-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS]: Managed Cluster Add-ons #252
Comments
There certain benefits to current approach, i.e. user can easily customise some of the add-ons. Aside from that, I wanted to point out that there is a new sig-cluster-lifecycle working group around this: https://github.com/kubernetes-sigs/addon-operators. |
Does this also means choosing CNI of choice as add-ons? |
@tabern Could you please confirm if this includes ability to choose any CNI as well like weave, calico etc? |
Starting today, you can use EKS to manage the add-ons for your cluster, starting with the Amazon VPC CNI plugin. You can:
EKS add-ons is available for EKS clusters running Kubernetes version 1.18 eks.3 and higher. You can learn more here: We'll be closing this issue and cross-linking to issues for support of individual add-ons. If there's a particular add-on you would like us to support, please open an issue! |
@tabern Please add support for kube-proxy and coreDNS. I'm assuming this is planned since these 2 add-ons are the only ones remaining out of the add-ons that ship out of the box with a new EKS cluster, but I don't see any issues currently open to track these. |
It's not clear from the blog post if one can opt-out from installing the VPC CNI add-on, or perhaps if there maybe alternative CNI add-ons available in the future. Would you mind to clarify the direction. The term "add-ons" usually refers to something that is either optional, removable or swappable. |
@errordeveloper good question. Until now, EKS has added in these add-ons (vpc-cni, kube-proxy, coredns) by default with every cluster. That has not changed. That said, it is in our plans to allow opt-out from all add-ons (including these default add-ons) during cluster creation. Our goal is to make EKS a bit more modular with this release, giving you options to add more things to the cluster easily, but also not have things you may not want. |
@tabern thanks for clarifying regarding the roadmap for this. Does the way the new feature works allows user to delete e.g. VPC CNI daemonset, and it won't be reinstated? What happens in the UI, will users get warnings saying "your cluster is missing a critical addon, you must click here to re-instate it"? |
I tried to add vpc-cni plugin to a existing cluster, and deleted it. |
@errordeveloper Currently different things happen when you create a new cluster via web console or via CloudFormation/CDK:
So, currently, this behavior is free of interference for existing clusters and clusters built with IaC tools, and it should leave a migration path from un-managed to managed versions of the add-ons once things have settled. At least it should't break things with existing tooling right now. |
@3oris thanks a lot, this very helpful! |
@foriequal0 have you tried re-installing with force override? See https://d2908q01vomqb2.cloudfront.net/fe2ef495a1152561572949784c16bf23abb28057/2020/12/01/3.-update-version.png |
@3oris IIRC, it didn't work for me. |
Core and optional addons are managed by Amazon EKS. Specify which addons you would like to run when provisioning the cluster and Amazon EKS will update addons to their latest versions in context of the recommended addon version for the Kubernetes version of the cluster.
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Today, certain core Kubernetes addons (DNS, CNI, etc) are automatically provisioned by Amazon EKS during cluster provisioning but must be manually updated to new versions as they are available and when updating the Kubernetes version of the cluster. EKS managed cluster addons would give additional control over what addons start on the cluster and provide automation around keeping addons up to date.
Are you currently working around this issue?
Mannualy start additional addons for your cluster and manually update (through
kubectl apply
) addons to the latest versions when required for new functionality or new Kubernetes versions.Additional context
This helps to avoid issues such as #24 (comment)
Helps to solve:
As always, feedback welcome.
The text was updated successfully, but these errors were encountered: