Install AWS Load Balancer Controller with manifests
This topic describes how to install the controller by downloading and applying Kubernetes manifests. You can view the full documentation
In the following steps, replace the example values
with your own values.
Prerequisites
Before starting this tutorial, you must install and configure the following tools and resources that you need to create and manage an Amazon EKS cluster.
-
An existing Amazon EKS cluster. To deploy one, see Get started with Amazon EKS.
-
An existing AWS Identity and Access Management (IAM) OpenID Connect (OIDC) provider for your cluster. To determine whether you already have one, or to create one, see Create an IAM OIDC provider for your cluster.
-
Make sure that your Amazon VPC CNI plugin for Kubernetes,
kube-proxy
, and CoreDNS add-ons are at the minimum versions listed in Cluster add-onsService account tokens. -
Familiarity with AWS Elastic Load Balancing. For more information, see the Elastic Load Balancing User Guide.
Step 1: Configure IAM
Note
You only need to create a role for the
AWS Load Balancer Controller one per AWS account. Check if AmazonEKSLoadBalancerControllerRole
exists in the IAM Console
-
Download an IAM policy for the AWS Load Balancer Controller that allows it to make calls to AWS APIs on your behalf.
- AWS
-
**
$ curl -O https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.7.2/docs/install/iam_policy.json
- AWS GovCloud (US)
-
**
$ curl -O https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.7.2/docs/install/iam_policy_us-gov.json
$ mv iam_policy_us-gov.json iam_policy.json
-
Create an IAM policy using the policy downloaded in the previous step.
$ aws iam create-policy \ --policy-name AWSLoadBalancerControllerIAMPolicy \ --policy-document file://iam_policy.json
Note
If you view the policy in the AWS Management Console, the console shows warnings for the ELB service, but not for the ELB v2 service. This happens because some of the actions in the policy exist for ELB v2, but not for ELB. You can ignore the warnings for ELB.
- eksctl
-
-
Replace
my-cluster
with the name of your cluster,111122223333
with your account ID, and then run the command. If your cluster is in the AWS GovCloud (US-East) or AWS GovCloud (US-West) AWS Regions, then replacearn:aws:
witharn:aws-us-gov:
.$ eksctl create iamserviceaccount \ --cluster=my-cluster \ --namespace=kube-system \ --name=aws-load-balancer-controller \ --role-name AmazonEKSLoadBalancerControllerRole \ --attach-policy-arn=arn:aws:iam::111122223333:policy/AWSLoadBalancerControllerIAMPolicy \ --approve
-
- AWS CLI and kubectl
-
-
Retrieve your cluster’s OIDC provider ID and store it in a variable.
oidc_id=$(aws eks describe-cluster --name my-cluster --query "cluster.identity.oidc.issuer" --output text | cut -d '/' -f 5)
-
Determine whether an IAM OIDC provider with your cluster’s ID is already in your account. You need OIDC configured for both the cluster and IAM.
aws iam list-open-id-connect-providers | grep $oidc_id | cut -d "/" -f4
If output is returned, then you already have an IAM OIDC provider for your cluster. If no output is returned, then you must create an IAM OIDC provider for your cluster. For more information, see Create an IAM OIDC provider for your cluster.
-
Copy the following contents to your device. Replace
111122223333
with your account ID. Replaceregion-code
with the AWS Region that your cluster is in. ReplaceEXAMPLED539D4633E53DE1B71EXAMPLE
with the output returned in the previous step. If your cluster is in the AWS GovCloud (US-East) or AWS GovCloud (US-West) AWS Regions, then replacearn:aws:
witharn:aws-us-gov:
. After replacing the text, run the modified command to create theload-balancer-role-trust-policy.json
file.cat >load-balancer-role-trust-policy.json <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Federated": "arn:aws:iam::111122223333:oidc-provider/oidc.eks.region-code.amazonaws.com/id/EXAMPLED539D4633E53DE1B71EXAMPLE" }, "Action": "sts:AssumeRoleWithWebIdentity", "Condition": { "StringEquals": { "oidc.eks.region-code.amazonaws.com/id/EXAMPLED539D4633E53DE1B71EXAMPLE:aud": "sts.amazonaws.com", "oidc.eks.region-code.amazonaws.com/id/EXAMPLED539D4633E53DE1B71EXAMPLE:sub": "system:serviceaccount:kube-system:aws-load-balancer-controller" } } } ] } EOF
-
Create the IAM role.
aws iam create-role \ --role-name AmazonEKSLoadBalancerControllerRole \ --assume-role-policy-document file://"load-balancer-role-trust-policy.json"
-
Attach the required Amazon EKS managed IAM policy to the IAM role. Replace
111122223333
with your account ID.aws iam attach-role-policy \ --policy-arn arn:aws:iam::111122223333:policy/AWSLoadBalancerControllerIAMPolicy \ --role-name AmazonEKSLoadBalancerControllerRole
-
Copy the following contents to your device. Replace
111122223333
with your account ID. If your cluster is in the AWS GovCloud (US-East) or AWS GovCloud (US-West) AWS Regions, then replacearn:aws:
witharn:aws-us-gov:
. After replacing the text, run the modified command to create theaws-load-balancer-controller-service-account.yaml
file.cat >aws-load-balancer-controller-service-account.yaml <<EOF apiVersion: v1 kind: ServiceAccount metadata: labels: app.kubernetes.io/component: controller app.kubernetes.io/name: aws-load-balancer-controller name: aws-load-balancer-controller namespace: kube-system annotations: eks.amazonaws.com/role-arn: arn:aws:iam::111122223333:role/AmazonEKSLoadBalancerControllerRole EOF
-
Create the Kubernetes service account on your cluster. The Kubernetes service account named
aws-load-balancer-controller
is annotated with the IAM role that you created namedAmazonEKSLoadBalancerControllerRole
.$ kubectl apply -f aws-load-balancer-controller-service-account.yaml
-
Step 2: Install cert-manager
Install cert-manager
using one of the following methods to inject certificate configuration into the webhooks. For more information, see Getting Started_cert-manager
Documentation_.
We recommend using the quay.io
container registry to install cert-manager
. If your nodes do not have access to the quay.io
container registry, Install cert-manager
using Amazon ECR (see below).
- Quay.io
-
-
If your nodes have access to the
quay.io
container registry, installcert-manager
to inject certificate configuration into the webhooks.$ kubectl apply \ --validate=false \ -f https://github.com/jetstack/cert-manager/releases/download/v1.13.5/cert-manager.yaml
-
- Amazon ECR
-
-
Install
Documentation_.cert-manager
using one of the following methods to inject certificate configuration into the webhooks. For more information, see Getting Startedon the _cert-manager
-
Step 3: Install AWS Load Balancer Controller
-
Download the controller specification. For more information about the controller, see the documentation
on GitHub. curl -Lo v2_7_2_full.yaml https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.7.2/v2_7_2_full.yaml
-
Make the following edits to the file.
-
If you downloaded the
v2_7_2_full.yaml
file, run the following command to remove theServiceAccount
section in the manifest. If you don’t remove this section, the required annotation that you made to the service account in a previous step is overwritten. Removing this section also preserves the service account that you created in a previous step if you delete the controller.$ sed -i.bak -e '612,620d' ./v2_7_2_full.yaml
If you downloaded a different file version, then open the file in an editor and remove the following lines.
apiVersion: v1 kind: ServiceAccount metadata: labels: app.kubernetes.io/component: controller app.kubernetes.io/name: aws-load-balancer-controller name: aws-load-balancer-controller namespace: kube-system ---
-
Replace
your-cluster-name
in theDeployment
spec
section of the file with the name of your cluster by replacingmy-cluster
with the name of your cluster.$ sed -i.bak -e 's|your-cluster-name|my-cluster|' ./v2_7_2_full.yaml
-
If your nodes don’t have access to the Amazon EKS Amazon ECR image repositories, then you need to pull the following image and push it to a repository that your nodes have access to. For more information on how to pull, tag, and push an image to your own repository, see Copy a container image from one repository to another repository.
public.ecr.aws/eks/aws-load-balancer-controller:v2.7.2
Add your registry’s name to the manifest. The following command assumes that your private repository’s name is the same as the source repository and adds your private registry’s name to the file. Replace
111122223333.dkr.ecr.[.replaceable]`region-code
with your registry. This line assumes that you named your private repository the same as the source repository. If not, change the.amazonaws.com
eks/aws-load-balancer-controller
text after your private registry name to your repository name.$ sed -i.bak -e 's|public.ecr.aws/eks/aws-load-balancer-controller|111122223333.dkr.ecr.region-code.amazonaws.com/eks/aws-load-balancer-controller|' ./v2_7_2_full.yaml
-
(Required only for Fargate or Restricted IMDS)
If you’re deploying the controller to Amazon EC2 nodes that have restricted access to the Amazon EC2 instance metadata service (IMDS)
, or if you’re deploying to Fargate, then add the following parameters
under- args:
.[...] spec: containers: - args: - --cluster-name=your-cluster-name - --ingress-class=alb - --aws-vpc-id=vpc-xxxxxxxx - --aws-region=region-code [...]
-
-
Apply the file.
$ kubectl apply -f v2_7_2_full.yaml
-
Download the
IngressClass
andIngressClassParams
manifest to your cluster.$ curl -Lo v2_7_2_ingclass.yaml https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.7.2/v2_7_2_ingclass.yaml
-
Apply the manifest to your cluster.
$ kubectl apply -f v2_7_2_ingclass.yaml
Step 4: Verify that the controller is installed
-
Verify that the controller is installed.
$ kubectl get deployment -n kube-system aws-load-balancer-controller
An example output is as follows.
NAME READY UP-TO-DATE AVAILABLE AGE aws-load-balancer-controller 2/2 2 2 84s
You receive the previous output if you deployed using Helm. If you deployed using the Kubernetes manifest, you only have one replica.
-
Before using the controller to provision AWS resources, your cluster must meet specific requirements. For more information, see Route application and HTTP traffic with Application Load Balancers and Route TCP and UDP traffic with Network Load Balancers.