Skip to content

Commit 32a6298

Browse files
authored
Merge pull request #1149 from cdirubbio/patch-13
Additional Information on CoreDNS in EKS Auto Mode
2 parents 5cde0b2 + 2d0f8b5 commit 32a6298

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

latest/ug/automode/auto-networking.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,3 +86,10 @@ For more information, see <<auto-configure-alb>> or <<auto-configure-nlb>>.
8686
* {aws} does not support migrating load balancers from the self managed {aws} load balancer controller to management by EKS Auto Mode.
8787
* The `networking.ingress.ipBlock` field in `TargetGroupBinding` spec is not supported.
8888
* If your worker nodes use custom security groups (not `eks-cluster-sg-*` naming pattern), your cluster role needs additional IAM permissions. The default EKS-managed policy only allows EKS to modify security groups named `eks-cluster-sg-*`. Without permission to modify your custom security groups, EKS cannot add the required ingress rules that allow ALB/NLB traffic to reach your pods.
89+
90+
[#dns-consider]
91+
==== CoreDNS considerations
92+
93+
EKS Auto Mode does not use the traditional CoreDNS deployment to provide DNS resolution within the cluster. Instead, Auto Mode nodes utilize CoreDNS running as a system service directly on each node. If transitioning a traditional cluster to Auto Mode, you can remove the CoreDNS deployment from your cluster once your workloads have been moved to the Auto Mode nodes.
94+
95+
IMPORTANT: If you plan to maintain a cluster with both Auto Mode and non-Auto Mode nodes, you must retain the CoreDNS deployment. Non-Auto Mode nodes rely on the traditional CoreDNS pods for DNS resolution, as they cannot access the node-level DNS service that Auto Mode provides.

0 commit comments

Comments
 (0)