between Kubernetes services and other networks peered or connected to your VPC. Enter a range in CIDR notation. For example: 10.2.0.0/16. The CIDR block must meet the following requirements

Preview in:

Security Status

Unvetted

Not yet security scanned

Time saved
How much time did this skill save you?

Related AI Tools

More Coding tools you might like