Our great sponsors
|1 day ago||about 1 year ago|
|Apache License 2.0||GNU General Public License v3.0 or later|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EKS Anywhere: The What, The Why and The How
3 projects | dev.to | 12 Sep 2021
EKS Anywhere builds on the strengths of Amazon EKS Distro, the same open-source distribution of Kubernetes that is used by Amazon EKS on the cloud, thus fostering consistency and compatibility between clusters both on AWS as well as on-premises.
Amazon EKS Anywhere
4 projects | news.ycombinator.com | 8 Sep 2021
yes im aware of bmctl. however you dont have control over the kubernetes distro that's running.
is there anything similar to https://github.com/aws/eks-distro ?6 projects | reddit.com/r/kubernetes | 8 Sep 2021
EKS-A focuses on cluster management for HA environments. By default we use 3 etcd nodes, 2 control plane nodes, and 3 worker nodes. It uses cilium as the default CNI and Cluster API controllers for continual cluster state management. It has some optional configuration for a flux controller and OIDC authentication but it doesn't add default services or workloads. EKS-A also uses EKS Distro which is the open source Kubernetes distribution we run in hosted EKS.
An Introduction to AWS Batch
2 projects | dev.to | 19 Mar 2023
Note: the platform flag is important if we are using a MacBook M1, since AWS Batch does not support ARM/Graviton yet.
ECR - Api request throttling woes
2 projects | reddit.com/r/aws | 16 Feb 2023
You might try creating an issue at either https://github.com/aws/containers-roadmap or https://github.com/aws-cloudformation/cloudformation-coverage-roadmap
Launch HN: Odigos (YC W23) – Instant distributed tracing for Kubernetes clusters
12 projects | news.ycombinator.com | 19 Jan 2023
Naturally some integrations are out of your hand, AWS Fargate being one (https://github.com/aws/containers-roadmap/issues/1027). However, if you could get integrations up and running with the likes of Fargate, Fly.io, Render.com etc. That'd be amazing.
AWS EKS Kubernetes tearing down at the end of day
3 projects | reddit.com/r/aws | 2 Jan 2023
You do and that’s unfortunate even though it has been requested by the community :( https://github.com/aws/containers-roadmap/issues/78
How do you deploy with immutable tags?
3 projects | reddit.com/r/devops | 6 Dec 2022
This issue would solve this but its been open for a while.
Is setting up a production k8s a one-man job?
6 projects | reddit.com/r/kubernetes | 13 Oct 2022
There are plenty of vendor specific bugs, like no EBS in [EKS Fargate](https://github.com/aws/containers-roadmap/issues/1113), and settling a Kubernetes cluster on top of Bottlerocket and [EKS Anywhere](https://github.com/aws/eks-anywhere), on your own is somewhat impossible.
AWS Fargate now supporting 16 vCPU and 120 GiB memory, an approximate 4x increase
2 projects | reddit.com/r/aws | 19 Sep 2022
Looks like this has been requested - you can comment here and give use/business case.2 projects | reddit.com/r/aws | 19 Sep 2022
Yup, the Github link I mentioned indicates this is needed to be opted into:
We clone a running VM in 2 seconds
11 projects | news.ycombinator.com | 1 Sep 2022
This is still a thing, Fargate pull times are super slow: https://github.com/aws/containers-roadmap/issues/696. We run all of our workloads on fargate, and it's really annoying when you're trying to iterate on something and you have to sit there waiting on "Provisioning..." for 1-2 minutes every time you launch a task. I don't think the control plane is that slow, as EC2 based ECS launches tasks really fast if the images are already cached on the machine.
Automatically tag your Docker images as vulnerable in ECR
3 projects | dev.to | 19 Jun 2022
The solution is working! Still there are some "missing" features. As already mentioned, the OR Condition in the Eventbridge rule is not working. So we're currently only filtering for CRITICAL images. Next it would be nice if we could use Docker image tag prefixes in IAM policies, so we can deny that vulnerable images are being pulled. In my solution I'm removing images with this tag prefix after 5 days.
What are some alternatives?
eks-nvme-ssd-provisioner - EKS NVMe SSD provisioner for Amazon EC2 Instance Stores
eks-anywhere - Run Amazon EKS on your own infrastructure 🚀
kube-fledged - A kubernetes operator for creating and managing a cache of container images directly on the cluster worker nodes, so application pods start almost instantly
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kraken - P2P Docker registry capable of distributing TBs of data in seconds
juicefs - JuiceFS is a distributed POSIX file system built on top of Redis and S3.
copilot-cli - The AWS Copilot CLI is a tool for developers to build, release and operate production ready containerized applications on AWS App Runner or Amazon ECS on AWS Fargate.
k8s-device-plugin - NVIDIA device plugin for Kubernetes
piku - The tiniest PaaS you've ever seen. Piku allows you to do git push deployments to your own servers.
aws-eks-share-gpu - How to share the same GPU between pods on AWS EKS
gardener - Kubernetes-native system managing the full lifecycle of conformant Kubernetes clusters as a service on Alicloud, AWS, Azure, GCP, OpenStack, vSphere, KubeVirt, Hetzner, EquinixMetal, MetalStack, and OnMetal with minimal TCO.