This is the public roadmap for AWS container services (ECS, ECR, Fargate, and EKS).
-
Updated
Jul 5, 2021 - Shell
{{ message }}
This is the public roadmap for AWS container services (ECS, ECR, Fargate, and EKS).
Instant Kubernetes-Native Application Observability
Terraform module to create an Elastic Kubernetes (EKS) cluster and associated worker instances on AWS
What would you like to be added:
Our presubmits prowjobs have a linter which validates a lot of variables on the job definition like service account, make target, etc. It would be good value add, if we can validate the env vars as well.
Why is this needed:
This prevents from checking in, undesirable env variables that would not work for the prow job. An example would be a wrong bucket
Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (EKS) to create reliable and secure Kubernetes clusters.
Describe the bug
NTH seems to timeout cordoning and draining nodes if a pod isn't evicted after a timeout. Once this happens, NTH doesn't seem to complete the calling ASG lifecycle hook (I'm in queue processor mode), and it's left to timeout. The pods do eventually terminate after the timeout.
The timeout seems to be enforced in k8s's draining code (https://github.com/kubernetes/kubernetes
A Blazing fast Security Auditing tool for Kubernetes
This boilerplate contains terraform configurations for the rapid deployment of a Kubernetes cluster, supporting services, and the underlying infrastructure in AWS.
A Collection of Plugins for kubectl Integration (exec as any user, context switching, etc).
MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes cluster objects and the workloads/resources running inside the cluster.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Terraform module for provisioning an EKS cluster
A curated list of awesome tools for Amazon EKS
Unofficial PHP client for Kubernetes. It supports any form of authentication, the exec API, and it has an easy implementation for CRDs.
The AWS EKS Accelerator for Terraform is a framework designed to help deploy and operate secure multi-account, multi-region AWS environments. The power of the solution is the configuration file which enables the users to provide a unique terraform state for each cluster and manage multiple clusters from one repository. This code base allows users to deploy EKS add-ons using Helm charts.
Ops - cli wrapper for Terraform, Ansible, Helmfile and SSH for cloud automation
An implementation of Kubernetes Custom Metrics API for Amazon CloudWatch
Deploy a full EKS cluster with Terraform
Train and Deploy Machine Learning Models on Kubernetes using Amazon EKS
Ansible automation to have a KUBErnetes cluster INITialized as soon as possible...
Go-based microservices reference platform for demo of k8s observability with Istio
Full feature EKS cluster with Terragrunt/Terraform
Some log entries are using V(1) but still get emitted by default.
We should have a way to mute debug logs using a flag.
AWS EKS - kubernetes project
Amazon EKS custom AMIs based on Red Hat Enterprise Linux, CentOS, Debian, Ubuntu, and Windows.
A Pulumi component for easily creating and managing an Amazon EKS Cluster
Kubernetes for Everyone
Manages EKS clusters in different AWS accounts using Custom Resources
Add a description, image, and links to the eks topic page so that developers can more easily learn about it.
To associate your repository with the eks topic, visit your repo's landing page and select "manage topics."
What feature/behavior/change do you want?
Add the ability to set the maximum instance lifetime of instances in node groups:
https://docs.aws.amazon.com/autoscaling/ec2/userguide/asg-max-instance-lifetime.html
Why do you want this feature?
We'd like to ensure that our instances don't hang around for too long and so this would be a nice feature to have.