Amazon web services 如何避免CDK synth中的参数化云形成

Amazon web services 如何避免CDK synth中的参数化云形成,amazon-web-services,amazon-cloudformation,aws-cdk,Amazon Web Services,Amazon Cloudformation,Aws Cdk,我正在开发一个CDK应用程序,其中我必须创建一个VPC和EKS集群。但我不是直接使用CDK来运行cloudformation。我想单独创建一个cloudformation模板,并使用AWS CLI运行它。但是,每当我创建cloudformation模板时,EKS都有资产参数,这会在我运行模板时导致错误。如何避免这些参数 这些是我的档案。 bin/eks.ts lib/eks.ts 如何避免这些资产参数 答案是您无法避免CDK应用程序中的资产参数。并非每个应用程序都有资产,只要存在普通云信息无法实

我正在开发一个CDK应用程序,其中我必须创建一个VPC和EKS集群。但我不是直接使用CDK来运行cloudformation。我想单独创建一个cloudformation模板,并使用AWS CLI运行它。但是,每当我创建cloudformation模板时,EKS都有资产参数,这会在我运行模板时导致错误。如何避免这些参数

这些是我的档案。 bin/eks.ts

lib/eks.ts


如何避免这些资产参数

答案是您无法避免CDK应用程序中的资产参数。并非每个应用程序都有资产,只要存在普通云信息无法实现的功能,它们就会引入这些资产参数,这些参数将在
CDK部署期间使用

参考-

#!/usr/bin/env node
import cdk = require('@aws-cdk/core');
import { VPCStack, EKSStack } from '../lib/eks-stack';
import { Construct, TagManager, Tag } from '@aws-cdk/core';
import { Scope } from 'babel__traverse';

const app = new cdk.App();

const environment_variables = { region: "us-east-1", account: "348394859384543" }

const appVPCStack = new VPCStack(app, "appDemoVPCStack", { env: environment_variables })
Tag.add(appVPCStack, "owner", "tamizh");
Tag.add(appVPCStack, "purpose", "testing");

const appEKSStack = new EKSStack(app, "appDemoEKSStack", { env: environment_variables, vpcStack: appVPCStack })
Tag.add(appEKSStack, "owner", "tamizh");
Tag.add(appEKSStack, "purpose", "testing");

app.synth();
import cdk = require('@aws-cdk/core');
import ec2 = require('@aws-cdk/aws-ec2');
import { DefaultInstanceTenancy, GatewayVpcEndpointAwsService, GatewayVpcEndpoint } from '@aws-cdk/aws-ec2';
import { ManagedPolicy } from '@aws-cdk/aws-iam';
import eks = require('@aws-cdk/aws-eks');
import  iam = require('@aws-cdk/aws-iam');
import asg = require("@aws-cdk/aws-autoscaling");
import { TagManager, TagType } from '@aws-cdk/core';

export class VPCStack extends cdk.Stack {
  public readonly vpc: ec2.Vpc;
  private endpoint: GatewayVpcEndpoint;
  constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
    super(scope, id, props);
    const eksClusterName = this.node.tryGetContext("eks.clusterName");
    this.vpc = new ec2.Vpc(this, eksClusterName+'VPC', {
      // VPC configurations
    })
  }
}

export interface EKSProps extends cdk.StackProps {
  vpcStack: VPCStack;
}

export class EKSStack extends cdk.Stack {

  constructor(scope: cdk.Construct, id: string, props: EKSProps) {
    super(scope, id, props);

    const vpc = props.vpcStack.vpc;

    // Context variables for dynamic configuration
    const current_env = this.node.tryGetContext("env.type");
    const eksClusterName = this.node.tryGetContext("eks.clusterName");
    const nodeGroupKeyName = this.node.tryGetContext("eks.nodeGroupKeyName");
    const nodeGroupMaxCapacity = this.node.tryGetContext("eks.nodeGroupMaxCapacity");
    const nodeGroupMinCapacity = this.node.tryGetContext("eks.nodeGroupMinCapacity");
    const nodeGroupDesiredCapacity = this.node.tryGetContext("eks.nodeGroupDesiredCapacity");
    const nodeGroupInstanceType = this.node.tryGetContext("eks.nodeGroupInstanceType");

    // Role to access the cluster from using kubeconfig
    // aws eks update-kubeconfig --name eks --region <region> --role-arn <role-arn>
    const clusterAdmin = new iam.Role(this, eksClusterName+'AdminRole', {
      assumedBy: new iam.AccountRootPrincipal()
    });

    // Cluster properties
    const clusterProps = {
      clusterName: current_env+eksClusterName,
      // Default capacity as 0 denotes infinite number of worker nodes
      // To avoid allocate the max number worker node while creating control plane
      defaultCapacity: 0,
      vpc: vpc,
      mastersRole: clusterAdmin
    }

    // Create a new EKS cluster control plane
    const cluster = new eks.Cluster(this, eksClusterName, clusterProps);

    const eksOptimizedImage = {
      //standard or GPU-optimized
      nodeType: eks.NodeType.STANDARD
    };
    const nodeGroupMachineImage = new eks.EksOptimizedImage(eksOptimizedImage);


    // defining autoscaling group for worker nodes which can be scalled up or down at any time
    const rcAsg = new asg.AutoScalingGroup(this, current_env+'ASG', {
      vpc: vpc,
      instanceType: nodeGroupInstanceType,
      machineImage: nodeGroupMachineImage,
      // Create a keypair to ssh into the worker nodes and give the keypair here 
      // It should be same account and region
      // keyName: nodeGroupKeyName,
      minCapacity: nodeGroupMinCapacity,
      maxCapacity: nodeGroupMaxCapacity,
      desiredCapacity: nodeGroupDesiredCapacity,
      updateType: asg.UpdateType.ROLLING_UPDATE,
      vpcSubnets: {subnetType: ec2.SubnetType.PRIVATE}
    });

    cluster.addAutoScalingGroup(rcAsg, {
      mapRole: true
    })
  }
}
{
  "Transform": "AWS::Serverless-2016-10-31",
  "Resources": {
    // all resources
  },
  "Parameters": {
    "AssetParametersea4957b1606259534983fnjdfs934r4b6ad19a204S3Bucket371D99F8": {
      "Type": "String",
      "Description": "S3 bucket for asset \"ea4957b1606m93439fmrefew99cc02944b6ad19a204\""
    },
    // more parameters.
  }
}