Trending

#AmazonEks

Latest posts tagged with #AmazonEks on Bluesky

Latest Top
Trending

Posts tagged #AmazonEks

Preview
AWS Backup adds logically air-gapped vault support for Amazon EKS AWS Backup logically air-gapped vault now supports Amazon EKS. Logically air-gapped vaults are a type of AWS Backup vault that allows secure sharing of backups across accounts and AWS Organizations, supporting direct restore to reduce recovery time from a data loss event. You can now protect your Amazon EKS clusters in logically air-gapped vaults. A logically air-gapped vault stores immutable backup copies that are locked by default, and isolated with encryption using AWS owned keys or customer-managed keys. You can store your Amazon EKS backups in a logically air gapped vault either the same account or across other accounts and Regions. This helps reduce the risk of downtime, ensure business continuity, and meet compliance and disaster recovery requirements. You can get started using the AWS Backup console, API, or CLI. Target Amazon EKS backups to a logically air-gapped vault by specifying it as the primary target or copy destination in your backup plan. Share the vault for recovery using AWS Resource Access Manager (RAM) or access it via Multi-party approval. Once available, you can initiate direct restore jobs from that account, eliminating the overhead of copying backups first. AWS Backup logically air-gapped vault support for Amazon EKS is available in 24 AWS Regions. For more information and detailed regional availability, visit the AWS Backup documentation.

🆕 AWS Backup now supports logically air-gapped vaults for Amazon EKS, offering secure, immutable backups across accounts and regions to reduce recovery time and ensure business continuity, available in 24 regions.

#AWS #AmazonEks #AwsBackup

0 0 0 0
AWS Backup adds logically air-gapped vault support for Amazon EKS AWS Backup logically air-gapped vault now supports Amazon EKS. Logically air-gapped vaults are a type of AWS Backup vault that allows secure sharing of backups across accounts and AWS Organizations, supporting direct restore to reduce recovery time from a data loss event. You can now protect your Amazon EKS clusters in logically air-gapped vaults. A logically air-gapped vault stores immutable backup copies that are locked by default, and isolated with encryption using AWS owned keys or customer-managed keys. You can store your Amazon EKS backups in a logically air gapped vault either the same account or across other accounts and Regions. This helps reduce the risk of downtime, ensure business continuity, and meet compliance and disaster recovery requirements. You can get started using the https://console.aws.amazon.com/backup/home, API, or CLI. Target Amazon EKS backups to a logically air-gapped vault by specifying it as the primary target or copy destination in your backup plan. Share the vault for recovery using https://aws.amazon.com/ram/ (RAM) or access it via Multi-party approval. Once available, you can initiate direct restore jobs from that account, eliminating the overhead of copying backups first. AWS Backup logically air-gapped vault support for Amazon EKS is available in 24 AWS Regions. For more information and detailed regional availability, visit the https://docs.aws.amazon.com/aws-backup/latest/devguide/eks-backups.html.

AWS Backup adds logically air-gapped vault support for Amazon EKS

AWS Backup logically air-gapped vault now supports Amazon EKS. Logically air-gapped vaults are a type of AWS Backup vault that allows secure sharing of backups across accounts and AWS Organizations, s...

#AWS #AmazonEks #AwsBackup

0 0 0 0
Post image

FREE Online Workshop on Production Amazon EKS Cluster Upgrade

Register now: t.ly/FWSAMAZON-15M

Are you interested in DevOps and Kubernetes in real production environments?

Live Session By
Mr. Veerababu
Date: 15th March 2026
Time: 10:30 AM (IST)

#DevOps #AmazonEKS #Kubernetes #AWS

0 0 0 0
Preview
How to Move from Clusters that Mostly Work to Production‑Ready EKS The Fairwinds Amazon EKS Infrastructure Design Assessment exists give you production‑ready Kubernetes infrastructure you can actually trust.

If your Amazon EKS clusters “mostly work,” are a couple versions behind, and everyone’s a little afraid to touch them… this is for you.

New post on turning fragile EKS setups into production‑ready infrastructure you can trust:
www.fairwinds.com/blog/move-fr...
#amazoneks #infrastructuredesign

0 0 0 0
Preview
Amazon EKS Node Monitoring Agent is now open source Amazon Elastic Kubernetes Service (Amazon EKS) Node Monitoring Agent is now open source. You can access the Amazon EKS Node Monitoring Agent source code and contribute to its development on GitHub. Running workloads reliably in Kubernetes clusters can be challenging. Cluster administrators often have to resort to manual methods of monitoring and repairing degraded nodes in their clusters. The Amazon EKS Node Monitoring Agent simplifies this process by automatically monitoring and publishing node-level system, storage, networking, and accelerator issues as node conditions, which are used by Amazon EKS for automatic node repair. With the Amazon EKS Node Monitoring Agent’s source code available on GitHub, you now have visibility into the agent’s implementation, can customize it to fit your requirements, and can contribute directly to its ongoing development. The Amazon EKS Node Monitoring Agent is included in Amazon EKS Auto Mode and is available as an Amazon EKS add-on in all AWS Regions where Amazon EKS is available. To learn more about the Amazon EKS Node Monitoring Agent and node repair, visit the Amazon EKS documentation.

🆕 Amazon EKS Node Monitoring Agent is now open source on GitHub, simplifying node repair in Kubernetes clusters by automatically monitoring and reporting issues, enhancing reliability and enabling customization and contributions.

#AWS #AmazonEks

0 0 0 0
Amazon EKS Node Monitoring Agent is now open source Amazon Elastic Kubernetes Service (Amazon EKS) Node Monitoring Agent is now open source. You can access the Amazon EKS Node Monitoring Agent source code and contribute to its development on https://github.com/aws/eks-node-monitoring-agent. Running workloads reliably in Kubernetes clusters can be challenging. Cluster administrators often have to resort to manual methods of monitoring and repairing degraded nodes in their clusters. The Amazon EKS Node Monitoring Agent simplifies this process by automatically monitoring and publishing node-level system, storage, networking, and accelerator issues as node conditions, which are used by Amazon EKS for automatic node repair. With the Amazon EKS Node Monitoring Agent’s source code available on GitHub, you now have visibility into the agent’s implementation, can customize it to fit your requirements, and can contribute directly to its ongoing development. The Amazon EKS Node Monitoring Agent is included in Amazon EKS Auto Mode and is available as an Amazon EKS add-on in all AWS Regions where Amazon EKS is available. To learn more about the Amazon EKS Node Monitoring Agent and node repair, visit the https://docs.aws.amazon.com/eks/latest/userguide/node-health.html.https://github.com/aws/eks-node-monitoring-agent

Amazon EKS Node Monitoring Agent is now open source

Amazon Elastic Kubernetes Service (Amazon EKS) Node Monitoring Agent is now open source. You can access the Amazon EKS Node Monitoring Agent source code and contribute to its development on https://github.com/aws/eks-node-mon

#AWS #AmazonEks

1 0 0 0
Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode’s managed capabilities can now be configured as log delivery sources using Amazon CloudWatch Vended Logs. This integration enables customers to monitor and troubleshoot their EKS Auto Mode clusters more effectively by automatically collecting logs from Auto Mode’s managed Kubernetes capabilities for compute autoscaling, block storage, load balancing, and pod networking. Customers can configure log delivery for Auto Mode capabilities using CloudWatch APIs or the AWS Console. Each Auto Mode capability can be configured as a CloudWatch Vended Logs delivery source, enabling reliable, secure log delivery with built-in AWS authentication and authorization at a reduced price compared to standard CloudWatch Logs. Customers can deliver these logs to CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose destinations. This feature is available today in all regions where EKS Auto Mode is available. Standard CloudWatch Logs, S3, or Kinesis charges apply depending on the chosen destination. To learn more about EKS Auto Mode logging capabilities, visit the https://docs.aws.amazon.com/eks/latest/userguide/auto-observability.html.

Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities

Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode’s managed capabilities can now be configured as log delivery sources using Amazon CloudWatch Vended Logs. This integration enables...

#AWS #AmazonEks

0 0 0 0
Amazon EKS simplifies providing IAM permissions to EKS add-ons in AWS GovCloud (US) Regions Amazon Elastic Kubernetes Service (EKS) now offers a direct integration between EKS add-ons and EKS Pod Identity in AWS GovCloud (US) Regions, streamlining the lifecycle management process for critical cluster operational software that needs to interact with AWS services outside the cluster. EKS add-ons that enable integration with underlying AWS resources need IAM permissions to interact with AWS services. EKS Pod Identities simplify how Kubernetes applications obtain AWS IAM permissions. With today's launch, you can directly manage EKS Pod Identities using EKS add-ons operations through the EKS console, CLI, API, eksctl, and IAC tools like AWS CloudFormation, simplifying usage of Pod Identities for EKS add-ons. This integration expands the selection of Pod Identity compatible EKS add-ons available for installation through the EKS console during cluster creation. EKS add-ons integration with Pod Identities is generally available in AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions. To get started, see the https://docs.aws.amazon.com/eks/latest/userguide/create-cluster.html.

Amazon EKS simplifies providing IAM permissions to EKS add-ons in AWS GovCloud (US) Regions

Amazon Elastic Kubernetes Service (EKS) now offers a direct integration between EKS add-ons and EKS Pod Identity in AWS GovCloud (US) Regions, streamlining the lifecycle management proc...

#AWS #AmazonEks

0 0 0 0
Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.35 Kubernetes version 1.35 introduced several new features and bug fixes, and AWS is excited to announce that you can now use https://aws.amazon.com/eks/ (EKS) and https://aws.amazon.com/eks/eks-distro/ to run Kubernetes version 1.35. Starting today, you can create new EKS clusters using version 1.35 and upgrade existing clusters to version 1.35 using the EKS console, the eksctl command line interface, or through an infrastructure-as-code tool. Kubernetes version 1.35 introduces several key improvements, including In-Place Pod Resource Updates allowing CPU and memory adjustments without restarting Pods, and PreferSameNode Traffic Distribution prioritizing local endpoints before routing to remote nodes for reduced latency. The release brings Node Topology Labels via Downward API enabling Pods to access region and zone information without API server queries, alongside Image Volumes delivering data artifacts like AI models using OCI container images. To learn more about the changes in Kubernetes version 1.35, see our https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions-standard.html and the Kubernetes project https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.34.md EKS now supports Kubernetes version 1.35 in all the AWS Regions where EKS is available, including the AWS GovCloud (US) Regions. You can learn more about the Kubernetes versions available on EKS and instructions to update your cluster to version 1.35 by visiting EKS documentation. You can use https://docs.aws.amazon.com/eks/latest/userguide/cluster-insights.html to check if there are any issues that can impact your Kubernetes cluster upgrades. EKS Distro builds of Kubernetes version 1.35 are available through ECR Public Gallery and GitHub. Learn more about the EKS version lifecycle policies in the https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html.

Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.35

Kubernetes version 1.35 introduced several new features and bug fixes, and AWS is excited to announce that you can now use https://aws.amazon.com/eks/ (EKS) and https://aws.amazon.com/eks/eks-distro/ to run ...

#AWS #AmazonEks

0 0 0 0
Preview
Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.35 Kubernetes version 1.35 introduced several new features and bug fixes, and AWS is excited to announce that you can now use Amazon Elastic Kubernetes Service (EKS) and Amazon EKS Distro to run Kubernetes version 1.35. Starting today, you can create new EKS clusters using version 1.35 and upgrade existing clusters to version 1.35 using the EKS console, the eksctl command line interface, or through an infrastructure-as-code tool. Kubernetes version 1.35 introduces several key improvements, including In-Place Pod Resource Updates allowing CPU and memory adjustments without restarting Pods, and PreferSameNode Traffic Distribution prioritizing local endpoints before routing to remote nodes for reduced latency. The release brings Node Topology Labels via Downward API enabling Pods to access region and zone information without API server queries, alongside Image Volumes delivering data artifacts like AI models using OCI container images. To learn more about the changes in Kubernetes version 1.35, see our documentation and the Kubernetes project release notes. EKS now supports Kubernetes version 1.35 in all the AWS Regions where EKS is available, including the AWS GovCloud (US) Regions. You can learn more about the Kubernetes versions available on EKS and instructions to update your cluster to version 1.35 by visiting EKS documentation. You can use EKS cluster insights to check if there are any issues that can impact your Kubernetes cluster upgrades. EKS Distro builds of Kubernetes version 1.35 are available through ECR Public Gallery and GitHub. Learn more about the EKS version lifecycle policies in the documentation.

🆕 AWS now supports Kubernetes version 1.35 for Amazon EKS and EKS Distro, featuring In-Place Pod Updates, PreferSameNode Traffic, Node Topology Labels, and Image Volumes. Upgrade via EKS console, eksctl, or infrastructure-as-code tools. Available in all EKS regions.

#AWS #AmazonEks

0 0 0 0
Preview
Announcing Amazon EKS Capabilities for workload orchestration and cloud resource management | Amazon Web Services Streamline Kubernetes development with fully managed platform capabilities that handle workload orchestration and cloud resource management, eliminating infrastructure maintenance while providing enterprise-grade...

📰🚨 Announcing Amazon EKS Capabilities for workload orchestration and cloud resource management

#AmazonEKS #Kubernetes #CloudComputing #DevOps #AWS

0 0 0 0
Announcing Amazon EKS Capabilities Amazon Elastic Kubernetes Service (EKS) announces the general availability of EKS Capabilities, a fully-managed extensible set of Kubernetes-native platform features for workload deployment, AWS cloud resource management, and Kubernetes resource composition and orchestration. EKS Capabilities provides out-of-the-box platform features and offloads operations to AWS, improving the performance and security of your platform components. EKS Capabilities streamlines building and scaling with Kubernetes, allowing you to focus on deploying applications rather than maintaining platform infrastructure. These capabilities run in AWS-owned infrastructure separate from your clusters, with AWS handling auto scaling, patching, and upgrading. Application developers get ready-to-use platform capabilities that enable faster workload deployment and scaling across the organization, while platform teams can offload operational tasks to AWS. Three capabilities are available at launch including continuous deployment with Argo CD, AWS resource management through AWS Controllers for Kubernetes (ACK), and dynamic resource orchestration using Kube Resource Orchestrator (KRO). EKS Capabilities is available today in all https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/, except AWS GovCloud (US) and China Regions. To get started with EKS Capabilities, use the EKS API, CLI, eksctl, AWS Console, or your favorite infrastructure as code tooling to enable it in a new or existing EKS cluster. To learn more, visit the EKS Capabilities https://aws.amazon.com/eks/features/, https://docs.aws.amazon.com/eks/latest/userguide/capabilities.html, https://aws.amazon.com/eks/pricing/, and AWS News Launch blog.

Announcing Amazon EKS Capabilities

Amazon Elastic Kubernetes Service (EKS) announces the general availability of EKS Capabilities, a fully-managed extensible set of Kubernetes-native platform features for workload deployment, AWS cloud resource management, and Kubernetes resou...

#AWS #AmazonEks

1 0 0 0
Amazon EKS and Amazon ECS announce fully managed MCP servers in preview Today, https://aws.amazon.com/eks/ (EKS) and https://aws.amazon.com/ecs/https://aws.amazon.com/ecs/ (ECS) announced fully managed MCP servers enabling AI powered experiences for development and operations in preview. MCP (Model Context Protocol) provides a standardized interface that enriches AI applications with real-time, contextual knowledge of EKS and ECS clusters, enabling more accurate and tailored guidance throughout the application lifecycle, from development through operations. With this launch, EKS and ECS now offer fully managed MCP servers hosted in the AWS cloud, eliminating the need for local installation and maintenance. The fully managed MCP servers provide enterprise-grade capabilities like automatic updates and patching, centralized security through AWS IAM integration, comprehensive audit logging via AWS CloudTrail, and the proven scalability, reliability, and support of AWS. The fully managed Amazon EKS and ECS MCP servers enable developers to easily configure AI coding assistants like Kiro CLI, Cursor, or Cline for guided development workflows, optimized code generation, and context-aware debugging. Operators gain access to a knowledge base of best practices and troubleshooting guidance derived from extensive operational experience managing clusters at scale. To learn more about the Amazon EKS MCP server preview, visit EKS MCP server https://docs.aws.amazon.com/eks/latest/userguide/eks-mcp-introduction.html and launch https://aws.amazon.com/blogs/containers/introducing-the-fully-managed-amazon-eks-mcp-server-preview/. To learn more about the Amazon ECS MCP server preview, visit ECS MCP server https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-mcp-introduction.html and launch https://aws.amazon.com/blogs/containers/accelerate-container-troubleshooting-with-the-fully-managed-amazon-ecs-mcp-server-preview/.

Amazon EKS and Amazon ECS announce fully managed MCP servers in preview

Today, https://aws.amazon.com/eks/ (EKS) and https://aws.amazon.com/ecs/https://aws.amazon.com/ecs/ (ECS) announced fully managed MCP servers enabling AI powered experiences for development and ...

#AWS #AmazonEcs #AmazonEks

1 0 0 0
Preview
Amazon EKS and Amazon ECS announce fully managed MCP servers in preview Today, Amazon Elastic Kubernetes Service (EKS) and Amazon Elastic Container Service (ECS) announced fully managed MCP servers enabling AI powered experiences for development and operations in preview. MCP (Model Context Protocol) provides a standardized interface that enriches AI applications with real-time, contextual knowledge of EKS and ECS clusters, enabling more accurate and tailored guidance throughout the application lifecycle, from development through operations. With this launch, EKS and ECS now offer fully managed MCP servers hosted in the AWS cloud, eliminating the need for local installation and maintenance. The fully managed MCP servers provide enterprise-grade capabilities like automatic updates and patching, centralized security through AWS IAM integration, comprehensive audit logging via AWS CloudTrail, and the proven scalability, reliability, and support of AWS. The fully managed Amazon EKS and ECS MCP servers enable developers to easily configure AI coding assistants like Kiro CLI, Cursor, or Cline for guided development workflows, optimized code generation, and context-aware debugging. Operators gain access to a knowledge base of best practices and troubleshooting guidance derived from extensive operational experience managing clusters at scale. To learn more about the Amazon EKS MCP server preview, visit EKS MCP server documentation and launch blog post. To learn more about the Amazon ECS MCP server preview, visit ECS MCP server documentation and launch blog post.

🆕 Amazon EKS and ECS now offer fully managed MCP servers in preview, enabling AI-powered development and operations with real-time cluster insights, automatic updates, and AWS IAM integration, eliminating local installation and maintenance.

#AWS #AmazonEcs #AmazonEks

1 0 0 0
Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS, providing enhanced observability for customers running large-scale, high-performance machine learning workloads on multi-instance nodes. This new capability enables data scientists and ML engineers to efficiently monitor and troubleshoot their containerized ML applications, offering aggregated metrics and simplified management across Neuron UltraServer groups. Neuron UltraServers combine multiple EC2 instances into a single logical server unit, optimized for machine learning workloads using AWS Trainium and Inferentia accelerators. Container Insights, a monitoring and diagnostics feature in Amazon CloudWatch, automatically collects metrics from containerized applications. With this launch, Container Insights introduces a new filter specifically for UltraServers in EKS environments. You can now select an UltraServer ID to view new aggregate metrics across all instances within that server, replacing the need to monitor individual instances separately. In addition to per-instance metrics, you can now view consolidated performance data for the entire UltraServer group, streamlining the monitoring of ML workloads running on AWS Neuron. Amazon CloudWatch Container Insights is available in all commercial AWS Regions, and the AWS GovCloud (US). To get started, see https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Container-Insights-metrics-enhanced-EKS.html#Container-Insights-metrics-EKS-Neuron in the Amazon CloudWatch User Guide

Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS

Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS, providing enhanced observability for customers running large-scale, high-pe...

#AWS #AmazonEks #AwsGovcloudUs #AmazonCloudwatch

1 0 0 0
Preview
Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS Amazon CloudWatch Container Insights now supports Neuron UltraServers on Amazon EKS, providing enhanced observability for customers running large-scale, high-performance machine learning workloads on multi-instance nodes. This new capability enables data scientists and ML engineers to efficiently monitor and troubleshoot their containerized ML applications, offering aggregated metrics and simplified management across Neuron UltraServer groups. Neuron UltraServers combine multiple EC2 instances into a single logical server unit, optimized for machine learning workloads using AWS Trainium and Inferentia accelerators. Container Insights, a monitoring and diagnostics feature in Amazon CloudWatch, automatically collects metrics from containerized applications. With this launch, Container Insights introduces a new filter specifically for UltraServers in EKS environments. You can now select an UltraServer ID to view new aggregate metrics across all instances within that server, replacing the need to monitor individual instances separately. In addition to per-instance metrics, you can now view consolidated performance data for the entire UltraServer group, streamlining the monitoring of ML workloads running on AWS Neuron. Amazon CloudWatch Container Insights is available in all commercial AWS Regions, and the AWS GovCloud (US). To get started, see AWS Neuron metrics for AWS Trainium and AWS Inferentia in the Amazon CloudWatch User Guide

🆕 Amazon CloudWatch now supports Neuron UltraServers on EKS, boosting observability for large ML workloads with aggregated metrics for multi-instance nodes, available in all commercial AWS Regions.

#AWS #AmazonEks #AwsGovcloudUs #AmazonCloudwatch

1 0 0 0
Amazon ECS and Amazon EKS now offer enhanced AI-powered troubleshooting in the Console https://aws.amazon.com/ecs/ (ECS) and https://aws.amazon.com/eks/ (EKS) now offer enhanced AI-powered troubleshooting experiences in the AWS Management Console through Amazon Q Developer. The new AI-powered experiences appear contextually alongside error or status messages in the console, helping customers root cause issues and view mitigation suggestions with a single click. In the ECS Console, customers can use the new “Inspect with Amazon Q” button to troubleshoot issues such as failed tasks, container health check failures, or deployment rollbacks. Simply click the status reason on task details, task definition details, or deployment details page, and click “Inspect with Amazon Q” from the popover to start troubleshooting with context from the issue provided to the agent for you. Once clicked, Amazon Q automatically uses appropriate AI tools to analyze the issue, gather the relevant logs and metrics, help you understand the root cause, and recommend mitigation actions. The Amazon EKS console integrates Amazon Q throughout the observability dashboard, enabling you to inspect and troubleshoot cluster, control plane, and node health issues with contextual AI assistance. Simply click "Inspect with Amazon Q" directly from tables that outline issues, or click on an issue to view details and then select "Inspect with Amazon Q" to begin your investigation. The Q-powered experience provides deeper understanding of cluster-level insights, such as upgrade insights, helping you proactively identify and mitigate potential issues. Amazon Q also streamlines workload troubleshooting by helping you investigate Kubernetes events on pods that indicate issues, accelerating root cause identification and resolution. Amazon Q integration in the Amazon ECS and Amazon EKS consoles is now available in all AWS commercial regions. To learn more, visit the https://docs.aws.amazon.com/AmazonECS/latest/developerguide/troubleshooting-with-Q.html and https://docs.aws.amazon.com/eks/latest/userguide/amazon-q-integration.html.

Amazon ECS and Amazon EKS now offer enhanced AI-powered troubleshooting in the Console

https://aws.amazon.com/ecs/ (ECS) and https://aws.amazon.com/eks/ (EKS) now offer enhanced AI-powered troubleshooting experiences in the AWS Management Console through Amazon Q De...

#AWS #AmazonEks #AmazonEcs

1 0 0 0
Amazon EKS add-ons now supports the AWS Secrets Store CSI Driver provider Today, AWS announces the general availability of the AWS Secrets Store CSI Driver provider EKS add-on. This new integration allows customers to retrieve secrets from AWS Secrets Manager and parameters from AWS Systems Manager Parameter Store and mount them as files on their Kubernetes clusters running on Amazon Elastic Kubernetes Service (Amazon EKS). The add-on installs and manages the https://github.com/aws/secrets-store-csi-driver-provider-aws. Now, with the new Amazon EKS add-on, customers can quickly and easily set up new and existing clusters using automation to leverage AWS Secrets Manager and AWS Systems Manager Parameter Store, enhancing security and simplifying secrets management. Amazon EKS add-ons are curated extensions that automate the installation, configuration, and lifecycle management of operational software for Kubernetes clusters, simplifying the process of maintaining cluster functionality and security. Customers rely on AWS Secrets Manager to securely store and manage secrets such as database credentials and API keys throughout their lifecycle. To learn more about Secrets Manager, visit the https://aws.amazon.com/documentation/secretsmanager/. For a list of regions where Secrets Manager is available, see the https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/. To get started with Secrets Manager, visit the https://aws.amazon.com/secrets-manager/. This new Amazon EKS add-on is available in all AWS commercial and AWS GovCloud (US) Regions. To get started, see the following resources: https://docs.aws.amazon.com/eks/latest/userguide/workloads-add-ons-available-eks.html#add-ons-aws-secrets-store-csi-driver-provider https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html

Amazon EKS add-ons now supports the AWS Secrets Store CSI Driver provider

Today, AWS announces the general availability of the AWS Secrets Store CSI Driver provider EKS add-on. This new integration allows customers to retrieve secrets from AWS Secrets Manager an...

#AWS #AmazonEks #AwsGovcloudUs

1 0 0 0
Preview
Amazon EKS add-ons now supports the AWS Secrets Store CSI Driver provider Today, AWS announces the general availability of the AWS Secrets Store CSI Driver provider EKS add-on. This new integration allows customers to retrieve secrets from AWS Secrets Manager and parameters from AWS Systems Manager Parameter Store and mount them as files on their Kubernetes clusters running on Amazon Elastic Kubernetes Service (Amazon EKS). The add-on installs and manages the AWS provider for the Secrets Store CSI Driver. Now, with the new Amazon EKS add-on, customers can quickly and easily set up new and existing clusters using automation to leverage AWS Secrets Manager and AWS Systems Manager Parameter Store, enhancing security and simplifying secrets management. Amazon EKS add-ons are curated extensions that automate the installation, configuration, and lifecycle management of operational software for Kubernetes clusters, simplifying the process of maintaining cluster functionality and security. Customers rely on AWS Secrets Manager to securely store and manage secrets such as database credentials and API keys throughout their lifecycle. To learn more about Secrets Manager, visit the documentation. For a list of regions where Secrets Manager is available, see the AWS Region table. To get started with Secrets Manager, visit the Secrets Manager home page. This new Amazon EKS add-on is available in all AWS commercial and AWS GovCloud (US) Regions. To get started, see the following resources: Amazon EKS add-ons user guide AWS Secrets Manager user guide

🆕 Amazon EKS add-ons now support the AWS Secrets Store CSI Driver, enabling Kubernetes clusters to fetch secrets from AWS Secrets Manager and parameters from AWS Systems Manager, boosting security and simplifying secrets management. Available globally.

#AWS #AmazonEks #AwsGovcloudUs

1 0 0 0
Amazon EKS introduces enhanced container network observability Today, we’re announcing new network observability features in https://aws.amazon.com/eks/ that provide deeper insights into your container networking environment. These new capabilities help you better understand, monitor, and troubleshoot your Kubernetes network landscape in AWS. Customers are increasingly deploying microservices to expand and incrementally innovate with software in the AWS cloud, while using Amazon EKS as the underlying platform to run their applications. With enhanced container network observability, customers can leverage granular, network-related metrics for better proactive anomaly detection across cluster traffic, cross-AZ flows, and AWS services. Using these metrics, customers can better measure system performance and visualize the underlying metrics using their preferred observability stack. Additionally, EKS now provides network monitoring visualizations in the AWS console that accelerate and enhance precise troubleshooting for faster root cause analysis. Customers can also leverage these visual capabilities to pinpoint top-talkers and network flows causing retransmissions and retransmission timeouts, eliminating blind spots during incidents. These network monitoring features in EKS are powered by https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-NetworkFlowMonitor.html Enhanced container network observability for EKS is available in all commercial AWS Regions where CloudWatch Network Flow Monitor is https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-NetworkFlowMonitor-Regions.html. To learn more, visit the https://docs.aws.amazon.com/eks/latest/userguide/network-observability.html and AWS News Launch Blog. 

Amazon EKS introduces enhanced container network observability

Today, we’re announcing new network observability features in https://aws.amazon.com/eks/ that provide deeper insights into your container networking environment. These new capabilities help you better understand...

#AWS #AmazonEks

0 0 0 0
Post image

How to run jobs without baking everything into the image: Building Custom container images
in this episode of #KubeTuesday 2025-11-11
- YT: youtu.be/XNCPhQK1dF8
- Containers domain on AWS Skill Builder - skillbuilder.aws/category/dom...
#Kubernetes #AmazonEKS

1 0 0 0
Preview
Secure EKS clusters with the new support for Amazon EKS in AWS Backup | Amazon Web Services AWS Backup now supports Amazon EKS, providing a fully managed, centralized solution to back up and restore Kubernetes clusters and application data without requiring custom scripts or third-party tools.

📰🚨 Secure EKS clusters with the new support for Amazon EKS in AWS Backup

#AWSBackup #AmazonEKS #Kubernetes #DataProtection #CloudComputing

1 0 0 0
AWS Backup now supports Amazon EKS AWS Backup now supports Amazon Elastic Kubernetes Service (EKS), providing a fully-managed, centralized solution for backing up EKS cluster state and persistent application data. You can now use AWS Backup to help protect your entire EKS environments through a centralized, policy-driven backup service. You now get comprehensive data protection capabilities through AWS Backup across your Amazon EKS Clusters, including automated scheduling, retention management, immutable vaults, cross-Region and cross-account copies. AWS Backup delivers a new an agent-free solution that works natively with AWS, replacing custom scripts or third-party tools to perform backups for each cluster. You can restore entire EKS clusters, specific namespaces, or individual persistent volumes. Use AWS Backup to protect your clusters for disaster recovery, to help meet your compliance requirements, or for additional protection before EKS cluster upgrades. AWS Backup for EKS is available in all AWS Regions where both AWS Backup and Amazon EKS are available. For the most up-to-date information on Regional availability, please refer to the https://docs.aws.amazon.com/aws-backup/latest/devguide/backup-feature-availability.html#supported-services-by-region. To get started with AWS Backup for Amazon EKS, visit the https://us-east-2.console.aws.amazon.com/backup/home?, refer to the https://docs.aws.amazon.com/aws-backup/latest/devguide/backup-aurora.html%20and, or read the https://aws.amazon.com/blogs/aws/secure-eks-clusters-with-the-new-support-for-amazon-eks-in-aws-backup. 

AWS Backup now supports Amazon EKS

AWS Backup now supports Amazon Elastic Kubernetes Service (EKS), providing a fully-managed, centralized solution for backing up EKS cluster state and persistent application data. You can now use AWS Backup to help pr...

#AWS #AwsBackup #AwsGovcloudUs #AmazonEks

1 0 0 0
Preview
AWS Backup now supports Amazon EKS AWS Backup now supports Amazon Elastic Kubernetes Service (EKS), providing a fully-managed, centralized solution for backing up EKS cluster state and persistent application data. You can now use AWS Backup to help protect your entire EKS environments through a centralized, policy-driven backup service. You now get comprehensive data protection capabilities through AWS Backup across your Amazon EKS Clusters, including automated scheduling, retention management, immutable vaults, cross-Region and cross-account copies. AWS Backup delivers a new an agent-free solution that works natively with AWS, replacing custom scripts or third-party tools to perform backups for each cluster. You can restore entire EKS clusters, specific namespaces, or individual persistent volumes. Use AWS Backup to protect your clusters for disaster recovery, to help meet your compliance requirements, or for additional protection before EKS cluster upgrades. AWS Backup for EKS is available in all AWS Regions where both AWS Backup and Amazon EKS are available. For the most up-to-date information on Regional availability, please refer to the AWS Backup Regional availability. To get started with AWS Backup for Amazon EKS, visit the AWS Backup console, refer to the AWS Backup documentation, or read the AWS News Blog.

🆕 AWS Backup now supports Amazon EKS with centralized, policy-driven backup for cluster state and data, featuring automated scheduling, retention, and cross-region copies. Agent-free, it replaces custom scripts, available in all regions where AWS Backup a…

#AWS #AwsBackup #AwsGovcloudUs #AmazonEks

1 0 0 0
Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West) Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode is now available in the AWS GovCloud (US-East) and (US-West) regions. This feature fully automates compute, storage, and networking management for Kubernetes clusters. Additionally, EKS Auto Mode now supports FIPS-validated cryptographic modules through its Amazon Machine Images (AMIs) to help customers meet FedRAMP compliance requirements. EKS Auto Mode enables organizations to get Kubernetes conformant managed compute, networking, and storage for any new or existing EKS cluster. Its AMIs include FIPS-compliant cryptographic modules to help meet federal security standards for regulated workloads. EKS Auto Mode manages OS patching and updates, and strengthens security posture through ephemeral compute, making it ideal for workloads that require high security standards. It also dynamically scales EC2 instances based on demand, helping optimize compute costs while maintaining application availability. Amazon EKS Auto Mode is now available in AWS GovCloud (US-East) and (US-West). You can enable EKS Auto Mode in any EKS cluster running Kubernetes 1.29 and above with no upfront fees or commitments—you pay for the management of the compute resources provisioned, in addition to your regular EC2 costs. To get started with EKS Auto Mode, visit the https://aws.amazon.com/eks/. For additional details, see thehttps://docs.aws.amazon.com/eks/latest/userguide/eks-auto-mode.html and https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/whatis.html.

Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West)

Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode is now available in the AWS GovCloud (US-East) and (US-West) regions. This feature fully automates compute, storage, and networkin...

#AWS #AmazonEks #AwsGovcloudUs

1 0 0 0
Preview
Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West) Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode is now available in the AWS GovCloud (US-East) and (US-West) regions. This feature fully automates compute, storage, and networking management for Kubernetes clusters. Additionally, EKS Auto Mode now supports FIPS-validated cryptographic modules through its Amazon Machine Images (AMIs) to help customers meet FedRAMP compliance requirements. EKS Auto Mode enables organizations to get Kubernetes conformant managed compute, networking, and storage for any new or existing EKS cluster. Its AMIs include FIPS-compliant cryptographic modules to help meet federal security standards for regulated workloads. EKS Auto Mode manages OS patching and updates, and strengthens security posture through ephemeral compute, making it ideal for workloads that require high security standards. It also dynamically scales EC2 instances based on demand, helping optimize compute costs while maintaining application availability. Amazon EKS Auto Mode is now available in AWS GovCloud (US-East) and (US-West). You can enable EKS Auto Mode in any EKS cluster running Kubernetes 1.29 and above with no upfront fees or commitments—you pay for the management of the compute resources provisioned, in addition to your regular EC2 costs. To get started with EKS Auto Mode, visit the Amazon EKS product page. For additional details, see the Amazon EKS User Guide and AWS GovCloud (US) documentation.

🆕 Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West) to automate Kubernetes cluster management, support FIPS compliance, and optimize compute costs for secure, scalable workloads.

#AWS #AmazonEks #AwsGovcloudUs

1 0 0 0
Announcing AWS for Fluent Bit 3.0.0 based on Fluent Bit 4.1.0 AWS for Fluent Bit announces version 3.0.0, based on Fluent Bit version 4.1.0 and Amazon Linux 2023. Container logging using AWS for Fluent Bit is now more performant and more feature-rich for AWS customers, including those using https://aws.amazon.com/ecs/ (Amazon ECS) and https://aws.amazon.com/eks/ (Amazon EKS). AWS for Fluent Bit enables Amazon ECS and Amazon EKS customers to collect, process, and route container logs to destinations including Amazon CloudWatch Logs, Amazon Data Firehose, Amazon Kinesis Data Streams, and Amazon S3 without changing application code. AWS for Fluent Bit 3.0.0 upgrades the Fluent Bit version to 4.1.0, and upgrades the base image to Amazon Linux 2023. These updates deliver access to the latest Fluent Bit features, significant performance improvements, and enhanced security. New features include native OpenTelemetry (OTel) support for ingesting and forwarding OTLP logs, metrics, and traces with AWS SigV4 authentication—eliminating the need for additional sidecars. Performance improvements include faster JSON parsing, processing more logs per vCPU with lower latency. Security enhancements include TLS min version and cipher controls, which enforce your TLS policy on outputs from AWS for Fluent Bit for stronger protocol posture. You can use AWS for Fluent Bit 3.0.0 on both ECS and EKS. On ECS, update the FireLens log-router container image in your task definition to the 3.0.0 tag from the Amazon ECR Public Gallery. On EKS, upgrade by either updating the Helm release or setting the DaemonSet image to the 3.0.0 version. The https://docs.aws.amazon.com/AmazonECS/latest/developerguide/firelens-using-fluentbit.html is available in the https://gallery.ecr.aws/aws-observability/aws-for-fluent-bit and in the Amazon ECR repository. You can also find it on https://github.com/aws/aws-for-fluent-bit for source code and additional guidance.

Announcing AWS for Fluent Bit 3.0.0 based on Fluent Bit 4.1.0

AWS for Fluent Bit announces version 3.0.0, based on Fluent Bit version 4.1.0 and Amazon Linux 2023. Container logging using AWS for Fluent Bit is now more performant and more feature-rich ...

#AWS #AmazonEcs #AmazonEks #AwsGovcloudUs

1 0 0 0
Preview
Announcing AWS for Fluent Bit 3.0.0 based on Fluent Bit 4.1.0 AWS for Fluent Bit announces version 3.0.0, based on Fluent Bit version 4.1.0 and Amazon Linux 2023. Container logging using AWS for Fluent Bit is now more performant and more feature-rich for AWS customers, including those using Amazon Elastic Container Services (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS). AWS for Fluent Bit enables Amazon ECS and Amazon EKS customers to collect, process, and route container logs to destinations including Amazon CloudWatch Logs, Amazon Data Firehose, Amazon Kinesis Data Streams, and Amazon S3 without changing application code. AWS for Fluent Bit 3.0.0 upgrades the Fluent Bit version to 4.1.0, and upgrades the base image to Amazon Linux 2023. These updates deliver access to the latest Fluent Bit features, significant performance improvements, and enhanced security. New features include native OpenTelemetry (OTel) support for ingesting and forwarding OTLP logs, metrics, and traces with AWS SigV4 authentication—eliminating the need for additional sidecars. Performance improvements include faster JSON parsing, processing more logs per vCPU with lower latency. Security enhancements include TLS min version and cipher controls, which enforce your TLS policy on outputs from AWS for Fluent Bit for stronger protocol posture. You can use AWS for Fluent Bit 3.0.0 on both ECS and EKS. On ECS, update the FireLens log-router container image in your task definition to the 3.0.0 tag from the Amazon ECR Public Gallery. On EKS, upgrade by either updating the Helm release or setting the DaemonSet image to the 3.0.0 version. The AWS for Fluent Bit image is available in the Amazon ECR Public Gallery and in the Amazon ECR repository. You can also find it on GitHub for source code and additional guidance.

🆕 AWS Fluent Bit 3.0.0, based on 4.10, improves ECS and EKS logging to CloudWatch, Firehose, Kinesis, and S3. New OpenTelemetry, faster JSON parsing, and enhanced security. Update via ECR or GitHub.

#AWS #AmazonEcs #AmazonEks #AwsGovcloudUs

1 0 0 0
Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.34 Kubernetes version 1.34 introduced several new features and bug fixes, and AWS is excited to announce that you can now use https://aws.amazon.com/eks/ (EKS) and https://aws.amazon.com/eks/eks-distro/ to run Kubernetes version 1.34. Starting today, you can create new EKS clusters using version 1.34 and upgrade existing clusters to version 1.34 using the EKS console, the eksctl command line interface, or through an infrastructure-as-code tool. Kubernetes version 1.34 introduces several key improvements, including projected service account tokens for kubelet image credential providers helping improve security for container image pulls, and Pod-level resource requests and limits for simplified multi-container resource management. The release also introduces Dynamic Resource Allocation (DRA) prioritized alternatives, enabling workloads to define prioritized device requirements for improved resource scheduling. To learn more about the changes in Kubernetes version 1.34, see our https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions-standard.html and the Kubernetes project https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.34.md EKS now supports Kubernetes version 1.34 in all the AWS Regions where EKS is available, including the AWS GovCloud (US) Regions. You can learn more about the Kubernetes versions available on EKS and instructions to update your cluster to version 1.34 by visiting EKS documentation. You can use https://docs.aws.amazon.com/eks/latest/userguide/cluster-insights.html to check if there any issues that can impact your Kubernetes cluster upgrades. EKS Distro builds of Kubernetes version 1.34 are available through ECR Public Gallery and GitHub. Learn more about the EKS version lifecycle policies in the https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html.

Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.34

Kubernetes version 1.34 introduced several new features and bug fixes, and AWS is excited to announce that you can now use https://aws.amazon.com/eks/ (EKS and https://aws.amazon.com/eks/e

#AWS #AwsGovcloudUs #AmazonEks

1 0 0 0
Preview
Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.34 Kubernetes version 1.34 introduced several new features and bug fixes, and AWS is excited to announce that you can now use Amazon Elastic Kubernetes Service (EKS) and Amazon EKS Distro to run Kubernetes version 1.34. Starting today, you can create new EKS clusters using version 1.34 and upgrade existing clusters to version 1.34 using the EKS console, the eksctl command line interface, or through an infrastructure-as-code tool. Kubernetes version 1.34 introduces several key improvements, including projected service account tokens for kubelet image credential providers helping improve security for container image pulls, and Pod-level resource requests and limits for simplified multi-container resource management. The release also introduces Dynamic Resource Allocation (DRA) prioritized alternatives, enabling workloads to define prioritized device requirements for improved resource scheduling. To learn more about the changes in Kubernetes version 1.34, see our documentation and the Kubernetes project release notes. EKS now supports Kubernetes version 1.34 in all the AWS Regions where EKS is available, including the AWS GovCloud (US) Regions. You can learn more about the Kubernetes versions available on EKS and instructions to update your cluster to version 1.34 by visiting EKS documentation. You can use EKS cluster insights to check if there any issues that can impact your Kubernetes cluster upgrades. EKS Distro builds of Kubernetes version 1.34 are available through ECR Public Gallery and GitHub. Learn more about the EKS version lifecycle policies in the documentation.

🆕 AWS now supports Kubernetes version 1.34 on Amazon EKS and EKS Distro, featuring enhanced security, resource management, and Dynamic Resource Allocation. Upgrade via EKS console, eksctl, or infrastructure-as-code tools. Available in all EKS regions.

#AWS #AwsGovcloudUs #AmazonEks

1 0 0 0