+++
author = "AWS Kubernetes Developer Advocates"
categories = ["Archive", "2022", "Weekly"]
date = 2022-01-07T08:00:00Z
draft = false
slug = "000"
title = "EKS News 000"
aliases = [
"/blog/eks-news-000",
"/archive/eks-news-006"
]
+++
Welcome to the first ever issue of [EKS News](https://eks.news)! This being the very first issue, please allow me to introduce myself and the folks behind the newsletter. I'm Chris Short, among many things I'm a Kubernetes contributor, fascinated by GitOps, and a Senior Developer Advocate on the EKS team. My team of fellow developer advocates are *significant* contributors to this newsletter. I have the distinct pleasure of assembling this newsletter for you. This newsletter will evolve based on feedback we receive (hit reply, it comes to me), issues opened on [GitHub](https://github.com/chris-short/eks.news/), and any other data points we observe.
On to this issue's news and other interesting things in the broader Kubernetes and Cloud Native ecosystem.
## New service announcements and features
[Amazon EMR on EKS releases Custom Image Validation Tool to simplify testing of your customized docker container images](https://aws.amazon.com/about-aws/whats-new/2022/01/amazon-emr-custom-image-validation-tool-images/)
* With EMR on EKS, customers can create their own images that include specific packages, libraries, and runtimes that are not available by default, e.g. a specific version of Java
* Validation tool runs an automated suite of tests to validate those images
* Download the custom image validation tool from our [GitHub repository](https://github.com/awslabs/amazon-emr-on-eks-custom-image-cli)
[EBS CSI driver now available in EKS add-ons in preview](https://aws.amazon.com/about-aws/whats-new/2021/12/eks-add-ons-ebs-csi-driver/)
* Offers a simple experience for attaching persistent storage to an EKS cluster
* The driver can be installed, managed, and updated through the EKS console, AWS CLI and SDKs
[IPv6 on EKS](https://aws.amazon.com/about-aws/whats-new/2022/01/amazon-eks-ipv6/)
* With EKS support for IPv6, pods are assigned only a globally routable IPv6 address, and you easily scale applications in your cluster without consuming limited private IPv4 address space.
* IPv6 support is enabled through the Amazon [VPC CNI plugin](https://github.com/aws/amazon-vpc-cni-k8s)
* If you're ready to implement IPv6, please read this blog from Sébastien Stormacq, [Amazon Elastic Kubernetes Service Adds IPv6 Networking](https://aws.amazon.com/blogs/aws/amazon-elastic-kubernetes-service-adds-ipv6-networking/)
* Not dual-stack but [we'd love to hear more about how you want to use IPv6](https://github.com/aws/containers-roadmap/issues/835)
## New and notable blogs
[Onfido’s Journey to a Multi-Cluster Amazon EKS Architecture](https://aws.amazon.com/blogs/containers/onfidos-journey-to-a-multi-cluster-amazon-eks-architecture/)
* Had concerns about in-place cluster upgrades and its impact on service availability
* Decided to move to from a single production clusters to a single region, multi-cluster active-active configuration
* Considered KubeFed and a mutli-cluster service mesh, but decided to operate the clusters independently instead (smaller blast radius)
* Used a single ALB with multiple TGs and weighted routing to distribute traffic between clusters
[Progressive Delivery using AWS App Mesh and Flagger](https://aws.amazon.com/blogs/containers/progressive-delivery-using-aws-app-mesh-and-flagger/)
* A walk through of a canary style deployment using App Mesh and Flagger
* Canaries help customers release features quickly while decreasing risk
* (delegating the control of a feature to the owner responsible for the outcome)
* Canary deployments allow you to test your changes with real users and compare different versions in parallel
* Flagger uses metrics to determine whether the deployment should continue or be rolled back; it is also responsible for shifting the traffic between the current version of the application and canary
* See also [Flagger](https://flagger.app/), [Performing canary deployments and metrics-driven rollback with Amazon...](https://aws.amazon.com/blogs/opensource/performing-canary-deployments-and-metrics-driven-rollback-with-amazon-managed-service-for-prometheus-and-flagger/)
[Chaos Engineering with LitmusChaos on Amazon EKS](https://aws.amazon.com/blogs/containers/chaos-engineering-with-litmuschaos-on-amazon-eks/)
* Involves injecting failures in a controlled environment using well-planned experiments to help engineers find weaknesses in systems
* Experiments should include: a baseline, a hypothesis, a failure scenario, an analysis of the outcome and its deviation from the hypothesis
* Walks through running an experiment with LitmusChaos, e.g. [pod-delete](https://hub.litmuschaos.io/generic/pod-delete), [node-drain](https://hub.litmuschaos.io/generic/node-drain), [node-cpu-hog](https://hub.litmuschaos.io/generic/node-cpu-hog), etc.
* See also [Chaos engineering on Amazon EKS using AWS Fault Injection Simulator](https://aws.amazon.com/blogs/devops/chaos-engineering-on-amazon-eks-using-aws-fault-injection-simulator/)
[Advice on mitigating the Apache log4j security issue for EKS, ECS, and Fargate customers](https://aws.amazon.com/blogs/containers/advice-on-mitigating-the-apache-log4j-security-issue-for-eks-ecs-and-fargate-customers/)
* An overview of the log4j CVE and ways to mitigate it
* Strongly recommend that customers who are running log4j upgrade to v2.16 or high as soon as possible
*, JDKs shipped in AL1 and AL2 will automatically install the hotpatch package
* For EKS, see this [project on GitHub](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
[Container scanning updates in Amazon ECR private registries using Amazon Inspector](https://aws.amazon.com/blogs/containers/container-scanning-updates-in-amazon-ecr-private-registries-using-amazon-inspector/)
* Offers improved vulnerability management for “cloud native” workloads
* Enhanced scanning provides nearly continues scanning of ECR repositories and scans the OS packages and select language libraries, see for a complete list
* scan configurations
* Whenever Inspector adds a new CVE to its database, all eligible container images are scanned in response
* Scan findings for basic and enhanced scanning is available in Amazon ECR and Inspector
* Findings can be shared with other AWS services like AWS SecurityHub and Amazon EventBridge
* Walk through of how to enable and view findings from enhanced scanning
[Best practices for running Spark on Amazon EKS](https://aws.amazon.com/blogs/containers/best-practices-for-running-spark-on-amazon-eks/)
* Goes through the different best practices related to EKS scheduling and provides an end-to-end Spark application example that implements them
* Use the S3A magic committer for writing to S3
* Build Spark 3.1.2 with Hadoop 3.3.1 if IAM Roles for Service Accounts (IRSA) is required
* Use Pod templates to provide Kubernetes specific configuration for driver and executor pods
* Use NVMe locally attached storage for temporary data
* Use Spark dynamic resource allocation to automatically scale executors
* See also [Introduction - EMR Containers Best Practices Guides](https://aws.github.io/aws-emr-containers-best-practices/)
[Autonomous ML-based detection and identification of root cause for incidents in microservices running on EKS](https://aws.amazon.com/blogs/containers/autonomous-ml-based-detection-and-identification-of-root-cause-for-incidents-in-microservices-running-on-eks/)
* Explains how to use the [Zebrium](https://www.zebrium.com/) machine learning (ML) platform to automatically find root cause of issues in logs generated by an application deployed onto [Amazon EKS](https://aws.amazon.com/eks/)
* You can get similar results by instrumenting your microservices and implementing distributed tracing
[Collecting data from edge devices using Kubernetes and AWS IoT Greengrass V2](https://aws.amazon.com/blogs/containers/collecting-data-from-edge-devices-using-kubernetes-and-aws-iot-greengrass-v2/)
* Shows how to: set up a Kubernetes cluster using k3s on a Raspberry Pi 4; install the [AWS Systems Manager](https://aws.amazon.com/ec2/systems-manager) Agent (SSM Agent); and deploy AWS IoT Greengrass V2 using standard Kubernetes tools like kubectl
* Ideal for the connected vehicle use case where reliable and durable ingestion and storage of vehicle telemetry data is needed
* Configuration involves running GG core on k3s
## New videos and webinars
[Karpenter node provisioner for Kubernetes](https://youtu.be/_FXRIKWJWUk?t=52) (Containers from the Couch)
[Amazon Elastic Container Registry (ECR) pull through cache](https://youtu.be/uTyrld7jVrk?t=53) (Containers from the Couch)
## Ecosystem News
[Using Admission Controllers to Detect Container Drift at Runtime](https://kubernetes.io/blog/2021/12/21/admission-controllers-for-container-drift/) (Kubernetes Blog)
[Top 4 cloud native trends in 2022 shaping the future of business](https://www.cncf.io/blog/2022/01/05/top-4-cloud-native-trends-in-2022-shaping-the-future-of-business/) (CNCF Blog)
[CNCF Live Webinar: Kubernetes 1.23 Release](https://community.cncf.io/events/details/cncf-cncf-online-programs-presents-cncf-live-webinar-kubernetes-123-release/) (CNCF)
{{< eo >}}