-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated AMI upgrades #320
Comments
Interesting idea @preflightsiren |
A few thoughts on use cases / edge cases for this feature:
|
yeah, thinking about what I'd like to know, operating a cluster with this feature:
|
That might be a good feature even separately @backjo. Perhaps we can introduce a generic mechanism to allow users to stagger upgrades. This can allow users to now chose the behavior they want - automatic upgrades without notification (with the case of Regarding tracking which AMI is used - we add a label now to nodes with the AMI in use, so even if the IG says "latest", the nodes will show the actual AMI via labels, we can also add a status field with the resolved AMI. WDYT |
Just getting back to this - I really like what cert-manager did with the concept of CertificateRequests and approval (https://cert-manager.io/docs/concepts/certificaterequest/#approval) We could do a similar concept - have a concept of an Also could work with lock-upgrades as well, but in general I'm a fan of this approach where upgrades are more of an 'approval' then a manual update to the ami |
do you mind if we split this into the 2 parts?:
|
@backjo Should the point in time should be before creation of new Launch Config or after? Approval mechanism can then be configurable in the spec of I think this makes a nicer interface, but there are some considerations/questions and tradeoffs here:
|
@eytan-avisror how you describe it is largely how I imagine it working. I wonder if we can combine these two approaches - maybe a hybrid approach here works the best.
|
how do you guys feel about: #327 (comment)
we could include a delay after which an upgrade can occur |
That’s a pretty good idea.. I think especially interesting in the case of dev clusters. |
Is this a BUG REPORT or FEATURE REQUEST?: Feature Request
Amazon publish a supported, EKS optimised AMI and an associated SSM parameter that is updated to point to the latest AMI for a given kubernetes version.
aws ssm get-parameter --name "/aws/service/eks/optimized-ami/1.18/amazon-linux-2/recommended/image_id" --region us-east-1 --query "Parameter.Value" --output text
We could have instance-manager query the EKS API to determine the kubernetes version of the cluster, query the latest AMI and replace the
image
field.This could then be coupled with an automated upgrade process like upgrade-manager, so that nodes are automatically replaced as a new AMI.
The text was updated successfully, but these errors were encountered: