Generated by GPT-5-mini| EKS (Amazon) | |
|---|---|
| Name | EKS |
| Developer | Amazon (company) |
| Released | 2018 |
| Programming language | Go (programming language) |
| Operating system | Linux |
| Platform | Amazon Web Services |
| License | Proprietary |
EKS (Amazon)
EKS is a managed container orchestration service from Amazon (company) that runs Kubernetes clusters on Amazon Web Services infrastructure. Launched in 2018, EKS integrates with EC2 (Amazon), Elastic Load Balancing, IAM (AWS), and Amazon VPC to provide scalable deployment, lifecycle management, and networking for containerized applications. EKS is positioned among cloud-native offerings alongside services from Google Cloud Platform, Microsoft Azure, and open-source projects such as the Cloud Native Computing Foundation ecosystem.
EKS offers a control plane managed by Amazon (company) while allowing customers to run worker nodes on Amazon EC2, AWS Fargate, or third-party compute providers. The service supports upstream Kubernetes (software) releases and interoperability with tools like kubectl, Helm (software), Prometheus, and Istio. EKS competes with managed Kubernetes offerings including Google Kubernetes Engine, Azure Kubernetes Service, and self-hosted solutions built on Kops and kubeadm. Enterprises using EKS often integrate it with AWS CloudFormation, Terraform (software), Ansible and Chef (software) for infrastructure automation and Jenkins, GitHub Actions, and GitLab CI for CI/CD pipelines.
EKS architecture separates a managed control plane from customer-managed data plane resources. The managed control plane includes etcd, API server, scheduler, and controller manager provisioned across multiple Availability Zone (AWS)s for high availability. Worker nodes are typically Amazon EC2 instances or serverless compute via AWS Fargate. EKS integrates with Amazon VPC CNI Plugin for Kubernetes for networking, Amazon EBS and Amazon EFS for storage, and AWS CloudMap for service discovery. Observability and logging integrate with Amazon CloudWatch, AWS X-Ray, and third-party tools like Datadog, New Relic, and Splunk. Cluster lifecycle and node bootstrap often use the AWS CLI, eksctl, and kubeadm workflows.
EKS provides automated control plane upgrades, patch management, and multi-AZ redundancy, supporting Kubernetes features such as CustomResourceDefinitions and NetworkPolicy. It enables integration with AWS Identity and Access Management for role-based access control, and supports granular networking through Security Group (AWS)s and Network ACL (AWS). EKS supports add-ons like CoreDNS, kube-proxy, and kubelet management and offers cluster autoscaling via the Cluster Autoscaler (Kubernetes) and Karpenter. Storage classes leverage Amazon EBS CSI drivers and Amazon FSx for high-performance file systems. For blue/green and canary deployments, EKS users commonly employ Argo CD, Fluentd, and Flux (software) for GitOps and release automation. Integration with AWS App Mesh and Envoy (software) enables service mesh patterns.
EKS supports security integrations with AWS Identity and Access Management, AWS Key Management Service, and AWS CloudTrail for audit logging. Nodes run in customer VPCs and can be isolated using Security Group (AWS)s, Network ACL (AWS), and PrivateLink (AWS) endpoints. EKS supports Secrets Manager (AWS) and Parameter Store for secret distribution, and the kube2iam and kiam patterns or IAM Roles for Service Accounts for least-privilege access. Compliance certifications relevant to EKS include attestations by AWS Compliance frameworks such as SOC 2, ISO 27001, PCI DSS, and HIPAA-eligible controls when configured correctly. Vulnerability management integrates with scanners like Clair (software), Trivy, and Aqua Security alongside runtime defenses like Falco and Tigera.
EKS pricing includes a per-cluster charge in addition to compute, storage, and networking costs on Amazon EC2 or AWS Fargate. Additional fees accrue for managed add-ons and data transfer between Availability Zone (AWS)s. Organizations often optimize cost using reserved EC2 Reserved Instances, Savings Plans, spot instances via EC2 Spot Instances, or serverless compute with AWS Fargate. Third-party tooling such as Datadog, New Relic, and Aqua Security may introduce separate subscription costs. Licensing for client tools follows their respective models — for example, Red Hat OpenShift and Rancher offer commercial distributions and support stacks that can be used in conjunction with EKS.
EKS is used across industries for microservices platforms, data processing, machine learning inference, and edge services. Examples include running Kubernetes-based CI/CD systems with Jenkins, serving containerized web applications behind Elastic Load Balancing, and hosting inference endpoints integrated with Amazon SageMaker. Enterprises in finance, healthcare, and telecommunications often pair EKS with AWS Identity and Access Management and AWS PrivateLink to meet regulatory constraints while adopting cloud-native patterns promoted by Cloud Native Computing Foundation projects. Large-scale adopters favor integrations with Terraform (software), Pulumi, and platform engineering frameworks like Backstage (software) to standardize developer experience. EKS continued adoption is influenced by ecosystem tooling from Red Hat, HashiCorp, Canonical (company), and cloud providers such as Google (company) and Microsoft.