i think it's just a default from one of the modules; there's no specific reason. you should adjust it based on your expectations. also, pod and service IPs come from secondary ranges, so they don't really play a role in the subnet CIDR.
Great video, thanks. What do you think about creating all subnets using the terraform “count” property instead of creating each separately ? I mean define 1 resource then it will become 4 subnets
thnks a lot . I n case of having 5 differnt aws accounts with different resources , what is the best approach to organize TF folders and repos , is it workspace ?
Hi Anton , i really appreciate your efforts , you said some may recommend creating multiple NAT gateway in different availability zones ...etc and you didn't find it useful , then how the avail zone's private subnet will initiate outbound traffic to the Internet "without creating NAT gateway" ?!
Well, you would still have a NAT gateway as a default route in all your private subnets, even if they are located in different availability zones. It's just that you would have a single NAT. Some recommend creating a NAT in each AZ to achieve high availability. it doesn't mean that you need a NAT in each AZ to initiate outbound traffic to the Internet.
This playlist is for someone who wants to learn EKS. If you have a good understanding of EKS and how it works, you can use modules. However, I personally would create my own modules because I don't want to depend on other people's timelines. For example, the open-source eks module still uses the EKS auth configmap for adding new users.
@@AntonPutra exactly, I just noticed this yesterday but in version 20 it seems deprecated and starting 21.0 it will be completely removed.Upgrading these modules once in a while is also challenge but given the benefits I have opted to go with eks module as it has good support and its well maintained
@@zygote846 There is nothing wrong with using modules. As I mentioned, this playlist is for someone who wants to know how EKS works and be able to debug in the future if something breaks.
AWS is not cheap 😅 but i don’t think i spent much making that tutorial. the EKS control plane is only $0.10 / hour, plus compute. also, make sure you’re not charged for data transfer between AZs and regions.
I have problem with using terraform with For_each , i used range(var.mincount.var.maxcount) to generate values for creating like 10 instances , if i delete it again run terraform apply the range is calculated and creates a new one.. Even if i give the keys for 10 instances like one,two..ten. it still recreates if i delete a instance and run again. anything to overcome this
🔴 To support my channel, I'd like to offer Mentorship/On-the-Job Support/Consulting (me@antonputra.com)
Looking Forward to connect :)
You have no idea how useful this series has been. I owe you a beer!
thanks! just fundamentals
This is a golden channel, thanks for your time, you did great job
Thank you very much for this Detailed and Functional Tutorial. I have learned much from you. Best wishes for you
my pleasure!
Thanks 🙏
With Love from India 🇮🇳
welcome :)
My work just did this. Can't wait to watch it all.
thanks, next section will be released in 1-2 hrs
Amazing tutorial! Thank you so much. One question, why did you choose /19 as the mask for the subnets?
i think it's just a default from one of the modules; there's no specific reason. you should adjust it based on your expectations. also, pod and service IPs come from secondary ranges, so they don't really play a role in the subnet CIDR.
Get learn with latest version. Thank you sir.
thank you! great content!
thanks!
Superb tutorial. You're a godsend!
Thanks!
thank you!!
thank you so much from China
my pleasure!
Excellent videos on EKS concepts. Can you also please add observability on EKS like sending application logs to ELK or Opensearch and Cloudwatch?
Thank you! Probably at some point, yes, but it's very specific to your deployments.
Great video, keep it up 😉
thank you!
Great start, thanks!
thank you!
do cover each and every topic of eks
Yes, will do. Can you suggest any additional topics?
Thank's for your job. Could you add to the your Playlist the topic about choosing and manage CNI (subnets, CIDR, limitations) for AWS EKS?
Will do, I’ll also include Cilium Service Mesh sidecar less mesh
That would be great Sir
What software are you using for these cool animation at 0:26 ?
i use adobe suite
Great video, thanks.
What do you think about creating all subnets using the terraform “count” property instead of creating each separately ? I mean define 1 resource then it will become 4 subnets
Don't use count, use map instead and for each in terraform. Count is mostly used as feature flag (0 = disable, 1 = enable)
thnks a lot . I
n case of having 5 differnt aws accounts with different resources , what is the best approach to organize TF folders and repos , is it workspace ?
you can treat each AWS account as a separate environment
Hi Anton , i really appreciate your efforts , you said some may recommend creating multiple NAT gateway in different availability zones ...etc and you didn't find it useful , then how the avail zone's private subnet will initiate outbound traffic to the Internet "without creating NAT gateway" ?!
Well, you would still have a NAT gateway as a default route in all your private subnets, even if they are located in different availability zones. It's just that you would have a single NAT. Some recommend creating a NAT in each AZ to achieve high availability. it doesn't mean that you need a NAT in each AZ to initiate outbound traffic to the Internet.
Great vid but why not use the community modules?.Is there a specific reason to choose resources over modules?.
This playlist is for someone who wants to learn EKS. If you have a good understanding of EKS and how it works, you can use modules. However, I personally would create my own modules because I don't want to depend on other people's timelines. For example, the open-source eks module still uses the EKS auth configmap for adding new users.
@@AntonPutra exactly, I just noticed this yesterday but in version 20 it seems deprecated and starting 21.0 it will be completely removed.Upgrading these modules once in a while is also challenge but given the benefits I have opted to go with eks module as it has good support and its well maintained
@@zygote846 There is nothing wrong with using modules. As I mentioned, this playlist is for someone who wants to know how EKS works and be able to debug in the future if something breaks.
Would like to see Pulumi content in the future
ok will do as well as sdk
Thank you!
🙏
If you get chance, could you let me know more about the owned vs shared on the subnet tags please? Or link me to some information.
Many thanks.
sure, owned if it is used only by EKS, shared if you share that subnet with let's say other EKS clusters or VMs
@@AntonPutra That makes sense.
🍿 Benchmarks: th-cam.com/play/PLiMWaCMwGJXmcDLvMQeORJ-j_jayKaLVn.html&si=p-UOaVM_6_SFx52H
best!
thank you!
I thank you too for clear explanation. All the best!
I was charged 186 Usd by AWS after completing full tutorial😂😂😂
AWS is not cheap 😅 but i don’t think i spent much making that tutorial. the EKS control plane is only $0.10 / hour, plus compute. also, make sure you’re not charged for data transfer between AZs and regions.
Can you share GitHub repo?
sure, it's always under the video - github.com/antonputra/tutorials/tree/main/lessons/195
what is the video for the best practices of tf.state?
second in this playlist - th-cam.com/play/PLiMWaCMwGJXmJdmfJjG3aK1IkU7oWvxIj.html
@@AntonPutra thanks!
I have problem with using terraform with For_each , i used range(var.mincount.var.maxcount) to generate values for creating like 10 instances , if i delete it again run terraform apply the range is calculated and creates a new one.. Even if i give the keys for 10 instances like one,two..ten. it still recreates if i delete a instance and run again. anything to overcome this
Similar issue
@@Kk-rl7nv Hope my man @AntonPutra gives some us answer to this....
Sure, please share runnable terraform example as a github gist that I can run myself and I'll help you