Get started with Chkk for free today! No credit card required
Learn more
Learn more
Back to the blog
News
December 6, 2024

EKS launches Auto Mode… How can you adopt it?

Written by
Ali Khayam
X logoLinkedin logo
Start for free
Estimated Reading time
2 min

One of the best infrastructure announcements of the year came at re:invent – AWS has launched EKS Auto Mode to reduce Kubernetes operational overhead for simple clusters.

In this blog, I’ll highlight the top 5 considerations that you should be aware of as you adopt Auto Mode.

1. Your nodes will be automatically created and updated

With Auto Mode, AMIs and ec2 instances are automatically selected for your workload. Auto mode will manage the AMI lifecycle, ensuring that new AMIs are automatically upgraded on your nodes in a rolling deployment (respecting the Kubernetes scheduling constraints you specify).

AWS Karpenter is also part of Auto Mode, and it will automatically and dynamically select the most optimal compute instances and scale the cluster automatically for capacity as well. This also means that the cluster will be scaled down automatically if utilization is low.

Operational Consideration: Customers requiring custom AMIs and won’t be able to use Auto Mode which only supports EKS AMIs.

2. AWS Managed Add-ons (AWS CNI, AWS EBS CSI, AWS Karpenter, ..) will be automatically upgraded

With Auto Mode, EKS can automatically install and upgrade the 6 main AWS Managed Add-Ons: KubeProxy, CoreDNS, ALB Controller, VPC CNI, EBS CSI, and Karpenter. When you upgrade the control plane, EKS Auto Mode will automatically update these Add-ons.

Operational Consideration: In Auto Mode, the underlying CNI is restricted to AWS’ VPC CNI plug-in. This can be a limitation if your organization prefers or requires a different CNI (e.g., Calico, Cilium) for enhanced observability, eBPF support, or advanced networking policies.

3. You continue to own maintenance and upgrades of all other Add-ons (Istio, Cert-Manager, Nginx, Argo, Keycloak, …)

Just like today, all other add-ons must still be installed, managed, and upgraded by you. This list of “Customer-Managed Application Add-ons” includes key add-ons like cert-manager, ArgoCD, External Secrets Operator, Istio, External DNS, CrossPlane, KEDA, Prometheus, Alertmanager, Fluentd, Grafana, Loki, Keycloak, Contour, Nginx Ingress Controller, Cilium, Calico, Argo Rollouts, and all Database Add-Ons.

Operational Consideration: You must configure Auto Mode to stall upgrades until you verify compatibility for: 1. Application Add-ons, 2. kernel-dependent custom tooling, and 3. Add-ons which require specific kernel versions. Ideally, you should use operational safety tools to uncover hidden dependencies and unknown incompatibilities before Auto Mode upgrades your clusters. 

4. You continue to own fixing API deprecations and application dependencies prior to upgrades.

You are still responsible for getting applications migrated off of deprecated/removed APIs and fixing misconfigured Pod Disruption Budgets (PDBs) prior to an Auto Mode upgrade. 

Operational Consideration: Auto Mode respects PDBs for 21 days. Afterwards EKS Auto Mode will proceed with the upgrade. Ensure your application teams know this timeline and update their workloads and PDBs prior to the upgrade.

5. You will pay a 12% surcharge on your nodes.

Auto Mode introduces a 12% surcharge on nodes, so your EKS-attached EC2 spend will increase proportionally. For instance, if you are spending $1M to $10M annually on EC2 nodes then your spend will increase between $120K to $1.2M /yr. 

Should you adopt Auto Mode?

You should adopt Auto Mode but take a crawl-walk-run approach. Start with simple container workloads, automate safety and operational practices, and then grow from there.

For example, if you are running simple containerized workloads elsewhere and thinking of migrating them to EKS, you can now deploy and manage all container workloads using EKS Auto Mode. Or if have clusters that aren’t running Datapath Add-ons (Istio, Contour, Cilium, etc.) and Stateful Add-Ons (e.g. Database Add-Ons) then you can move these clusters to EKS Auto Mode. (Typically clusters running CI jobs fit this criteria.) 

If you are an existing EKS user, most of your clusters are already running Application Add-Ons which require special care and attention. You should have the right operational safeguards and tooling to ensure that all add-on dependencies are resolved, all compatibility have been verified, and applications have been updated to work with the next version of EKS.

One of the best infrastructure announcements of the year came at re:invent – AWS has launched EKS Auto Mode to reduce Kubernetes operational overhead for simple clusters.

In this blog, I’ll highlight the top 5 considerations that you should be aware of as you adopt Auto Mode.

1. Your nodes will be automatically created and updated

With Auto Mode, AMIs and ec2 instances are automatically selected for your workload. Auto mode will manage the AMI lifecycle, ensuring that new AMIs are automatically upgraded on your nodes in a rolling deployment (respecting the Kubernetes scheduling constraints you specify).

AWS Karpenter is also part of Auto Mode, and it will automatically and dynamically select the most optimal compute instances and scale the cluster automatically for capacity as well. This also means that the cluster will be scaled down automatically if utilization is low.

Operational Consideration: Customers requiring custom AMIs and won’t be able to use Auto Mode which only supports EKS AMIs.

2. AWS Managed Add-ons (AWS CNI, AWS EBS CSI, AWS Karpenter, ..) will be automatically upgraded

With Auto Mode, EKS can automatically install and upgrade the 6 main AWS Managed Add-Ons: KubeProxy, CoreDNS, ALB Controller, VPC CNI, EBS CSI, and Karpenter. When you upgrade the control plane, EKS Auto Mode will automatically update these Add-ons.

Operational Consideration: In Auto Mode, the underlying CNI is restricted to AWS’ VPC CNI plug-in. This can be a limitation if your organization prefers or requires a different CNI (e.g., Calico, Cilium) for enhanced observability, eBPF support, or advanced networking policies.

3. You continue to own maintenance and upgrades of all other Add-ons (Istio, Cert-Manager, Nginx, Argo, Keycloak, …)

Just like today, all other add-ons must still be installed, managed, and upgraded by you. This list of “Customer-Managed Application Add-ons” includes key add-ons like cert-manager, ArgoCD, External Secrets Operator, Istio, External DNS, CrossPlane, KEDA, Prometheus, Alertmanager, Fluentd, Grafana, Loki, Keycloak, Contour, Nginx Ingress Controller, Cilium, Calico, Argo Rollouts, and all Database Add-Ons.

Operational Consideration: You must configure Auto Mode to stall upgrades until you verify compatibility for: 1. Application Add-ons, 2. kernel-dependent custom tooling, and 3. Add-ons which require specific kernel versions. Ideally, you should use operational safety tools to uncover hidden dependencies and unknown incompatibilities before Auto Mode upgrades your clusters. 

4. You continue to own fixing API deprecations and application dependencies prior to upgrades.

You are still responsible for getting applications migrated off of deprecated/removed APIs and fixing misconfigured Pod Disruption Budgets (PDBs) prior to an Auto Mode upgrade. 

Operational Consideration: Auto Mode respects PDBs for 21 days. Afterwards EKS Auto Mode will proceed with the upgrade. Ensure your application teams know this timeline and update their workloads and PDBs prior to the upgrade.

5. You will pay a 12% surcharge on your nodes.

Auto Mode introduces a 12% surcharge on nodes, so your EKS-attached EC2 spend will increase proportionally. For instance, if you are spending $1M to $10M annually on EC2 nodes then your spend will increase between $120K to $1.2M /yr. 

Should you adopt Auto Mode?

You should adopt Auto Mode but take a crawl-walk-run approach. Start with simple container workloads, automate safety and operational practices, and then grow from there.

For example, if you are running simple containerized workloads elsewhere and thinking of migrating them to EKS, you can now deploy and manage all container workloads using EKS Auto Mode. Or if have clusters that aren’t running Datapath Add-ons (Istio, Contour, Cilium, etc.) and Stateful Add-Ons (e.g. Database Add-Ons) then you can move these clusters to EKS Auto Mode. (Typically clusters running CI jobs fit this criteria.) 

If you are an existing EKS user, most of your clusters are already running Application Add-Ons which require special care and attention. You should have the right operational safeguards and tooling to ensure that all add-on dependencies are resolved, all compatibility have been verified, and applications have been updated to work with the next version of EKS.

Tags
EKS Auto Mode

Continue reading

Spotlight

Spotlight: Simplifying Contour Upgrades with Chkk

by
Chkk Team
Read more
Hidden Toil

5 Reasons Why Delaying Open Source Software Upgrades Is a Bad Idea

by
Awais Nemat
Read more
Spotlight

Spotlight: Seamless cert-manager Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Argo Rollouts Upgrades with Chkk

by
Chkk Team
Read more
Upgrade Advisory

Upgrade Advisory: Pods Stuck in Pending During Kubelet v1.30 → v1.31 Upgrade

by
Chkk Team
Read more
Spotlight

Spotlight: Simplifying Self-Managed Apache Kafka Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless Calico Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: NGINX Ingress Controller Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: KEDA Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Streamlining Prometheus Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: RabbitMQ Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless Kyverno Upgrades with Chkk

by
Chkk Team
Read more
News

Google Container Registry Deprecation 2025: How to Migrate to Artifact Registry

by
Chkk Team
Read more
Spotlight

Spotlight: HashiCorp Vault Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Streamlining Crossplane Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless External DNS Upgrades with Chkk

by
Chkk Team
Read more
Case Study

How Dexcom Derisked GKE Upgrades and Sped Them Up by 5x using Chkk

by
Chkk Team
Read more
Case Study

Assuring Compliance and Availability for Yoti’s On-Prem Platform with Chkk

by
Chkk Team
Read more
Case Study

How a Fortune 500 Enterprise Avoided $500K in EKS Extended Support Fees, Achieved 80% Reduction in Prep Time, and Boosted Upgrade Productivity by 200%

by
Chkk Team
Read more
Case Study

How a Fortune 1000 Enterprise Standardized Multi-Cloud (EKS & GKE) Upgrades for 30+ Add-Ons, Avoided 6x Costs, and Achieved an 80% Reduction in Prep Time

by
Chkk Team
Read more
Spotlight

Spotlight: Upgrading Self-Managed Redis

by
Chkk Team
Read more
Spotlight

Spotlight: Simplifying Self-Managed Elasticsearch Upgrades with Chkk

by
Chkk Team
Read more
News

GKE & EKS Extended Support: Are 6x Fees for Supporting Older Kubernetes Versions Justified?

by
Ali Khayam
Read more
Spotlight

Spotlight: Seamless Karpenter Upgrades with Chkk

by
Chkk Team
Read more
Operational Safety

Forced EKS & GKE Upgrades: How to Manage Business Continuity Risks

by
Fawad Khaliq
Read more
Spotlight

Spotlight: How Chkk Streamlines & Safeguards Cilium Upgrades

by
Chkk Team
Read more
Technology

Kubernetes Admission Controllers and Webhooks Deep Dive

by
Chkk Team
Read more
Spotlight

Chkk Spotlight: Istio

by
Chkk Team
Read more
Technology

Pod Disruption Budgets: Pitfalls, Evictions & Kubernetes Upgrades

by
Chkk Team
Read more
Technology

cgroup v1 to v2 Migration in Kubernetes

by
Chkk Team
Read more
Operational Safety

OpenAI’s Outage: The Complexity and Fragility of Modern AI Infrastructure on Kubernetes

by
Fawad Khaliq
Read more
News

EKS launches Auto Mode… How can you adopt it?

by
Ali Khayam
Read more
Change Safety

CrowdStrike outage was the symptom; missing Operational Safety was the cause

by
Fawad Khaliq
Read more
News

GKE Follows EKS & AKS, Launches Extended Support with a 500% Surcharge for Delayed Upgrade

by
Ali Khayam
Read more
News

AKS Long Term Support and EKS Extended Support: Similarities & Differences

by
Ali Khayam
Read more
News

Amazon launches EKS extended support… How does it impact you?

by
Ali Khayam
Read more
Platform Engineering

Platform teams need a delightfully different approach, not one that sucks less

by
Fawad Khaliq
Read more
Technology

Kubernetes Enters Its Second Decade: Insights from KubeCon Chicago

by
Fawad Khaliq
Read more
Company

Launching Chkk Operational Safety Platform

by
Awais Nemat
Read more
Technology

What Makes Kubernetes Upgrades So Challenging?

by
Fawad Khaliq
Read more
Company

4 Lessons from our SOC2 Journey

by
Fawad Khaliq
Read more
Technology

Collective Learning: The Power of Not Repeating Others’ Mistakes

by
Ali Khayam
Read more
Technology

From Fighting Fires to Availability Assurance

by
Fawad Khaliq
Read more
Company

Welcome to Chkk

by
Awais Nemat
Read more