You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: latest/ug/clusters/windows-support.adoc
+23-6Lines changed: 23 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,11 @@ include::../attributes.txt[]
10
10
Learn how to enable and manage Windows support for your Amazon EKS cluster to run Windows containers alongside Linux containers.
11
11
--
12
12
13
+
Learn how to enable and manage Windows support for your Amazon EKS cluster to run Windows containers alongside Linux containers.
14
+
15
+
16
+
== Considerations
17
+
13
18
Before deploying Windows nodes, be aware of the following considerations.
14
19
15
20
* EKS Auto Mode does not support Windows nodes
@@ -28,13 +33,23 @@ Before deploying Windows nodes, be aware of the following considerations.
28
33
* The source for the controller is managed on GitHub. To contribute to, or file issues against the controller, visit the https://github.com/aws/amazon-vpc-resource-controller-k8s[project] on GitHub.
29
34
* When specifying a custom AMI ID for Windows managed node groups, add `eks:kube-proxy-windows` to your {aws} IAM Authenticator configuration map. For more information, see <<mng-ami-id-conditions>>.
30
35
* If preserving your available IPv4 addresses is crucial for your subnet, refer to https://aws.github.io/aws-eks-best-practices/windows/docs/networking/#ip-address-management[EKS Best Practices Guide - Windows Networking IP Address Management] for guidance.
36
+
* Considerations for EKS Access Entries
37
+
** If you use a different Node IAM Role for Windows instances, EKS will automatically create the required Windows Access Entry.
38
+
** Access Entries for use with Windows nodes need the type of `EC2_WINDOWS`. For more information, see <<creating-access-entries>>.
* Your cluster must have at least one (we recommend at least two) Linux node or Fargate Pod to run CoreDNS. If you enable legacy Windows support, you must use a Linux node (you can't use a Fargate Pod) to run CoreDNS.
35
51
* An existing <<cluster-iam-role,Amazon EKS cluster IAM role>>.
36
52
37
-
38
53
[#enable-windows-support]
39
54
== Enable Windows support
40
55
. If you don't have Amazon Linux nodes in your cluster and use security groups for Pods, skip to the next step. Otherwise, confirm that the `AmazonEKSVPCResourceController` managed policy is attached to your <<cluster-iam-role,cluster role>>. Replace [.replaceable]`eksClusterRole` with your cluster role name.
. Verify that your `aws-auth``ConfigMap` contains a mapping for the instance role of the Windows node to include the `eks:kube-proxy-windows` RBAC permission group. You can verify by running the following command.
108
+
. If your cluster has the authentication mode set to enable the `aws-auth` configmap:
109
+
** Verify that your `aws-auth` `ConfigMap` contains a mapping for the instance role of the Windows node to include the `eks:kube-proxy-windows` RBAC permission group. You can verify by running the following command.
93
110
+
94
111
[source,bash,subs="verbatim,attributes"]
95
112
----
@@ -117,7 +134,7 @@ data:
117
134
----
118
135
+
119
136
You should see `eks:kube-proxy-windows` listed under groups. If the group isn't specified, you need to update your `ConfigMap` or create it to include the required group. For more information about the `aws-auth` `ConfigMap`, see <<aws-auth-configmap>>.
120
-
137
+
. If your cluster has the authentication mode set to disable the `aws-auth` configmap, then you can use EKS Access Entries. Create a new node role for use with Windows instances, and EKS will automatically create an access entry of type `EC2_WINDOWS`.
121
138
122
139
[#windows-support-pod-deployment]
123
140
== Deploy Windows Pods
@@ -163,4 +180,4 @@ You can enable higher Pod density on Windows nodes by enabling IP prefix delegat
163
180
(Number of private IPv4 addresses assigned to the interface attached to the node - 1) * 16
164
181
----
165
182
166
-
With this significantly larger number of available IP addresses, available IP addresses shouldn't limit your ability to scale the number of Pods on your nodes. For more information, see <<cni-increase-ip-addresses>>.
183
+
With this significantly larger number of available IP addresses, available IP addresses shouldn't limit your ability to scale the number of Pods on your nodes. For more information, see <<cni-increase-ip-addresses>>.
0 commit comments