One of the most challenging questions in cloud environments is about how secure is my application when its deployed in the public cloud ?
Its no secret that security aspects are much more important in a public cloud than it was in classic environments.
But dont be surprised that many applications even in public cloud dont follow best practice security patterns.
This has several reasons for example time and costs are very high trying to achieve a high security level.
But in fact AWS and Kubernetes offer many options which let you improve your security level without too much effort.
I like to share some of the possibilities that you have when creating a secure AWS EKS cluster.
Author: | Johannes Lechner |
---|---|
Tags: | AWS, EKS, Cloudwatch, Kubernetes, security, guide, networkpolicy, consulting, prevent, cyberdetection, cyberprevention, cyberattack, München, Consulting |
Categories: | devops |
AWS offers a great service called “Amazon Elastic Container Service for Kubernetes” (AWS EKS).
The setup guide can be found here: Offical AWS EKS getting started guide
If you overload such a cluster it easily happens that your Kubelet gets “Out of Memory” (OOM) errors and stops working.
Once the Kubelet is down you can see kubectl get nodes
that node is in state “NotReady”.
In addition if you describe your node kubectl describe $NODE
you can see the status description is: “System OOM encountered”.
If you look on your pods kubectl get pods --all-namespaces
you can see that pods are in state “Unknown” or in “NodeLost”.
Kubelet OOM errors should be avoided by all costs.
It causes to stop all pods on that node and its quite complicated for K8s to maintain high availability for applications in some cases.
For example for stateful sets with a single replica k8s cannot immediately move that pod to another node.
The reason is that k8s does not know how long the node with all its pods stays unavailable.
Therefore i like to share some best practice to avoid OOM problems in your AWS EKS clusters.
Author: | Johannes Lechner |
---|---|
Tags: | AWS, EKS, Cloudwatch, Kubernetes, autoscaling, oom_killer, System-OOM |
Categories: | devops |