aws-load-balancer-controller
aws-efs-csi-driver
Our great sponsors
aws-load-balancer-controller | aws-efs-csi-driver | |
---|---|---|
39 | 11 | |
3,742 | 681 | |
1.5% | 1.5% | |
8.9 | 8.5 | |
7 days ago | 6 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-load-balancer-controller
-
Does AWS Load Balancer have a cert-manager within?
I thought at the beginning that such certificate would then expire, but I have seen cert-manager is within ALB code https://github.com/kubernetes-sigs/aws-load-balancer-controller/blob/main/config/certmanager/certificate.yaml so that makes me hesitate about it.
-
Creating Network Load Balancer (SG supported) with AWS Load Balancer Controller
Detailed behavior changes can be found in the release notes for version 2.6.0 of the AWS Load Balancer Controller. https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases The key points include:
-
Network Load Balancer now supports security groups
If you are using Kubernetes, you can enable security groups on your NLB by using AWS Load Balancer controller version 2.6.0 or later. Enabling NLB security groups using the controller enhances the nodes' security, as inbound rules can be simplified by referencing the NLB security groups. It also provides scaling improvements, as the controller keeps a constant number of security group rules per cluster.
-
Kubernetes in Terraform - A question from a noobie
I use the AWS Load Balancer Controller: https://github.com/kubernetes-sigs/aws-load-balancer-controller.
- How to expose pods on nodes in private subnets via ALB/NLB?
-
How to use ACM public certificate for Nginx ingress controller?
You can install the AWS Load Balancer Controller, and then create an "Ingress" when you install your Nginx Ingress controller, possible with some necessary annotations.
- load balancer and kubernetes
-
Help me understand real use cases of k8s, I can’t wrap my head around it
aws-load-balancer-controller
-
Ingress controller confusion
Yes. Google's ingress controller talks to the GCP API and spins up an HTTP LB for you. The AWS LB Controller handles provisioning ALB's for you. And ... I guess other clouds exist too but these are the ones I am familiar with.
-
Can I create HTTPS listeners on an ALB without SSL termination
NLB don't support weighted target groups and for some reason are extremely slow when adding instances o removing them from target groups, which makes deployments a bit meh (old instances and new instances can be receiving traffic at the same time for up to 2 mins)
aws-efs-csi-driver
-
Implementing AWS EKS with EFS for dynamic volume provisioning using Terraform. Kubernetes Series - Episode 5
In the past I was have problems with GID allocator, something related to this problem.
-
AWS EFS CSI: Mount Target vs Access Point
However, the docs (https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/examples/kubernetes/dynamic_provisioning/README.md) are telling me to create EFS Mount Targets in the EKS subnets. Thats fine.
-
EKS Fargate supports additional Ephemeral Storage
Fargate storage A Pod running on Fargate automatically mounts an Amazon EFS file system. You can't use dynamic persistent volume provisioning with Fargate nodes, but you can use static provisioning. For more information, see Amazon EFS CSI Driver on GitHub.
-
EFS CSI - Dynamic Provisioning and Disaster Recovery?
I guess something like this might go a long way to solve the problem https://github.com/kubernetes-sigs/aws-efs-csi-driver/pull/640 ? Though I see it isn't merged yet
-
Mounting EFS in EKS cluster: example deployment fails
I am currently trying to create an EFS for use within an EKS cluster. I've followed all the instructions, and everything seems to be working for the most part. However, when trying to apply the multiple_pods example deployment from here, the pods cannot succesfully mount the file system. The PV and PVC are both bound and look good, however the pods do not start and yield the following error message:
-
How can 2 deployments using aws-efs-csi-provider share data on the same mount?
In each namespace, create a PV/PVC using the same fixed volume path. See "Volume Path in EKS CSI Driver" To make this work however, you MUST pre-create this volume path in your EFS (I usually just have an EC2 instance with it mounted to work on). From the docs above "Note: this feature requires the sub directory to mount precreated on EFS before consuming the volume from"
- Confused about kubernetes storage
-
Confused abut EKS gp2 default storage class - can i use it or not?
resource "aws_iam_policy" "eks_efs_csi_driver_policy" { # https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/docs/iam-policy-example.json policy = file("./6.AWSEFSpolicy.json") name = "aws-efs-csi-policy" }
- How is a PersistentVolumeClaim consistent?
-
EKS IAM Deep Dive
efs - IAM Policy for AWS EFS CSI Driver.
What are some alternatives?
cilium - eBPF-based Networking, Security, and Observability
ceph-csi - CSI driver for Ceph
cert-manager - Automatically provision and manage TLS certificates in Kubernetes
vault-csi-provider - HashiCorp Vault Provider for Secret Store CSI Driver
helm - The Kubernetes Package Manager
aws-ebs-csi-driver - CSI driver for Amazon EBS https://aws.amazon.com/ebs/
awx-operator - An Ansible AWX operator for Kubernetes built with Operator SDK and Ansible. 🤖
kiam - Integrate AWS IAM with Kubernetes
secrets-store-csi-driver-provider-gcp - Google Secret Manager provider for the Secret Store CSI Driver.
ingress - WIP Caddy 2 ingress controller for Kubernetes
amazon-cloudwatch-agent - CloudWatch Agent enables you to collect and export host-level metrics and logs on instances running Linux or Windows server.