You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: latest/ug/automode/auto-migrate-prepare.adoc
+26-12Lines changed: 26 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,9 @@
3
3
= Prepare for EKS Auto Migration
4
4
:info_titleabbrev: Prepare for migration
5
5
6
-
You can migrate existing clusters to EKS Auto Mode. Use this topic to review your existing configuration, and identify any preparation needed before migrating.
6
+
Before enabling EKS Auto Mode on an existing cluster, you need to assess your current configuration for compatibility and prepare your environment for a successful migration. This preparation phase is critical to ensure a smooth transition and minimize disruption to your workloads.
7
+
8
+
This topic provides a checklist of requirements and suggested actions to address potential compatibility issues before proceeding with migration. Review each section carefully and complete the necessary preparations to ensure your cluster is ready for EKS Auto Mode.
7
9
8
10
== Kubernetes Version
9
11
@@ -36,9 +38,9 @@ Follow the procedure *Update Cluster IAM role* from <<auto-enable-existing>>.
36
38
37
39
EKS Auto mode does not provision small instances. The smallest instance size it will create is medium.
38
40
39
-
First, look at your existing cluster and determine if you are using any small instances. If you are, evaluate if these workloads can be combined onto a single larger instance.
41
+
First, examine your existing cluster and determine if you are using any small instances. If you are, evaluate if these workloads can be combined onto a single larger instance.
40
42
41
-
If you want to seperate workloads to increase resilence, you can use tains to prevent workloads from being scheduled on the same node. EKS Auto Mode will provision new nodes to accomodate the taints.
43
+
If you want to separate workloads to increase resilience, you can use taints to prevent workloads from being scheduled on the same node. EKS Auto Mode will provision new nodes to accommodate the taints.
42
44
43
45
For more information about how EKS Auto Mode works with EC2 instances, see <<automode-learn-instances>>.
44
46
@@ -58,7 +60,7 @@ For information, see <<disable-windows-support>>.
58
60
59
61
*Suggested action:* Use `kubectl` to access logs and debug instances.
60
62
61
-
By design, you cannot SSH into EKS Auto Mode managed instances. {aws} controls and deploys these instances. You can use EC2 APIs to retreive instance console output. You can use the command `kubectl debug node` to stream logs live from an instance.
63
+
By design, you cannot SSH into EKS Auto Mode managed instances. {aws} controls and deploys these instances. You can use EC2 APIs to retrieve instance console output. You can use the command `kubectl debug node` to stream logs live from an instance.
62
64
63
65
EKS provides alternate troubleshooting tools. For more information, see <<auto-troubleshoot>>.
64
66
@@ -68,7 +70,7 @@ EKS provides alternate troubleshooting tools. For more information, see <<auto-t
68
70
69
71
*Suggested action:* Migrate to using Kubernetes resources, such as DaemonSets, to provide node-local facilities.
70
72
71
-
EKS Auto Mode automatically patches and updates the EC2 instances behind nodes. To support this automation, EKS does not support custom AMIs on nodes. Migrate node workloads such as security software to https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/[Kubernetes DaemonSet], to decople your workloads from the underlying operating system.
73
+
EKS Auto Mode automatically patches and updates the EC2 instances behind nodes. To support this automation, EKS does not support custom AMIs on nodes. Migrate node workloads such as security software to https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/[Kubernetes DaemonSet], to decouple your workloads from the underlying operating system.
72
74
73
75
For more information, see <<eks-ami-build-scripts>>.
74
76
@@ -92,7 +94,7 @@ For more information, see <<launch-templates>>.
92
94
93
95
Some add-ons may conflict with EKS Auto Mode's built-in functionality. Verify that your current add-ons are compatible.
94
96
95
-
For a list of compatible add-ons and the required minium version, see <<auto-enable-existing>>.
97
+
For a list of compatible add-ons and the required minimum version, see <<auto-enable-existing>>.
96
98
97
99
== Autoscaling
98
100
@@ -116,16 +118,28 @@ While IRSA v1 is supported, Pod Identity is the recommended approach for workloa
116
118
117
119
Pod Identity provides enhanced security and simplified management for workload credentials.
118
120
119
-
// Do we have a migration guide? Good link?
121
+
For more information, see <<pod-identities>>.
120
122
121
123
== Load Balancers
122
124
123
-
*Requirement:* EKS Auto Mode integrates with existing load balancer configurations.
*Requirement:* EKS Auto Mode does not support taking over management of existing load balancers. EKS Auto Mode does not support all configurations of the open source load balancer controller.
126
126
127
-
EKS Auto Mode works with existing ALBs and NLBs, but you may need to adjust configurations to ensure optimal integration.
127
+
*Suggested action:* Review load balancer configurations, and perform a migration between load balancers by using Route53.
128
128
129
129
Verify that your load balancer settings are compatible with EKS Auto Mode's networking model.
130
130
131
-
// Whatever?
131
+
For information about configuring application load balancers, see <<auto-configure-alb>>.
132
+
133
+
For information about configuring network load balancers, see <<auto-configure-nlb>>.
134
+
135
+
{aws} suggests a DNS-based traffic shifting approach. Generally, you should maintain your existing load balancer configuration while creating new load balancers under the managed controller. For more information, see link:eks/latest/userguide/migrate-auto.html#_migrating_load_balancers["Migrating load balancers",type="documentation"].
136
+
137
+
== EBS Volumes
138
+
139
+
*Requirement:* EKS Auto Mode cannot mount volumes created by the EBS CSI controller.
140
+
141
+
*Suggested action:* Use the EKS Auto Mode EBS Migration tool to automate migrating volumes to EKS Auto Mode management.
142
+
143
+
This migration requires deleting and re-creating existing `PersistentVolumeClaim` and `PersistentVolume` resources.
144
+
145
+
For more information, see link:https://github.com/awslabs/eks-auto-mode-ebs-migration-tool[`eks-auto-mode-ebs-migration-tool`] on GitHub.
0 commit comments