Trending

#eksautomode

Latest posts tagged with #eksautomode on Bluesky

Latest Top
Trending

Posts tagged #eksautomode

Amazon EKS Node Monitoring Agent is now open source <p>Amazon Elastic Kubernetes Service (Amazon EKS) Node Monitoring Agent is now open source. You can access the Amazon EKS Node Monitoring Agent source code and contribute to its development on <a title="GitHub" href="https://github.com/aws/eks-node-monitoring-agent">GitHub</a>.<br> <br> Running workloads reliably in Kubernetes clusters can be challenging. Cluster administrators often have to resort to manual methods of monitoring and repairing degraded nodes in their clusters. The Amazon EKS Node Monitoring Agent simplifies this process by automatically monitoring and publishing node-level system, storage, networking, and accelerator issues as node conditions, which are used by Amazon EKS for automatic node repair. With the Amazon EKS Node Monitoring Agent’s source code available on GitHub, you now have visibility into the agent’s implementation, can customize it to fit your requirements, and can contribute directly to its ongoing development.<br> <br> The Amazon EKS Node Monitoring Agent is included in Amazon EKS Auto Mode and is available as an Amazon EKS add-on in all AWS Regions where Amazon EKS is available.<br> <br> To learn more about the Amazon EKS Node Monitoring Agent and node repair, visit the <a href="https://docs.aws.amazon.com/eks/latest/userguide/node-health.html">Amazon EKS documentation</a>.<a title="GitHub" href="https://github.com/aws/eks-node-monitoring-agent"></a></p>

Amazon EKS Node Monitoring Agent is now open source #eksautomode #eks #kubernetes

0 0 0 0
Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities <p>Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode’s managed capabilities can now be configured as log delivery sources using Amazon CloudWatch Vended Logs. This integration enables customers to monitor and troubleshoot their EKS Auto Mode clusters more effectively by automatically collecting logs from Auto Mode’s managed Kubernetes capabilities for compute autoscaling, block storage, load balancing, and pod networking.<br> <br> Customers can configure log delivery for Auto Mode capabilities using CloudWatch APIs or the AWS Console. Each Auto Mode capability can be configured as a CloudWatch Vended Logs delivery source, enabling reliable, secure log delivery with built-in AWS authentication and authorization at a reduced price compared to standard CloudWatch Logs. Customers can deliver these logs to CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose destinations.<br> <br> This feature is available today in all regions where EKS Auto Mode is available. Standard CloudWatch Logs, S3, or Kinesis charges apply depending on the chosen destination.<br> <br> To learn more about EKS Auto Mode logging capabilities, visit the&nbsp;<a href="https://docs.aws.amazon.com/eks/latest/userguide/auto-observability.html">Amazon EKS documentation</a>.</p>

Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities #s3 #eksautomode #eks #kubernetes

0 0 0 0
Preview
Maximize Amazon EKS efficiency: How Auto Mode, Graviton, and Spot work together This blog post dives deeper into optimizing Amazon EKS Auto Mode clusters using AWS&nbsp;Graviton and Amazon EC2&nbsp;Spot instances. AWS customers adopt AWS Graviton instances to achieve up to 40% higher price-performance ratio and up to 60% less energy to meet their sustainability goals. Additionally, AWS customers use Amazon EC2 Spot instances for eligible workloads to save up to 90% on Amazon Elastic Compute Cloud (Amazon EC2) On-Demand costs.

Maximize Amazon EKS efficiency: How Auto Mode, Graviton, and Spot work together #ec2 #eksautomode #eks #kubernetes

0 0 0 0
Preview
Enhance Amazon EKS network security posture with DNS and admin network policies Amazon Web Services (AWS) announced the availability of DNS-based and Admin network policies for Amazon Elastic Kubernetes Service (EKS) Auto mode and Admin network policies for both EKS Auto mode and EKS on Amazon Elastic Compute Cloud (EC2), providing enhanced capabilities to secure network traffic both within your clusters and to external endpoints. In this post, we explore practical use cases that demonstrate how these policies solve real-world challenges and remove the need to rely on third-party software across different deployment scenarios, from securing access to external services to hybrid cloud integration and multi-tenant environments.

Enhance Amazon EKS network security posture with DNS and admin network policies #ec2 #eksautomode #eks #kubernetes

0 0 0 0
Preview
Streamline your containerized CI/CD with GitLab Runners and Amazon EKS Auto Mode In this post we demonstrate how using GitLab Runners on EKS Auto Mode, combined with Amazon Elastic Compute Cloud (Amazon EC2) Spot Instances, can deliver enterprise-scale CI/CD capabilities while achieving up to 90% cost reduction when compared to traditional deployment models. This approach not only optimizes operational expenses, but also provides resilient, scalable pipeline execution.

Streamline your containerized CI/CD with GitLab Runners and Amazon EKS Auto Mode #ec2 #eksautomode #eks #kubernetes

0 0 0 0
Amazon EKS introduces enhanced network security policies <p>Today, we’re announcing enhanced network policy capabilities in <a href="https://aws.amazon.com/eks/" target="_blank">Amazon Elastic Kubernetes Service (EKS)</a>, allowing customers to improve the network security posture for their Kubernetes workloads and their integrations with cluster-external destinations. This enhancement builds on network segmentation features previously supported in EKS. Now you can centrally enforce network access filters across the entire cluster, as well as leverage Domain Name System (DNS) based policies to secure egress traffic from your cluster’s environment.<br> <br> As customers continue to scale their application environments using EKS, network traffic isolation is increasingly fundamental for preventing unauthorized access to resources inside and outside the cluster. To address this, EKS introduced support for <a href="https://kubernetes.io/docs/concepts/services-networking/network-policies/" target="_blank">Kubernetes NetworkPolicies</a> in the <a href="https://github.com/aws/amazon-vpc-cni-k8s" target="_blank">Amazon VPC Container Network Interface (VPC CNI) plugin</a>, allowing you to segment pod-to-pod communication at a namespace level. Now you can further strengthen the defensive posture for your Kubernetes network environment by centrally managing network filters for the whole cluster. Also, cluster admins now have a more stable and predictable approach for preventing unauthorized access to cluster-external resources in the cloud or on-prem using egress rules that filter traffic to external endpoints based on their Fully Qualified Domain Name (FQDN).<br> <br> These new network security features are available in all commercial AWS Regions for new EKS clusters running Kubernetes version 1.29 or later, with support for existing clusters to follow in the coming weeks. ClusterNetworkPolicy is available in all EKS cluster launch modes using VPC CNI v1.21.0 or later. DNS-based policies are only supported in <a href="https://docs.aws.amazon.com/eks/latest/userguide/automode.html" target="_blank">EKS Auto Mode-launched EC2 instances</a>. To learn more, visit the <a href="https://docs.aws.amazon.com/eks/latest/userguide/auto-net-pol.html" target="_blank">Amazon EKS documentation</a> or read the <a href="https://aws.amazon.com/blogs/containers/amazon-eks-introduces-enhanced-network-policy-capabilities" target="_blank">launch blog post here</a>.</p>

Amazon EKS introduces enhanced network security policies #ec2 #eksautomode #eks #kubernetes

0 0 0 0
AWS re:Invent 2025 - Amazon EKS Auto Mode: Evolving Kubernetes ops to enable innovation (CNS354)
AWS re:Invent 2025 - Amazon EKS Auto Mode: Evolving Kubernetes ops to enable innovation (CNS354)

AWS re:Invent 2025 - Amazon EKS Auto Mode: Evolving Kubernetes ops to enable innovation (CNS354) #reInvent #eksautomode #eks #kubernetes

3 0 0 0
Preview
Amazon EKS Blueprints for CDK: Now supporting Amazon EKS Auto Mode Amazon EKS Blueprints for CDK now supports EKS Auto Mode, enabling developers to deploy fully managed Kubernetes clusters with minimal configuration while AWS automatically handles infrastructure provisioning, compute scaling, and core add-on management. In this post, we explore how this integration combines EKS Blueprints' declarative infrastructure-as-code approach with EKS Auto Mode's hands-off cluster operations, providing three practical deployment patterns—from basic clusters to specialized ARM-based and AI/ML workloads—that let teams focus on application development rather than infrastructure management .

Amazon EKS Blueprints for CDK: Now supporting Amazon EKS Auto Mode #eksautomode #eks #kubernetes

2 0 0 0
Preview
Guide to Amazon EKS and Kubernetes sessions at AWS re:Invent 2025 In this post, we provide a comprehensive guide to the 48 Amazon EKS and Kubernetes sessions at AWS re:Invent 2025, covering everything from simplified cluster management with Amazon EKS Auto Mode to advanced AI/ML workload orchestration, platform engineering, and production-grade security strategies. Whether you're new to Kubernetes or architecting multi-region platforms, you'll find sessions tailored to your needs across workshops, chalk talks, builders sessions, and hands-on experiences at the Containers kiosk in the AWS Village.

Guide to Amazon EKS and Kubernetes sessions at AWS re:Invent 2025 #reInvent #eksautomode #eks #kubernetes

4 0 0 0
GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step
GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step

GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step #eksautomode #eks #kubernetes

2 0 0 0
Preview
New Amazon EKS Auto Mode features for enhanced security, network control, and performance In this post, we explore the latest Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode features that enhance security, network control, and performance for enterprise Kubernetes deployments. These new capabilities address critical operational challenges including capacity management, network segmentation, enterprise PKI integration, and comprehensive encryption while maintaining the automated cluster management that makes EKS Auto Mode transformative for development teams.

New Amazon EKS Auto Mode features for enhanced security, network control, and performance #eksautomode #eks #kubernetes

2 0 0 0
Preview
Enhancing container security in Amazon EKS Auto Mode with KubeArmor In this post, we explore how KubeArmor, an open source container-aware security enforcement system, enhances the security posture of containerized workloads running on EKS Auto Mode clusters. Although EKS Auto Mode significantly streamlines cluster management by automating control plane and node operations, securing the workloads running within the cluster remains a critical user responsibility.

Enhancing container security in Amazon EKS Auto Mode with KubeArmor #eksautomode #eks #kubernetes

1 0 0 0
Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West) <p>Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode is now available in the AWS GovCloud (US-East) and (US-West) regions. This feature fully automates compute, storage, and networking management for Kubernetes clusters. Additionally, EKS Auto Mode now supports FIPS-validated cryptographic modules through its Amazon Machine Images (AMIs) to help customers meet FedRAMP compliance requirements.<br> <br> EKS Auto Mode enables organizations to get Kubernetes conformant managed compute, networking, and storage for any new or existing EKS cluster. Its AMIs include FIPS-compliant cryptographic modules to help meet federal security standards for regulated workloads. EKS Auto Mode manages OS patching and updates, and strengthens security posture through ephemeral compute, making it ideal for workloads that require high security standards. It also dynamically scales EC2 instances based on demand, helping optimize compute costs while maintaining application availability.<br> <br> Amazon EKS Auto Mode is now available in AWS GovCloud (US-East) and (US-West). You can enable EKS Auto Mode in any EKS cluster running Kubernetes 1.29 and above with no upfront fees or commitments—you pay for the management of the compute resources provisioned, in addition to your regular EC2 costs.<br> <br> To get started with EKS Auto Mode, visit the <a href="https://aws.amazon.com/eks/" target="_blank">Amazon EKS product page</a>. For additional details, see the<a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-auto-mode.html" target="_blank"> Amazon EKS User Guide</a> and <a href="https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/whatis.html" target="_blank">AWS GovCloud (US) documentation</a>.</p>

Amazon EKS Auto Mode now available in AWS GovCloud (US-East) and (US-West) #ec2 #eksautomode #eks #kubernetes

3 0 0 0
Preview
Enhancing container security in Amazon EKS Auto Mode with KubeArmor In this post, we explore how KubeArmor, an open source container-aware security enforcement system, enhances the security posture of containerized workloads running on EKS Auto Mode clusters. Although EKS Auto Mode significantly streamlines cluster management by automating control plane and node operations, securing the workloads running within the cluster remains a critical user responsibility.

Enhancing container security in Amazon EKS Auto Mode with KubeArmor #eksautomode #eks #kubernetes

1 0 0 0
Preview
New Amazon EKS Auto Mode features for enhanced security, network control, and performance In this post, we explore the latest Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode features that enhance security, network control, and performance for enterprise Kubernetes deployments. These new capabilities address critical operational challenges including capacity management, network segmentation, enterprise PKI integration, and comprehensive encryption while maintaining the automated cluster management that makes EKS Auto Mode transformative for development teams.

New Amazon EKS Auto Mode features for enhanced security, network control, and performance #eksautomode #eks #kubernetes

2 0 0 0
Preview
How to build highly available Kubernetes applications with Amazon EKS Auto Mode In this post, we explore how to build highly available Kubernetes applications using Amazon EKS Auto Mode by implementing critical features like Pod Disruption Budgets, Pod Readiness Gates, and Topology Spread Constraints. Through various test scenarios including pod failures, node failures, AZ failures, and cluster upgrades, we demonstrate how these implementations maintain service continuity and maximize uptime in EKS Auto Mode environments.

How to build highly available Kubernetes applications with Amazon EKS Auto Mode #eksautomode #eks #kubernetes

2 0 0 0
GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step
GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step

GPT-OSS on Kubernetes | Amazon EKS Auto Mode Step-by-Step #eksautomode #eks #kubernetes

2 0 0 0
Preview
How to run AI model inference with GPUs on Amazon EKS Auto Mode In this post, we show you how to swiftly deploy inference workloads on EKS Auto Mode and demonstrate key features that streamline GPU management. We walk through a practical example by deploying open weight models from OpenAI using vLLM, while showing best practices for model deployment and maintaining operational efficiency.

How to run AI model inference with GPUs on Amazon EKS Auto Mode #eksautomode #eks #kubernetes

2 0 0 0
Secure your Kubernetes Containers on Amazon EKS Auto Mode | ft. Chainguard
Secure your Kubernetes Containers on Amazon EKS Auto Mode | ft. Chainguard

Secure your Kubernetes Containers on Amazon EKS Auto Mode | ft. Chainguard #eksautomode #eks #kubernetes

0 0 0 0
kubernetes-sigs/aws-load-balancer-controller released v.2.13.3 v2.13.3 (requires Kubernetes 1.22+) Documentation Image: public.ecr.aws/eks/aws-load-balancer-controller:v2.13.3 Thanks to all our contributors! 😊 Action required 🚨 🚨 🚨 We’ve updated the Gateway API relevant LBC CRDs LoadBalancerConfigurations and TargetGroupConfigurations Make sure to update the CRD definition in your cluster. If you're upgrading the charts using helm upgrade, you need to update CRDs manually: kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/refs/heads/main/config/crd/gateway/gateway-crds.yaml What’s new • We are pleased to announce the (Beta) of Layer 4 (L4) routing support for the Kubernetes Gateway API within the AWS Load Balancer Controller (LBC). This significant enhancement allows users to provision and manage AWS Network Load Balancers (NLBs) for TCP, UDP, and TLS traffic directly from their Kubernetes clusters, leveraging the powerful and extensible Gateway API. The LBC now fully supports the GatewayClass ,Gateway, TCPRoute, UDPRoute, and TLSRoute resources from the Gateway API. Please refer L4Routing for more info. Enhancement and Fixes • Upgraded Secuirty group deletion to be more responsive. • Reduced the duplicated DescribeTargetGroups calls to enhance performance. • Docs updates Changelog since v2.13.2 • [feat: gw api]Adding docs for L4 routing for gateway api (#4232, @shraddhabang) • Add ingress class example (#4221, @wweiwei-li) • tg / lb conf finalizers (#4230, @zac-nixon) • Update to go 1.24.4 (#4231, @zac-nixon) • add ip target tests for gateway api(#4227, @zac-nixon) • [feat: gw api] Fix edge cases for lb config finalizers (#4225, @shraddhabang) • refactor deferred reconciler to always process tgb on start up (#4224, @zac-nixon) • [gw api] Add TG config logic to find and create user specified TG config.(4220, @zac-nixon) • [feat gw-api]implement finalizer (#4217, @shuqz) • [bug fix] Make SG deletion more responsive(#4216,@zac-nixon) • [feat: gw api][bug fix] generate sg rules using listener protocols (#4198, @shraddhabang) • docs: update security_groups.md tabulation (#4193, @mtulio) • fix: Failing tests in ipv6 cluster(#4211, @wweiwei-li) • [feat: gw api] Fix the auto cert discovery logic for secure listeners on gateways (#4214, @shraddhabang) • [feat gw-api]handle resolvedRef for route status update and update ho…(#4210, @shuqz) • Reduce duplicated DescribeTargetGroups calls(#4208, @wweiwei-li) • [feat gw-api]bugfix and prevent backward generation route status update(##4206, @shuqz) • [gw api] Add Gateway API integ framework(#4205, @zac-nixon) • Add EKS Auto Mode considerations to documentation(#4196, Andrey Butenko) • docs: Change AWS Cognito Domain tip to warning(#4195, @ragul-engg) • [feat gw api] add support for infra labels + annotations(#4191, @zac-nixon) • [feat: gw api] support gw deletion(#4192, @zac-nixon) • Fix prefixListIDs typos(#4187, @gdlx)

kubernetes-sigs/aws-load-balancer-controller released v.2.13.3 #eksautomode #eks #kubernetes

1 0 0 0
Enhancing EKS Auto Mode: Real-World Strategies for Resource Optimization and Platform Reliability
Enhancing EKS Auto Mode: Real-World Strategies for Resource Optimization and Platform Reliability

Enhancing EKS Auto Mode: Real-World Strategies for Resource Optimization and Platform Reliability #eksautomode #eks #kubernetes

1 0 0 0
Preview
Introducing the Amazon EKS Auto Mode workshop Today we are delighted to introduce the Amazon Elastic Kubernetes (Amazon EKS) Auto Mode&nbsp;hands-on workshop. You can run this workshop in your own AWS account, or register to attend one of our AWS hosted events. EKS Auto Mode, a new capability to streamline Kubernetes operations on AWS, was made&nbsp;generally available at re:Invent 2024. Eliminating the […]

Introducing the Amazon EKS Auto Mode workshop #reInvent #eksautomode #eks #kubernetes

2 0 0 0
Preview
Running Github self hosted runner with EKS Auto YouTube video by The Zacs' Show Talking AWS

🥁 Join us in 30 mins on The Zacs' Show Talking AWS with a special guest Jatin Mehrotra along with @awsfanboy.com

Streaming live on -
YouTube - youtube.com/live/s23QvNz...
LinkedIn - www.linkedin.com/events/73136...

#AWS #EKS #EKSAutoMode #AWSCommunity

3 0 0 0
Preview
Under the hood: Amazon EKS Auto Mode This blog post was co-authored by Alex Kestner, Sr Product Manager – EKS; Todd Neal, Sr. Software Engineer – EKS; Neelendra Bhandari, Sr Software Dev Manager – EKS; and Sai Vennam, Principal Specialist Solutions Architect. At re:Invent 2024, we launched Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode, a new feature that provides a production-ready, […]

Under the hood: Amazon EKS Auto Mode #reInvent #eksautomode #eks #kubernetes

1 0 0 0
Hands on with Amazon EKS Auto Mode
Hands on with Amazon EKS Auto Mode

Hands on with Amazon EKS Auto Mode #eksautomode #eks #kubernetes

2 0 0 0
Preview
Discover Amazon EKS Auto Mode Discover Amazon EKS Auto Mode: Simplifies Kubernetes with automation, reducing management duties for efficient deployments

🚀 New blog alert 🚀

#AmazonEKS #EKS #Kubernetes #EKSAutoMode #AWSCommunity

blog.awsfanboy.com/lets-explore...

1 1 0 0
Amazon EKS Auto Mode Explained | Amazon Web Services
Amazon EKS Auto Mode Explained | Amazon Web Services

Amazon EKS Auto Mode Explained | Amazon Web Services #eksautomode #eks #kubernetes

1 1 0 0
Preview
Announcing Node Health Monitoring and Auto-Repair for Amazon EKS <p>Amazon Elastic Kubernetes Service (Amazon EKS) now monitors the health of the EC2 instances (nodes) in EKS clusters for Kubernetes-specific health issues and automatically takes action to repair them if they become unhealthy. This helps you achieve higher availability for your Kubernetes applications and reduces the operational overhead required to keep cluster infrastructure performing optimally.<br> <br> Managing the nodes where Kubernetes applications run to ensure they remain resilient to errors can be challenging and operationally intensive. This launch streamlines cluster infrastructure maintenance by continuously monitoring the health of the nodes within an EKS cluster, automatically detecting health issues and replacing nodes with issues when they arise. You can enable this feature’s health monitoring and repair capabilities by installing the new EKS node monitoring agent add-on in new or existing EKS clusters and then enabling node auto-repair in the EKS managed node group APIs or AWS Console. EKS Auto Mode comes with both the node monitoring agent and node auto-repair enabled.<br> <br> EKS node health monitoring and auto-repair is available today at no additional cost in all <a href="https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/" target="_blank">AWS Regions</a>, except AWS GovCloud (US) and China Regions.<br> <br> To learn more and get started, visit the <a href="https://aws.amazon.com/eks/" target="_blank">Amazon EKS product page</a> or <a href="https://docs.aws.amazon.com/eks/latest/userguide/node-health.html" target="_blank">Amazon EKS User Guide for node health monitoring and repair</a>.<br> &nbsp;</p>

Announcing Node Health Monitoring and Auto-Repair for Amazon EKS #ec2 #eksautomode #eks #kubernetes

2 0 0 0
Automate your Kubernetes cluster with Amazon EKS Auto Mode | AWS OnAir re:Invent 2024
Automate your Kubernetes cluster with Amazon EKS Auto Mode | AWS OnAir re:Invent 2024

Automate your Kubernetes cluster with Amazon EKS Auto Mode | AWS OnAir re:Invent 2024 #reInvent #eksautomode #eks #kubernetes

1 0 0 0
AWS re:Invent 2024 - Automate your entire Kubernetes cluster with Amazon EKS Auto Mode (KUB204-NEW)
AWS re:Invent 2024 - Automate your entire Kubernetes cluster with Amazon EKS Auto Mode (KUB204-NEW)

AWS re:Invent 2024 - Automate your entire Kubernetes cluster with Amazon EKS Auto Mode (KUB204-NEW) #reInvent #eksautomode #eks #kubernetes

2 0 0 0