Get started with Chkk for free today! No credit card required
Learn more
Learn more
Back to the blog
News
March 10, 2025

GKE & EKS Extended Support: Are 6x Fees for Supporting Older Kubernetes Versions Justified?

Written by
Ali Khayam
X logoLinkedin logo
Start for free
Estimated Reading time
4 min

Extended Support fees are hitting home for Enterprise Platform Teams. Amazon EKS and Google GKE customers often ask us: Why are Extended Support fees so high?

Going beyond the sticker shock of the 6x premium for Extended Support, let’s go deeper into the underlying costs AWS and GCP are offloading as they maintain older versions of Kubernetes.

Understanding the 6x Extended Support Fee

Extended Support differs from standard support by covering older Kubernetes versions that no longer receive mainstream updates, patches, and security fixes. This added layer of maintenance—often involving manual backporting and dependency testing—leads to significantly higher operational costs for providers like AWS EKS and Google GKE.

Comparison bar chart illustrating Standard Support vs. 6x Extended Support fees.

Backporting Isn’t Cherrypicking

Kubernetes evolves rapidly; new releases often include API and architecture changes that don’t exist in older versions. Backporting a security fix from, say, v1.31 to v1.26 isn’t a simple cherry-pick – the code and APIs may have diverged. Moreover, patches may rely on modern frameworks or features that older versions lack​. EKS and GCP engineers essentially rewrite fixes to fit the old codebase​. This is like fitting a new engine into an old car – it requires expertise and careful modifications.

Dependencies Play Whack-a-Mole 

Older Kubernetes versions drag along outdated dependencies (e.g. older networking plugins, container runtimes). Over time, these underlying components also change architecturally. Ensuring a patch doesn’t break compatibility with an old CNI plugin adds significant overhead in development and testing. This dependency drift makes patching exponentially harder, because fixes might require updating components that the old Kubernetes version wasn’t designed to work with.

Operational Safety Is a Nightmare

Most bug and security fixes require you to upgrade a component, and sometimes the whole cluster, to a newer version. But you often can’t simply bump a dependency in an old Kubernetes version without risking safety. To make matters worse, older versions of Kubernetes have different APIs and security defaults. So, if a critical bug is found in a core Kubernetes component, AWS and GCP have to either backport the fix or validate a newer version of the component with the older kube-apiserver – both paths are labor-intensive. 

Compliance Imposes Strict Deadlines 

Compliance standards like PCI-DSS, HIPAA, SOC 2, and FedRAMP mandate timely security patches and upgrades. For example, PCI-DSS Requirement 6.2 requires installing critical security patches within 30 days of release​. These rules don’t make exceptions for “legacy” software – running an out-of-support Kubernetes version can put you out of compliance overnight. With a cluster in Extended Support, cloud providers attempt to maintain compliance by continuing security updates, but the process becomes fraught with complexity. Every new patch must be applied in that 30-day window, which is an operational nightmare on an outdated version that might require extensive testing or even multiple attempts to get the fix right. The compliance burden thus shifts onto the cloud provider.

Every Engineer Hates This Work 

Software engineers hate backporting fixes to older versions because it’s an exercise in frustration. Instead of working on innovative improvements to Kubernetes, these engineers are forced to wrestle with deprecated APIs and brittle dependencies, often finding that a simple patch in a newer version breaks in unexpected ways on an older one. All of this pain and no support from the upstream Kubernetes community makes this work tedious and lonely. To make things worse, managers rarely celebrate backports the way they do for new features; fixing something in an old version isn’t glamorous, it’s just a necessary evil. At Amazon, we used to describe it as “fighting entropy” rather than creating something new, which makes it a deeply unsatisfying part of their job.

So… Are GKE & EKS Extended Support Fees Worth It?

In my opinion, the 6x Extended Support fee isn’t just a cash grab from EKS and GKE teams; it's compensation for the real costs and risks described above. Both EKS and GKE would prefer customers upgrade regularly (for everyone’s benefit), but EKS extended support and GKE extended support are offered as a safety net – one that requires heavy lifting to sustain. The high fee also serves as a financial incentive to nudge organizations toward upgrading rather than comfortably stagnating on old versions.

If you’re struggling with Kubernetes upgrades, Chkk can help. We’ve enabled some of the world’s largest enterprises to successfully complete 4-5 EKS, GKE, and AKS upgrades per year—100% disruption-free—saving them millions in Extended Support fees and eliminating the risk of Forced Upgrades by cloud providers.

Extended Support fees are hitting home for Enterprise Platform Teams. Amazon EKS and Google GKE customers often ask us: Why are Extended Support fees so high?

Going beyond the sticker shock of the 6x premium for Extended Support, let’s go deeper into the underlying costs AWS and GCP are offloading as they maintain older versions of Kubernetes.

Understanding the 6x Extended Support Fee

Extended Support differs from standard support by covering older Kubernetes versions that no longer receive mainstream updates, patches, and security fixes. This added layer of maintenance—often involving manual backporting and dependency testing—leads to significantly higher operational costs for providers like AWS EKS and Google GKE.

Comparison bar chart illustrating Standard Support vs. 6x Extended Support fees.

Backporting Isn’t Cherrypicking

Kubernetes evolves rapidly; new releases often include API and architecture changes that don’t exist in older versions. Backporting a security fix from, say, v1.31 to v1.26 isn’t a simple cherry-pick – the code and APIs may have diverged. Moreover, patches may rely on modern frameworks or features that older versions lack​. EKS and GCP engineers essentially rewrite fixes to fit the old codebase​. This is like fitting a new engine into an old car – it requires expertise and careful modifications.

Dependencies Play Whack-a-Mole 

Older Kubernetes versions drag along outdated dependencies (e.g. older networking plugins, container runtimes). Over time, these underlying components also change architecturally. Ensuring a patch doesn’t break compatibility with an old CNI plugin adds significant overhead in development and testing. This dependency drift makes patching exponentially harder, because fixes might require updating components that the old Kubernetes version wasn’t designed to work with.

Operational Safety Is a Nightmare

Most bug and security fixes require you to upgrade a component, and sometimes the whole cluster, to a newer version. But you often can’t simply bump a dependency in an old Kubernetes version without risking safety. To make matters worse, older versions of Kubernetes have different APIs and security defaults. So, if a critical bug is found in a core Kubernetes component, AWS and GCP have to either backport the fix or validate a newer version of the component with the older kube-apiserver – both paths are labor-intensive. 

Compliance Imposes Strict Deadlines 

Compliance standards like PCI-DSS, HIPAA, SOC 2, and FedRAMP mandate timely security patches and upgrades. For example, PCI-DSS Requirement 6.2 requires installing critical security patches within 30 days of release​. These rules don’t make exceptions for “legacy” software – running an out-of-support Kubernetes version can put you out of compliance overnight. With a cluster in Extended Support, cloud providers attempt to maintain compliance by continuing security updates, but the process becomes fraught with complexity. Every new patch must be applied in that 30-day window, which is an operational nightmare on an outdated version that might require extensive testing or even multiple attempts to get the fix right. The compliance burden thus shifts onto the cloud provider.

Every Engineer Hates This Work 

Software engineers hate backporting fixes to older versions because it’s an exercise in frustration. Instead of working on innovative improvements to Kubernetes, these engineers are forced to wrestle with deprecated APIs and brittle dependencies, often finding that a simple patch in a newer version breaks in unexpected ways on an older one. All of this pain and no support from the upstream Kubernetes community makes this work tedious and lonely. To make things worse, managers rarely celebrate backports the way they do for new features; fixing something in an old version isn’t glamorous, it’s just a necessary evil. At Amazon, we used to describe it as “fighting entropy” rather than creating something new, which makes it a deeply unsatisfying part of their job.

So… Are GKE & EKS Extended Support Fees Worth It?

In my opinion, the 6x Extended Support fee isn’t just a cash grab from EKS and GKE teams; it's compensation for the real costs and risks described above. Both EKS and GKE would prefer customers upgrade regularly (for everyone’s benefit), but EKS extended support and GKE extended support are offered as a safety net – one that requires heavy lifting to sustain. The high fee also serves as a financial incentive to nudge organizations toward upgrading rather than comfortably stagnating on old versions.

If you’re struggling with Kubernetes upgrades, Chkk can help. We’ve enabled some of the world’s largest enterprises to successfully complete 4-5 EKS, GKE, and AKS upgrades per year—100% disruption-free—saving them millions in Extended Support fees and eliminating the risk of Forced Upgrades by cloud providers.

Tags
Kubernetes
Amazon EKS Extended Support
GKE Extended Support

Continue reading

Spotlight

Spotlight: Simplifying Contour Upgrades with Chkk

by
Chkk Team
Read more
Hidden Toil

5 Reasons Why Delaying Open Source Software Upgrades Is a Bad Idea

by
Awais Nemat
Read more
Spotlight

Spotlight: Seamless cert-manager Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Argo Rollouts Upgrades with Chkk

by
Chkk Team
Read more
Upgrade Advisory

Upgrade Advisory: Pods Stuck in Pending During Kubelet v1.30 → v1.31 Upgrade

by
Chkk Team
Read more
Spotlight

Spotlight: Simplifying Self-Managed Apache Kafka Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless Calico Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: NGINX Ingress Controller Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: KEDA Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Streamlining Prometheus Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: RabbitMQ Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless Kyverno Upgrades with Chkk

by
Chkk Team
Read more
News

Google Container Registry Deprecation 2025: How to Migrate to Artifact Registry

by
Chkk Team
Read more
Spotlight

Spotlight: HashiCorp Vault Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Streamlining Crossplane Upgrades with Chkk

by
Chkk Team
Read more
Spotlight

Spotlight: Seamless External DNS Upgrades with Chkk

by
Chkk Team
Read more
Case Study

How Dexcom Derisked GKE Upgrades and Sped Them Up by 5x using Chkk

by
Chkk Team
Read more
Case Study

Assuring Compliance and Availability for Yoti’s On-Prem Platform with Chkk

by
Chkk Team
Read more
Case Study

How a Fortune 500 Enterprise Avoided $500K in EKS Extended Support Fees, Achieved 80% Reduction in Prep Time, and Boosted Upgrade Productivity by 200%

by
Chkk Team
Read more
Case Study

How a Fortune 1000 Enterprise Standardized Multi-Cloud (EKS & GKE) Upgrades for 30+ Add-Ons, Avoided 6x Costs, and Achieved an 80% Reduction in Prep Time

by
Chkk Team
Read more
Spotlight

Spotlight: Upgrading Self-Managed Redis

by
Chkk Team
Read more
Spotlight

Spotlight: Simplifying Self-Managed Elasticsearch Upgrades with Chkk

by
Chkk Team
Read more
News

GKE & EKS Extended Support: Are 6x Fees for Supporting Older Kubernetes Versions Justified?

by
Ali Khayam
Read more
Spotlight

Spotlight: Seamless Karpenter Upgrades with Chkk

by
Chkk Team
Read more
Operational Safety

Forced EKS & GKE Upgrades: How to Manage Business Continuity Risks

by
Fawad Khaliq
Read more
Spotlight

Spotlight: How Chkk Streamlines & Safeguards Cilium Upgrades

by
Chkk Team
Read more
Technology

Kubernetes Admission Controllers and Webhooks Deep Dive

by
Chkk Team
Read more
Spotlight

Chkk Spotlight: Istio

by
Chkk Team
Read more
Technology

Pod Disruption Budgets: Pitfalls, Evictions & Kubernetes Upgrades

by
Chkk Team
Read more
Technology

cgroup v1 to v2 Migration in Kubernetes

by
Chkk Team
Read more
Operational Safety

OpenAI’s Outage: The Complexity and Fragility of Modern AI Infrastructure on Kubernetes

by
Fawad Khaliq
Read more
News

EKS launches Auto Mode… How can you adopt it?

by
Ali Khayam
Read more
Change Safety

CrowdStrike outage was the symptom; missing Operational Safety was the cause

by
Fawad Khaliq
Read more
News

GKE Follows EKS & AKS, Launches Extended Support with a 500% Surcharge for Delayed Upgrade

by
Ali Khayam
Read more
News

AKS Long Term Support and EKS Extended Support: Similarities & Differences

by
Ali Khayam
Read more
News

Amazon launches EKS extended support… How does it impact you?

by
Ali Khayam
Read more
Platform Engineering

Platform teams need a delightfully different approach, not one that sucks less

by
Fawad Khaliq
Read more
Technology

Kubernetes Enters Its Second Decade: Insights from KubeCon Chicago

by
Fawad Khaliq
Read more
Company

Launching Chkk Operational Safety Platform

by
Awais Nemat
Read more
Technology

What Makes Kubernetes Upgrades So Challenging?

by
Fawad Khaliq
Read more
Company

4 Lessons from our SOC2 Journey

by
Fawad Khaliq
Read more
Technology

Collective Learning: The Power of Not Repeating Others’ Mistakes

by
Ali Khayam
Read more
Technology

From Fighting Fires to Availability Assurance

by
Fawad Khaliq
Read more
Company

Welcome to Chkk

by
Awais Nemat
Read more