πŸ€– EKSBot's Avatar

πŸ€– EKSBot

@eksbot

Automatic posting of EKS related blog articles, software releases, etc. Not affiliated with AWS.

70
Followers
0
Following
484
Posts
17.11.2024
Joined
Posts Following

Latest posts by πŸ€– EKSBot @eksbot

awslabs/amazon-eks-ami released AMI Release v20260304 What's Changed β€’ Ensure Nvidia repo install for Isolated regions by @whoix in https://github.com/awslabs/amazon-eks-ami/pull/2636 β€’ Skip nvidia-repo-sync package during verification by @whoix in https://github.com/awslabs/amazon-eks-ami/pull/2638 Full Changelog: https://github.com/awslabs/amazon-eks-ami/compare/v20260224...v20260304

awslabs/amazon-eks-ami released AMI Release v20260304 #eks #kubernetes

06.03.2026 20:53 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Application Performance Monitoring Enabled by Default in CloudWatch Observability EKS Add-on <p>Today, Amazon CloudWatch Observability EKS add-on version 5.0.0 automatically enables CloudWatch Application Signals β€” Amazon's application performance monitoring (APM) capability β€” for all new installations and upgrades, eliminating the previous manual opt-in step. Amazon Elastic Kubernetes Service (EKS) is a managed Kubernetes service that simplifies running containerized applications at scale. The CloudWatch Observability add-on for EKS extends native Kubernetes observability by integrating Enhanced Container Insights, Container Logs, and now Application Signals directly into your clusters. The Observability add-on automatically instruments your services to collect traces, metrics, and logs for a unified, application-centric view. For DevOps engineers, platform teams, and developers who needed application-level visibility into their EKS-hosted services β€” such as service latency, error rates, and request traces β€” this change closes that gap by making those capabilities available out of the box, so teams can focus on building and operating applications rather than configuring observability tooling.azon EKS.</p> <p>With Application Signals now enabled by default, customers immediately benefit from automatic service instrumentation β€” no manual configuration or Kubernetes workload annotations required β€” along with pre-built dashboards that surface application performance metrics and a rich troubleshooting experience that goes beyond infrastructure-level data to help teams quickly identify and resolve issues. For example, a platform team managing a microservices application on EKS can now detect latency spikes or error rate increases at the service level without any additional setup, accelerating root cause analysis during incidents.</p> <p>This feature is available in all commercial AWS regions where Amazon CloudWatch Application Signals is available; to get started, you can refer to the <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/install-CloudWatch-Observability-EKS-addon.html#Container-Insights-setup-EKS-appsignalsconfiguration">Amazon CloudWatch Application Signals documentation</a> and upgrade to version 5.0.0 of the add-on.</p>

Application Performance Monitoring Enabled by Default in CloudWatch Observability EKS Add-on #eks #kubernetes

02.03.2026 22:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Amazon EKS Capabilities Demo | GitOps with ACK and ArgoCD
Amazon EKS Capabilities Demo | GitOps with ACK and ArgoCD

Amazon EKS Capabilities Demo | GitOps with ACK and ArgoCD #eks #kubernetes

27.02.2026 21:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/amazon-eks-ami released AMI Release v20260224 What's Changed β€’ feat: set oom score for ssm-agent by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2618 β€’ fix: make govcloud builds possible by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2621 β€’ chore: add test timing to e2e tests by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2614 β€’ feat(nodeadm): add console logging support to nodeadm by @chenwng in https://github.com/awslabs/amazon-eks-ami/pull/2620 β€’ fix: initialize logger after parsing command line flags by @chenwng in https://github.com/awslabs/amazon-eks-ami/pull/2633 New Contributors β€’ @chenwng made their first contribution in https://github.com/awslabs/amazon-eks-ami/pull/2620 Full Changelog: https://github.com/awslabs/amazon-eks-ami/compare/v20260209...v20260224

awslabs/amazon-eks-ami released AMI Release v20260224 #eks #kubernetes

27.02.2026 20:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
AI Model Training and Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services
AI Model Training and Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services

AI Model Training and Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services #eks #kubernetes

25.02.2026 17:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Train AI Models on Amazon SageMaker HyperPod EKS | Amazon Web Services
Train AI Models on Amazon SageMaker HyperPod EKS | Amazon Web Services

Train AI Models on Amazon SageMaker HyperPod EKS | Amazon Web Services #eks #kubernetes

25.02.2026 17:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Run AI Models Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services
Run AI Models Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services

Run AI Models Inference on Amazon SageMaker HyperPod EKS | Amazon Web Services #eks #kubernetes

25.02.2026 17:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
kubernetes-sigs/aws-load-balancer-controller released v3.1.0 πŸ“š Quick Links v3.1.0 (requires Kubernetes 1.22+) Image: public.ecr.aws/eks/aws-load-balancer-controller:v3.1.0 Documentation Thanks to all our contributors!πŸ’œπŸ’œπŸ’œ ⚠️ Action Required CRD Updates Action : Please apply the latest CRD definitions β€’ kubectl apply -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller/crds?ref=master" If using Gateway API feature β€’ Installation of LBC Gateway API specific CRDs: kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/refs/heads/main/config/crd/gateway/gateway-crds.yaml β€’ Standard Gateway API CRDs: kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.3.0/standard-install.yaml [REQUIRED] β€’ Experimental Gateway API CRDs: kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.3.0/experimental-install.yaml [OPTIONAL: Used for L4 Routes] πŸš€ What's New Gateway API Enhancements β€’ [ALB Gateway] Port defaulting for scheme - Fixed redirect port handling to comply with Gateway API spec. When port is not specified in HTTPRequestRedirectFilter, the controller correctly defaults to well-known ports (80 for http, 443 for https) based on the redirect scheme. β€’ [ALB Gateway] Improved regex handling - Corrected regex value handling in Gateway API route matching β€’ [Gateway] Status hostname normalization - Gateway status hostnames are now normalized to lowercase for consistency AWS Global Accelerator Controller β€’ [AGA] Cross-namespace reference support - AGA resources can now reference resources across namespaces, enabling more flexible multi-tenant architectures πŸ”§ Enhancements and Fixes β€’ [NLB Gateway] TLS passthrough listener - Fixed TLS listener construction to respect TLS mode configuration. NLB Gateways now support passthrough, termination, and re-encryption modes as defined in Gateway API spec. Note: SNI-based routing is not supported due to AWS NLB dataplane limitations. β€’ [Ingress] Rule optimizer - Fixed incorrect removal of regex-based listener rules that could cause routing failures β€’ [HelmUpgrade] Webhook certificate regeneration - Fixed certificate regeneration issues during Helm upgrades. Reintroduce the keepTLSSecret parameter with improved logic that maintains cert-manager compatibility. β€’ [Gateway] NPE on invalid parameters - Added null pointer protection and enhanced debugging for invalid parameter references Documentation Updates β€’ Updated service.beta.kubernetes.io/aws-load-balancer-type annotation documentation β€’ Moved QUIC documentation to L4 section for better organization β€’ Updated Helm chart information Changelog since v3.0.0 β€’ [feat aga] Add cross-namespace reference support for AGA by @shraddhabang in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4547 β€’ fix TLS passthrough listener by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4559 β€’ Fix NPE on invalid parameters ref, add more debugging details to accepted status by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4562 β€’ add port defaulting for scheme by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4568 β€’ move QUIC documentation to l4 by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4570 β€’ Fix rule optimizer incorrectly removing regex-based listener rules by @shraddhabang in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4569 β€’ correct regex value handling in gateway api by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4577 β€’ Add k8s event for TGB failures by @vishwas121 in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4571 β€’ Update docs for service.beta.kubernetes.io/aws-load-balancer-type annotation by @kellyyan in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4578 β€’ update helm info by @zac-nixon in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4583 β€’ Fix webhook certificate regeneration on Helm upgrades by @shraddhabang in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4581 β€’ Filter RequeueNeeded errors to skip event triggers on TGB controller by @vishwas121 in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4584 β€’ fix(gateway): normalize status hostname to lowercase by @TOGEP in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4591 New Contributors β€’ @vishwas121 made their first contribution in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4571 β€’ @TOGEP made their first contribution in https://github.com/kubernetes-sigs/aws-load-balancer-controller/pull/4591 Full Changelog: https://github.com/kubernetes-sigs/aws-load-balancer-controller/compare/v3.0.0...v3.1.0

kubernetes-sigs/aws-load-balancer-controller released v3.1.0 #eks #kubernetes

24.02.2026 19:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Deep dive: Simplifying resource orchestration with Amazon EKS Capabilities This blog post focuses on ACK and kro capabilities. For a deep dive on Amazon EKS capability for Argo CD, check out Deep dive: Streamlining GitOps with Amazon EKS capability for Argo CD.

Deep dive: Simplifying resource orchestration with Amazon EKS Capabilities #kro #eks #kubernetes

24.02.2026 18:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Amazon EKS Node Monitoring Agent is now open source <p>Amazon Elastic Kubernetes Service (Amazon EKS) Node Monitoring Agent is now open source. You can access the Amazon EKS Node Monitoring Agent source code and contribute to its development on <a title="GitHub" href="https://github.com/aws/eks-node-monitoring-agent">GitHub</a>.<br> <br> Running workloads reliably in Kubernetes clusters can be challenging. Cluster administrators often have to resort to manual methods of monitoring and repairing degraded nodes in their clusters. The Amazon EKS Node Monitoring Agent simplifies this process by automatically monitoring and publishing node-level system, storage, networking, and accelerator issues as node conditions, which are used by Amazon EKS for automatic node repair. With the Amazon EKS Node Monitoring Agent’s source code available on GitHub, you now have visibility into the agent’s implementation, can customize it to fit your requirements, and can contribute directly to its ongoing development.<br> <br> The Amazon EKS Node Monitoring Agent is included in Amazon EKS Auto Mode and is available as an Amazon EKS add-on in all AWS Regions where Amazon EKS is available.<br> <br> To learn more about the Amazon EKS Node Monitoring Agent and node repair, visit the <a href="https://docs.aws.amazon.com/eks/latest/userguide/node-health.html">Amazon EKS documentation</a>.<a title="GitHub" href="https://github.com/aws/eks-node-monitoring-agent"></a></p>

Amazon EKS Node Monitoring Agent is now open source #eksautomode #eks #kubernetes

24.02.2026 18:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Running containerized hybrid nodes with Amazon Elastic Kubernetes Service EKS hybrid nodes is a feature of Amazon Elastic Kubernetes Service (EKS) that allows you to use an EKS managed control plane with worker nodes that reside outside of the AWS cloud. In this blog post, we’ll explore how to run a Docker container that connects to an EKS cluster as a hybrid node.

Running containerized hybrid nodes with Amazon Elastic Kubernetes Service #eks #kubernetes

24.02.2026 17:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.56.1 A Helm chart for AWS EBS CSI Driver

kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.56.1 #eks #kubernetes

23.02.2026 18:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
kubernetes-sigs/aws-ebs-csi-driver released v1.56.0 AWS EBS CSI Driver CHANGELOG See CHANGELOG for full list of changes

kubernetes-sigs/aws-ebs-csi-driver released v1.56.0 #eks #kubernetes

23.02.2026 16:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.56.0 A Helm chart for AWS EBS CSI Driver

kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.56.0 #eks #kubernetes

23.02.2026 14:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Storage Strategies for GenAI on Amazon EKS | Fast Model Caching for Kubernetes
Storage Strategies for GenAI on Amazon EKS | Fast Model Caching for Kubernetes

Storage Strategies for GenAI on Amazon EKS | Fast Model Caching for Kubernetes #eks #kubernetes

18.02.2026 18:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Learn about AI driven robotics training & how to simplify Kubernetes ops!
Learn about AI driven robotics training & how to simplify Kubernetes ops!

Learn about AI driven robotics training & how to simplify Kubernetes ops! #eks #kubernetes

13.02.2026 19:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/amazon-eks-ami released AMI Release v20260209 What's Changed β€’ chore: create file system fake by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2610 β€’ feat(nodeadm): pass nvidia gpu startup labels to kubelet by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2607 β€’ chore: clean up kubelet config file logic by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2613 β€’ Add SELinux context restoration by @prasad0896 in https://github.com/awslabs/amazon-eks-ami/pull/2615 β€’ Log collector collect NMA pod logs by @eddominguez in https://github.com/awslabs/amazon-eks-ami/pull/2612 β€’ fix: set the runtime-cgroup flag by @fletcherw in https://github.com/awslabs/amazon-eks-ami/pull/2617 New Contributors β€’ @eddominguez made their first contribution in https://github.com/awslabs/amazon-eks-ami/pull/2612 Full Changelog: https://github.com/awslabs/amazon-eks-ami/compare/v20260128...v20260209

awslabs/amazon-eks-ami released AMI Release v20260209 #eks #kubernetes

13.02.2026 01:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities <p>Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode’s managed capabilities can now be configured as log delivery sources using Amazon CloudWatch Vended Logs. This integration enables customers to monitor and troubleshoot their EKS Auto Mode clusters more effectively by automatically collecting logs from Auto Mode’s managed Kubernetes capabilities for compute autoscaling, block storage, load balancing, and pod networking.<br> <br> Customers can configure log delivery for Auto Mode capabilities using CloudWatch APIs or the AWS Console. Each Auto Mode capability can be configured as a CloudWatch Vended Logs delivery source, enabling reliable, secure log delivery with built-in AWS authentication and authorization at a reduced price compared to standard CloudWatch Logs. Customers can deliver these logs to CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose destinations.<br> <br> This feature is available today in all regions where EKS Auto Mode is available. Standard CloudWatch Logs, S3, or Kinesis charges apply depending on the chosen destination.<br> <br> To learn more about EKS Auto Mode logging capabilities, visit the&nbsp;<a href="https://docs.aws.amazon.com/eks/latest/userguide/auto-observability.html">Amazon EKS documentation</a>.</p>

Amazon EKS Auto Mode Announces Enhanced Logging for its Managed Kubernetes Capabilities #s3 #eksautomode #eks #kubernetes

11.02.2026 21:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Enhance Kubernetes high availability with Amazon Application Recovery Controller and Karpenter integration In this post, we explain the benefits of using Amazon Application Recovery Controller (ARC) for improving application resiliency and why we built a built a Kubernetes controller to integrate Karpenter with ARC’s zonal shift.

Enhance Kubernetes high availability with Amazon Application Recovery Controller and Karpenter integration #karpenter #eks #kubernetes

10.02.2026 19:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/kro released v0.8.5 What's Changed β€’ cut docs v0.8.4 by @michaelhtm in https://github.com/kubernetes-sigs/kro/pull/1002 β€’ fix(rt/resolver): remove dead code and fix path handling asymmetry by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1004 β€’ add gcal meeting link to readme by @olamilekan000 in https://github.com/kubernetes-sigs/kro/pull/1013 β€’ feat(validation): Implement validation to not allow users to define kro owned labels in their templates by @spattk in https://github.com/kubernetes-sigs/kro/pull/1016 β€’ fix(graph): handle additionalProperties in schema lookups by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1019 β€’ fix(dynamiccontroller): fix ctx race condition, achieve 100% test coverage by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1015 β€’ chore(ci): add -race for all unit tests by @jakobmoellerdev in https://github.com/kubernetes-sigs/kro/pull/1021 β€’ fix(runtime): handle empty forEach collections and their dependents by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1018 β€’ Compile CEL programs at build time and reuse at runtime by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1014 β€’ refactor(simpleschema): rework type system for easier extension by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/998 β€’ fix: validate status schema by @michaelhtm in https://github.com/kubernetes-sigs/kro/pull/1023 β€’ Fix empty arrays being converted to null instead of [] by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/1026 β€’ Handle CRD deletion so RGDs don’t get stuck in Active by @Aman-Cool in https://github.com/kubernetes-sigs/kro/pull/1029 New Contributors β€’ @olamilekan000 made their first contribution in https://github.com/kubernetes-sigs/kro/pull/1013 β€’ @spattk made their first contribution in https://github.com/kubernetes-sigs/kro/pull/1016 β€’ @Aman-Cool made their first contribution in https://github.com/kubernetes-sigs/kro/pull/1029 Full Changelog: https://github.com/kubernetes-sigs/kro/compare/v0.8.4...v0.8.5

awslabs/kro released v0.8.5 #kro #eks #kubernetes

09.02.2026 21:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
aws/karpenter-provider-aws released v1.9.0 Features β€’ Add ICE filtering for MaxFleetCountExceeded (#8698) #8698 (Amanuel Engeda) β€’ support label for tenancy in AWS (#8218) #8218 (Jason Aliyetti) β€’ make the file website/content/en/v1.0/upgrading/get-controller-policy.sh POSIX compliant (#8248) #8248 (Mauro Solidoro) β€’ WS2025 support for karpenter (#8842) #8842 (Shashank Reddy Boyapally) Bug Fixes β€’ prevent hash collisions while resolving subnets, security groups and AMIs from nodeclass selectors #8632 (Saurav Agarwalla) β€’ describe instance failing due to InvalidParameterCombination (#8642) #8642 (Sumukha Radhakrishna) β€’ handle tenancy type error in validation (#8776) #8776 (Jason Deal) β€’ use test.RandomName() to prevent test name collisions (#8797) #8797 (Ellis Tarn) β€’ detect matrix flakes in addition to reruns (#8799) #8799 (Ellis Tarn) β€’ panic with a descriptive error when unable to get region (#8395) #8395 (Michael Grosser) β€’ use only evictionHard for allocatable capacity calculation (#8565) #8565 (Shun Takahashi) β€’ error message with bottlerocket userdata (#8903) #8903 (Ryan Mistretta) Documentation β€’ Add the dropped metrics back (#8615) #8615 (Jigisha Patil) β€’ add Sophotech to ADOPTERS.md (#8610) #8610 (Archy) β€’ update karpenter.sh to include static capacity support (#8630) #8630 (Sumukha Radhakrishna) β€’ Update upgrade guide for v1.8.x (#8639) #8639 (Jigisha Patil) β€’ Move v1beta1 migration docs to v1 version of Karpenter (#8687) #8687 (Amanuel Engeda) β€’ Drop v1beta1 from the Karpenter documentation (#8689) #8689 (Amanuel Engeda) β€’ Update note on v1beta1 support (#8695) #8695 (Amanuel Engeda) β€’ add upgrade to 1.8.0 section to docs (#8715) #8715 (Jigisha Patil) β€’ Add Bottlerocket section to instanceStorePolicy RAID0 configura… (#8563) #8563 (Shun Takahashi) β€’ change preview url link (#8730) #8730 (Ryan Mistretta) β€’ update for 1.8.3 release (#8773) #8773 (Jason Deal) β€’ add volumeattachment drain node description (#8761) #8761 (Alec Rajeev) β€’ 1.7.4 and 1.6.6 release updates (#8786) #8786 (Jason Deal) β€’ document Gte and Lte requirement operators (#8822) #8822 (Ellis Tarn) β€’ Add readme for website folder, update documentation contribution guide, add readme for designs folder (#8828) #8828 (Derek Frank) β€’ clarify expireAfter behavior and interaction with disruption budgets (#8804) #8804 (Shun Takahashi) β€’ adjust cron schedule example for weekend nodes (#8793) #8793 (Johan Dewe) β€’ Update upgrade guide to add warning about upgrading to v1.8.4 (#8845) #8845 (Jigisha Patil) β€’ update for new release version (#8849) #8849 (Jigisha Patil) β€’ update for new release version (#8871) #8871 (Joshua Guo) β€’ Add explicit spot capacity type to MinValues example (#8900) #8900 (Andy Hay) β€’ update 1.9 upgrade guide (#8933) #8933 (Jason Deal) Tests β€’ fix e2e tests failures (#8711) #8711 (Jigisha Patil) β€’ Bump upgrade commit pin (#8768) #8768 (Ryan Mistretta) Continuous Integration β€’ Fix failing AMI tests after 1.34 upgrade #8632 (Saurav Agarwalla) β€’ pin controller-runtime setup-envtest dependency to an older versi… (#8646) #8646 (Saurav Agarwalla) β€’ revert actions/checkout to v5 (#8791) #8791 (Jason Deal) β€’ upgrade ko version to v0.18.1 (#8794) #8794 (Jason Deal) β€’ fix snapshot and docgen actions (#8796) #8796 (Jason Deal) β€’ append GOFLAGS in Makefile (#8887) #8887 (Max Cao) β€’ only run upstream regression tests (#8922) #8922 (Jason Deal) β€’ update CI for CFN changes (#8924) #8924 (Jason Deal) β€’ update policies for public cluster tests (#8929) #8929 (Jason Deal) β€’ missing termination quotes (#8930) #8930 (Jason Deal) Chores β€’ Release v1.8.1 (#8613) #8613 (github-actions[bot]) β€’ correct typo in parsing error message (#8640) #8640 (Sarthak Umarani) β€’ Update data from AWS APIs (#8516) #8516 (github-actions[bot]) β€’ deps: bump aws-actions/configure-aws-credentials from 5.0.0 to 5.1.0 in /.github/actions/e2e/dump-logs in the action-deps group (#8623) #8623 (dependabot[bot]) β€’ deps: bump the go-deps group across 1 directory with 17 updates (#8648) #8648 (dependabot[bot]) β€’ deps: bump aws-actions/configure-aws-credentials from 5.0.0 to 5.1.0 in /.github/actions/e2e/upgrade-crds in the action-deps group (#8624) #8624 (dependabot[bot]) β€’ deps: bump the actions-deps group with 2 updates (#8622) #8622 (dependabot[bot]) β€’ deps: bump the k8s-go-deps group with 5 updates (#8621) #8621 (dependabot[bot]) β€’ remove eu-isoe-west-1 from HTTPProtocolIPv6 not supported list (#8631) #8631 (carie-bear) β€’ deps: bump actions/cache from 4.2.4 to 4.3.0 in /.github/actions/install-deps in the action-deps group (#8543) #8543 (dependabot[bot]) β€’ deps: bump the go-deps group with 13 updates (#8681) #8681 (dependabot[bot]) β€’ deps: bump the k8s-go-deps group with 4 updates (#8680) #8680 (dependabot[bot]) β€’ deps: bump the actions-deps group with 2 updates (#8679) #8679 (dependabot[bot]) β€’ Bump to use go1.25.3 from go1.25 (#8688) #8688 (Amanuel Engeda) β€’ bump upstream version (#8706) #8706 (Jigisha Patil) β€’ Add spot offering filter (#8731) #8731 (Jigisha Patil) β€’ update ko version (#8764) #8764 (Ryan Mistretta) β€’ use Provider interface in version controller (#8770) #8770 (Andrew Mitchell) β€’ deps: bump the go-deps group across 1 directory with 18 updates (#8765) #8765 (dependabot[bot]) β€’ deps: bump github.com/sigstore/fulcio from 1.7.1 to 1.8.3 (#8758) #8758 (dependabot[bot]) β€’ deps: bump helm.sh/helm/v3 from 3.15.2 to 3.18.5 (#8755) #8755 (dependabot[bot]) β€’ deps: bump aws-actions/configure-aws-credentials from 5.1.0 to 5.1.1 in /.github/actions/e2e/dump-logs in the action-deps group (#8733) #8733 (dependabot[bot]) β€’ deps: bump the actions-deps group across 1 directory with 5 updates (#8752) #8752 (dependabot[bot]) β€’ deps: bump the action-deps group across 1 directory with 2 updates (#8734) #8734 (dependabot[bot]) β€’ deps: bump the action-deps group in /.github/actions/e2e/cleanup with 2 updates (#8724) #8724 (dependabot[bot]) β€’ deps: bump actions/setup-go from 6.0.0 to 6.1.0 in /.github/actions/install-deps in the action-deps group (#8726) #8726 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.0 to 6.0.0 in /.github/actions/e2e/slack/notify in the action-deps group (#8721) #8721 (dependabot[bot]) β€’ Update data from AWS APIs (#8703) #8703 (github-actions[bot]) β€’ Isolate tool dependencies in go.tools.mod (#8780) #8780 (Ellis Tarn) β€’ increase crt panic verbosity (#8790) #8790 (Jason Deal) β€’ Use go-toml v2 in strict mode to log ERROR for unknown Bottlerocket k8s parameters" (#8745) #8745 (Jens-Uwe Walther) β€’ deps: bump the go-deps group with 2 updates (#8809) #8809 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.1 to 6.0.1 in /.github/actions/e2e/slack/notify in the action-deps group (#8808) #8808 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.1 to 6.0.1 in /.github/actions/e2e/upgrade-crds in the action-deps group (#8807) #8807 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.1 to 6.0.1 in /.github/actions/e2e/cleanup in the action-deps group (#8806) #8806 (dependabot[bot]) β€’ Replace ioutil with io for ReadAll usage (#8811) #8811 (iliya) β€’ Use fmt.Fprint instead of fmt.Fprintf for device info (#8814) #8814 (iliya) β€’ deps: bump the actions-deps group across 1 directory with 3 updates (#8792) #8792 (dependabot[bot]) β€’ Update data from AWS APIs (#8783) #8783 (github-actions[bot]) β€’ deps: bump actions/cache from 4.3.0 to 5.0.1 in /.github/actions/install-deps in the action-deps group (#8781) #8781 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.0 to 6.0.0 in /.github/actions/e2e/setup-cluster in the action-deps group (#8728) #8728 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.0 to 6.0.0 in /.github/actions/e2e/install-prometheus in the action-deps group (#8723) #8723 (dependabot[bot]) β€’ deps: bump actions/checkout from 5.0.0 to 6.0.0 in /.github/actions/e2e/install-karpenter in the action-deps group (#8722) #8722 (dependabot[bot]) β€’ deps-dev: bump the website-deps group across 1 directory with 5 updates (#7908) #7908 (dependabot[bot]) β€’ Update Karpenter Deps (#8815) #8815 (Amanuel Engeda) β€’ Replace interface{} with any throughout codebase (#8813) #8813 (iliya) β€’ pkg/fake/utils refactor ranging over slice with slices.Contains (#8817) #8817 (iliya) β€’ deps: bump github.com/aws/aws-sdk-go-v2/service/ec2 from 1.278.0 to 1.279.0 in the go-deps group (#8826) #8826 (dependabot[bot]) β€’ Update data from AWS APIs (#8827) #8827 (github-actions[bot]) β€’ deps-dev: bump hugo-extended from 0.153.1 to 0.154.2 in /website in the website-deps group (#8825) #8825 (dependabot[bot]) β€’ remove unnecessary type specifiers where applicable (#8823) #8823 (iliya) β€’ Refactor goroutine management to use WaitGroup.Go (#8812) #8812 (iliya) β€’ use strings.Builder and fmt.Appendf for… (#8818) #8818 (iliya) β€’ deps: bump the go-deps group with 14 updates (#8837) #8837 (dependabot[bot]) β€’ deps-dev: bump hugo-extended from 0.154.2 to 0.154.5 in /website in the website-deps group (#8836) #8836 (dependabot[bot]) β€’ deps: bump the go-deps group with 3 updates (#8857) #8857 (dependabot[bot]) β€’ deps: bump the actions-deps group with 2 updates (#8856) #8856 (dependabot[bot]) β€’ deps: bump the action-deps group in /.github/actions/install-deps with 2 updates (#8855) #8855 (dependabot[bot]) β€’ deps: bump actions/setup-go from 6.1.0 to 6.2.0 in /.github/actions/e2e/cleanup in the action-deps group (#8854) #8854 (dependabot[bot]) β€’ Update data from AWS APIs (#8859) #8859 (github-actions[bot]) β€’ deps-dev: bump tar from 7.5.2 to 7.5.6 in /website (#8863) #8863 (dependabot[bot]) β€’ update aws api data for new g7e instance family (#8866) #8866 (Joshua Guo) β€’ integrate restricted label changes (#8888) #8888 (Jason Deal) β€’ Bump max k8s version to 1.35 (#8902) #8902 (Andrew Mitchell) β€’ update ami suite for 1.35 (#8910) #8910 (Andrew Mitchell) β€’ Add Bottlerocket K8s settings cpu-manager-policy-options and ids-per-pod (#8894) #8894 (Jens-Uwe Walther) β€’ split controller IAM policies (#8690) #8690 (Jason Deal) β€’ bump karpenter version (#8921) #8921 (Andrew Mitchell) β€’ revert go tool (#8931) #8931 (Derek Frank) β€’ bump karpenter version (#8937) #8937 (Sarthak Umarani) Commits β€’ db9076a: Skip instance profile cleanup in isolated VPCs (#8617) (Dom Raven) #8617 β€’ ff7c321: chore : Add error classification regarding AMI authorization issue (#8529) (Sarthak Umarani) #8529 β€’ 0d97390: Add sampleLimit to ServiceMonitor (#8557) (Pavle) #8557 β€’ 1b1eb7c: Enabled pass-through of kubelet log level for debugging purposes (#8635) (Jens-Uwe Walther) #8635 β€’ 95de53d: Added settings.kubernetes.hostname-override-source to bottlerocketsettings.go (#8549) (Jens-Uwe Walther) #8549 β€’ 12c9e63: Alternate approach to solve #8482 based on ideas from @moko-poi in PR #8547 (#8684) (Jens-Uwe Walther) #8684 β€’ e169c8f: Migrate from go install to go tool directive (#8740) (Ellis Tarn) #8740 β€’ 99ed9aa: Fix outdated comments of hack/docs/*.go (#8239) (guessi) #8239 β€’ eb442b6: Add script to count test flakes in PRs (#8795) (Ellis Tarn) #8795 β€’ 246ba15: hack/code/bandwidth_gen/main: Replace lo.Contains(lo.Keys()) with dir… (#8819) (iliya) #8819 β€’ Update k8s dependencies (#8829) #8829 (Amanuel Engeda) β€’ 90258ee: Add applying CRD for "run" target in Makefile (#8893) (Jens-Uwe Walther) #8893 β€’ bump go to 1.25.6 (#8901) #8901 (Jason Deal) β€’ bump go to 1.25.7 (#8934) #8934 (Jason Deal)

aws/karpenter-provider-aws released v1.9.0 #ec2 #karpenter #eks #kubernetes

06.02.2026 21:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Amazon EKS simplifies providing IAM permissions to EKS add-ons in AWS GovCloud (US) Regions <p>Amazon Elastic Kubernetes Service (EKS) now offers a direct integration between EKS add-ons and EKS Pod Identity in AWS GovCloud (US) Regions, streamlining the lifecycle management process for critical cluster operational software that needs to interact with AWS services outside the cluster.<br> <br> EKS add-ons that enable integration with underlying AWS resources need IAM permissions to interact with AWS services. EKS Pod Identities simplify how Kubernetes applications obtain AWS IAM permissions. With today's launch, you can directly manage EKS Pod Identities using EKS add-ons operations through the EKS console, CLI, API, eksctl, and IAC tools like AWS CloudFormation, simplifying usage of Pod Identities for EKS add-ons. This integration expands the selection of Pod Identity compatible EKS add-ons available for installation through the EKS console during cluster creation.<br> <br> EKS add-ons integration with Pod Identities is generally available in AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions. To get started, see the <a href="https://docs.aws.amazon.com/eks/latest/userguide/create-cluster.html">EKS user guide</a>.</p>

Amazon EKS simplifies providing IAM permissions to EKS add-ons in AWS GovCloud (US) Regions #eks #kubernetes

04.02.2026 23:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
AWS Batch now supports unmanaged compute environments for Amazon EKS <p>AWS Batch now extends its job scheduling capabilities to unmanaged compute environments on Amazon EKS. With unmanaged EKS compute environments, you can leverage AWS Batch's job orchestration while maintaining full control over your Kubernetes infrastructure for security, compliance, or operational requirements.<br> <br> With this capability, you can create unmanaged compute environments through CreateComputeEnvironment API and AWS Batch console by selecting your existing EKS cluster and specifying a Kubernetes namespace, then associate your EKS nodes with the compute environment using <i>kubectl</i> labeling.<br> <br> AWS Batch supports developers, scientists, and engineers in running efficient batch processing for ML model training, simulations, and analysis at any scale. Unmanaged compute environments on Amazon EKS are available today in all <a href="https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/">AWS regions</a> where AWS Batch is available. For more information, see the <a href="https://docs.aws.amazon.com/batch/latest/userguide/create-compute-environment-unmanaged-eks.html">AWS Batch User Guide</a>.</p>

AWS Batch now supports unmanaged compute environments for Amazon EKS #eks #kubernetes

04.02.2026 23:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.55.1 A Helm chart for AWS EBS CSI Driver

kubernetes-sigs/aws-ebs-csi-driver released helm-chart-aws-ebs-csi-driver-2.55.1 #eks #kubernetes

04.02.2026 14:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Beyond metrics: Extracting actionable insights from Amazon EKS with Amazon Q Business In this post, we demonstrate a solution that uses Amazon Data Firehose to aggregate logs from the Amazon EKS control plane and data plane, and send them to Amazon Simple Storage Service (Amazon S3). Finally, we use Amazon Q Business and its Amazon S3 connector to synchronize the logs, index the log data in Amazon S3, and enable a chat experience powered by the generative AI capabilities of Amazon Q Business.

Beyond metrics: Extracting actionable insights from Amazon EKS with Amazon Q Business #s3 #eks #kubernetes

03.02.2026 21:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Build deep learning model training apps using CNCF Fluid with Amazon EKS Machine learning (ML) intensive companies face significant challenges in efficiently managing training data. This post introduces a solution to build an ephemeral, cloud-native elastic high-throughput file system. By the end of this post, you will learn how to implement the elastic high-throughput file system using Amazon Elastic Kubernetes Service (Amazon EKS) and CNCF Fluid, set […]

Build deep learning model training apps using CNCF Fluid with Amazon EKS #eks #kubernetes

03.02.2026 21:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/amazon-eks-ami released AMI Release v20260129 Note There are no changes to the AMI template in this release.

awslabs/amazon-eks-ami released AMI Release v20260129 #eks #kubernetes

30.01.2026 23:17 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/kro released v0.8.4 What's Changed β€’ cut docs v0.8.3 by @michaelhtm in https://github.com/kubernetes-sigs/kro/pull/1001 β€’ fix(test): measure pkg/ coverage in integration tests by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/996 β€’ chore: remove managed-by label from kro instances by @shabbskagalwala in https://github.com/kubernetes-sigs/kro/pull/997 Full Changelog: https://github.com/kubernetes-sigs/kro/compare/v0.8.3...v0.8.4

awslabs/kro released v0.8.4 #kro #eks #kubernetes

30.01.2026 23:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/kro released v0.8.3 What's Changed β€’ cut docs v0.8.2 by @a-hilaly in https://github.com/kubernetes-sigs/kro/pull/999 β€’ fix: unify finalizer and label patches, add cascading deletion integration test by @jakobmoellerdev in https://github.com/kubernetes-sigs/kro/pull/1000 Full Changelog: https://github.com/kubernetes-sigs/kro/compare/v0.8.2...v0.8.3

awslabs/kro released v0.8.3 #kro #eks #kubernetes

30.01.2026 18:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
awslabs/kro released v0.8.2 What's Changed β€’ docs: cutoff 0.8.1 by @jakobmoellerdev in https://github.com/kubernetes-sigs/kro/pull/989 β€’ update kro cli go.mod to use kro v0.8.1 by @michaelhtm in https://github.com/kubernetes-sigs/kro/pull/992 β€’ Fix cmd/kro by updating Kro dependency to v0.8.1 by @chrisdoherty4 in https://github.com/kubernetes-sigs/kro/pull/994 β€’ fix: filter child events by parent instance GVK by @shabbskagalwala in https://github.com/kubernetes-sigs/kro/pull/986 β€’ fix: remove GIT_VERSION suffix by @michaelhtm in https://github.com/kubernetes-sigs/kro/pull/991 New Contributors β€’ @chrisdoherty4 made their first contribution in https://github.com/kubernetes-sigs/kro/pull/994 Full Changelog: https://github.com/kubernetes-sigs/kro/compare/v0.8.1...v0.8.2

awslabs/kro released v0.8.2 #kro #eks #kubernetes

30.01.2026 08:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0