{"id":"5a5404c2-c779-46d2-9e84-ba95d26fc87d","shortId":"JFruXk","kind":"skill","title":"eks","tagline":"AWS EKS Kubernetes management for clusters, node groups, and workloads. Use when creating clusters, configuring IRSA, managing node groups, deploying applications, or integrating with AWS services.","description":"# AWS EKS\n\nAmazon Elastic Kubernetes Service (EKS) runs Kubernetes without installing and operating your own control plane. EKS manages the control plane and integrates with AWS services.\n\n## Table of Contents\n\n- [Core Concepts](#core-concepts)\n- [Common Patterns](#common-patterns)\n- [CLI Reference](#cli-reference)\n- [Best Practices](#best-practices)\n- [Troubleshooting](#troubleshooting)\n- [References](#references)\n\n## Core Concepts\n\n### Control Plane\n\nManaged by AWS. Runs Kubernetes API server, etcd, and controllers across multiple AZs.\n\n### Node Groups\n\n| Type | Description |\n|------|-------------|\n| **Managed** | AWS manages provisioning, updates |\n| **Self-managed** | You manage EC2 instances |\n| **Fargate** | Serverless, per-pod compute |\n\n### IRSA (IAM Roles for Service Accounts)\n\nAssociates Kubernetes service accounts with IAM roles for fine-grained AWS permissions.\n\n### Add-ons\n\nOperational software: CoreDNS, kube-proxy, VPC CNI, EBS CSI driver.\n\n## Common Patterns\n\n### Create a Cluster\n\n**AWS CLI:**\n\n```bash\n# Create cluster role\naws iam create-role \\\n  --role-name eks-cluster-role \\\n  --assume-role-policy-document '{\n    \"Version\": \"2012-10-17\",\n    \"Statement\": [{\n      \"Effect\": \"Allow\",\n      \"Principal\": {\"Service\": \"eks.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }]\n  }'\n\naws iam attach-role-policy \\\n  --role-name eks-cluster-role \\\n  --policy-arn arn:aws:iam::aws:policy/AmazonEKSClusterPolicy\n\n# Create cluster\naws eks create-cluster \\\n  --name my-cluster \\\n  --role-arn arn:aws:iam::123456789012:role/eks-cluster-role \\\n  --resources-vpc-config subnetIds=subnet-12345678,subnet-87654321,securityGroupIds=sg-12345678\n\n# Wait for cluster\naws eks wait cluster-active --name my-cluster\n\n# Update kubeconfig\naws eks update-kubeconfig --name my-cluster --region us-east-1\n```\n\n**eksctl (Recommended):**\n\n```bash\n# Create cluster with managed node group\neksctl create cluster \\\n  --name my-cluster \\\n  --region us-east-1 \\\n  --version 1.29 \\\n  --nodegroup-name standard-workers \\\n  --node-type t3.medium \\\n  --nodes 3 \\\n  --nodes-min 1 \\\n  --nodes-max 5 \\\n  --managed\n```\n\n### Add Managed Node Group\n\n```bash\n# Create node role\naws iam create-role \\\n  --role-name eks-node-role \\\n  --assume-role-policy-document '{\n    \"Version\": \"2012-10-17\",\n    \"Statement\": [{\n      \"Effect\": \"Allow\",\n      \"Principal\": {\"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }]\n  }'\n\naws iam attach-role-policy --role-name eks-node-role --policy-arn arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy\naws iam attach-role-policy --role-name eks-node-role --policy-arn arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly\naws iam attach-role-policy --role-name eks-node-role --policy-arn arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy\n\n# Create node group\naws eks create-nodegroup \\\n  --cluster-name my-cluster \\\n  --nodegroup-name standard-workers \\\n  --node-role arn:aws:iam::123456789012:role/eks-node-role \\\n  --subnets subnet-12345678 subnet-87654321 \\\n  --instance-types t3.medium \\\n  --scaling-config minSize=1,maxSize=5,desiredSize=3 \\\n  --ami-type AL2_x86_64\n```\n\n### Configure IRSA\n\n```bash\n# Enable OIDC provider\neksctl utils associate-iam-oidc-provider \\\n  --cluster my-cluster \\\n  --approve\n\n# Create IAM role for service account\neksctl create iamserviceaccount \\\n  --cluster my-cluster \\\n  --namespace default \\\n  --name my-app-sa \\\n  --attach-policy-arn arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess \\\n  --approve\n```\n\n**Manual IRSA setup:**\n\n```bash\n# Get OIDC issuer\nOIDC_ISSUER=$(aws eks describe-cluster --name my-cluster --query \"cluster.identity.oidc.issuer\" --output text)\nOIDC_ID=${OIDC_ISSUER##*/}\n\n# Create trust policy\ncat > trust-policy.json << EOF\n{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [{\n    \"Effect\": \"Allow\",\n    \"Principal\": {\n      \"Federated\": \"arn:aws:iam::123456789012:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/${OIDC_ID}\"\n    },\n    \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n    \"Condition\": {\n      \"StringEquals\": {\n        \"oidc.eks.us-east-1.amazonaws.com/id/${OIDC_ID}:sub\": \"system:serviceaccount:default:my-app-sa\",\n        \"oidc.eks.us-east-1.amazonaws.com/id/${OIDC_ID}:aud\": \"sts.amazonaws.com\"\n      }\n    }\n  }]\n}\nEOF\n\naws iam create-role --role-name my-app-role --assume-role-policy-document file://trust-policy.json\n```\n\n### Kubernetes Service Account\n\n```yaml\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n  name: my-app-sa\n  namespace: default\n  annotations:\n    eks.amazonaws.com/role-arn: arn:aws:iam::123456789012:role/my-app-role\n```\n\n### Install Add-ons\n\n```bash\n# CoreDNS\naws eks create-addon \\\n  --cluster-name my-cluster \\\n  --addon-name coredns \\\n  --addon-version v1.11.1-eksbuild.4\n\n# VPC CNI\naws eks create-addon \\\n  --cluster-name my-cluster \\\n  --addon-name vpc-cni \\\n  --addon-version v1.16.0-eksbuild.1\n\n# kube-proxy\naws eks create-addon \\\n  --cluster-name my-cluster \\\n  --addon-name kube-proxy \\\n  --addon-version v1.29.0-eksbuild.1\n\n# EBS CSI Driver\naws eks create-addon \\\n  --cluster-name my-cluster \\\n  --addon-name aws-ebs-csi-driver \\\n  --addon-version v1.27.0-eksbuild.1 \\\n  --service-account-role-arn arn:aws:iam::123456789012:role/ebs-csi-role\n```\n\n### Deploy Application\n\n```yaml\n# deployment.yaml\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n  name: my-app\nspec:\n  replicas: 3\n  selector:\n    matchLabels:\n      app: my-app\n  template:\n    metadata:\n      labels:\n        app: my-app\n    spec:\n      serviceAccountName: my-app-sa\n      containers:\n      - name: app\n        image: 123456789012.dkr.ecr.us-east-1.amazonaws.com/my-app:latest\n        ports:\n        - containerPort: 8080\n        resources:\n          requests:\n            cpu: 100m\n            memory: 128Mi\n          limits:\n            cpu: 500m\n            memory: 512Mi\n---\napiVersion: v1\nkind: Service\nmetadata:\n  name: my-app\n  annotations:\n    service.beta.kubernetes.io/aws-load-balancer-type: nlb\nspec:\n  type: LoadBalancer\n  ports:\n  - port: 80\n    targetPort: 8080\n  selector:\n    app: my-app\n```\n\n## CLI Reference\n\n### Cluster Management\n\n| Command | Description |\n|---------|-------------|\n| `aws eks create-cluster` | Create cluster |\n| `aws eks describe-cluster` | Get cluster details |\n| `aws eks update-cluster-config` | Update cluster settings |\n| `aws eks delete-cluster` | Delete cluster |\n| `aws eks update-kubeconfig` | Configure kubectl |\n\n### Node Groups\n\n| Command | Description |\n|---------|-------------|\n| `aws eks create-nodegroup` | Create node group |\n| `aws eks describe-nodegroup` | Get node group details |\n| `aws eks update-nodegroup-config` | Update node group |\n| `aws eks delete-nodegroup` | Delete node group |\n\n### Add-ons\n\n| Command | Description |\n|---------|-------------|\n| `aws eks create-addon` | Install add-on |\n| `aws eks describe-addon` | Get add-on details |\n| `aws eks update-addon` | Update add-on |\n| `aws eks delete-addon` | Remove add-on |\n\n## Best Practices\n\n### Security\n\n- **Use IRSA** for pod-level AWS permissions\n- **Enable cluster encryption** with KMS\n- **Use private endpoint** for API server\n- **Enable audit logging** to CloudWatch\n- **Use security groups for pods**\n- **Implement network policies**\n\n```bash\n# Enable secrets encryption\naws eks create-cluster \\\n  --name my-cluster \\\n  --encryption-config '[{\n    \"provider\": {\"keyArn\": \"arn:aws:kms:us-east-1:123456789012:key/...\"},\n    \"resources\": [\"secrets\"]\n  }]' \\\n  ...\n```\n\n### High Availability\n\n- **Deploy across multiple AZs**\n- **Use managed node groups**\n- **Set pod disruption budgets**\n- **Configure horizontal pod autoscaling**\n\n### Cost Optimization\n\n- **Use Spot instances** for non-critical workloads\n- **Right-size nodes and pods**\n- **Use Fargate** for variable workloads\n- **Implement cluster autoscaler**\n- **Use Karpenter** for efficient scaling\n\n## Troubleshooting\n\n### Cannot Connect to Cluster\n\n```bash\n# Verify kubeconfig\naws eks update-kubeconfig --name my-cluster --region us-east-1\n\n# Check IAM identity\naws sts get-caller-identity\n\n# Verify cluster status\naws eks describe-cluster --name my-cluster --query 'cluster.status'\n```\n\n### Nodes Not Joining\n\n**Check:**\n- Node IAM role has required policies\n- Security groups allow node-to-control-plane communication\n- Nodes have network access to API server\n\n```bash\n# Check node status\nkubectl get nodes\n\n# Check aws-auth ConfigMap\nkubectl describe configmap aws-auth -n kube-system\n\n# Check node logs (SSH to node)\njournalctl -u kubelet\n```\n\n### Pod Cannot Access AWS Services\n\n```bash\n# Verify IRSA setup\nkubectl describe sa my-app-sa\n\n# Check pod environment\nkubectl exec my-pod -- env | grep AWS\n\n# Test credentials\nkubectl exec my-pod -- aws sts get-caller-identity\n```\n\n### DNS Issues\n\n```bash\n# Check CoreDNS pods\nkubectl get pods -n kube-system -l k8s-app=kube-dns\n\n# Test DNS resolution\nkubectl run test --image=busybox:1.28 --rm -it -- nslookup kubernetes\n\n# Check CoreDNS logs\nkubectl logs -n kube-system -l k8s-app=kube-dns\n```\n\n## References\n\n- [EKS User Guide](https://docs.aws.amazon.com/eks/latest/userguide/)\n- [EKS API Reference](https://docs.aws.amazon.com/eks/latest/APIReference/)\n- [EKS CLI Reference](https://docs.aws.amazon.com/cli/latest/reference/eks/)\n- [eksctl](https://eksctl.io/)\n- [EKS Best Practices Guide](https://aws.github.io/aws-eks-best-practices/)","tags":["eks","aws","agent","skills","itsmostafa","agent-skills","agentic-ai","claude-code","claude-skills","codex","coding-agents"],"capabilities":["skill","source-itsmostafa","skill-eks","topic-agent-skills","topic-agentic-ai","topic-aws","topic-claude-code","topic-claude-skills","topic-codex","topic-coding-agents"],"categories":["aws-agent-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/itsmostafa/aws-agent-skills/eks","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add itsmostafa/aws-agent-skills","source_repo":"https://github.com/itsmostafa/aws-agent-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 1085 github stars · SKILL.md body (9,291 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-05-03T00:52:58.627Z","embedding":null,"createdAt":"2026-04-18T21:55:41.642Z","updatedAt":"2026-05-03T00:52:58.627Z","lastSeenAt":"2026-05-03T00:52:58.627Z","tsv":"'-10':184,347,555 '-12345678':241,246,451 '-17':185,348,556 '-87654321':243,453 '/)':1280 '/aws-eks-best-practices/)':1287 '/aws-load-balancer-type:':817 '/cli/latest/reference/eks/)':1276 '/eks/latest/apireference/)':1270 '/eks/latest/userguide/)':1264 '/id/$':579,592 '/my-app:latest':790 '/oidc.eks.us-east-1.amazonaws.com/id':569 '/role-arn:':635 '1':275,296,314,462,1015,1088 '1.28':1237 '1.29':298 '100m':797 '123456789012':233,447,565,639,747,1016 '123456789012.dkr.ecr.us-east-1.amazonaws.com':789 '123456789012.dkr.ecr.us-east-1.amazonaws.com/my-app:latest':788 '128mi':799 '2012':183,346,554 '3':310,466,764 '5':318,464 '500m':802 '512mi':804 '64':472 '80':824 '8080':793,826 'access':1134,1171 'account':126,130,496,618,741 'across':96,1023 'action':192,355,572 'activ':255 'add':141,320,643,915,926,935,945,954 'add-on':140,642,914,925,934,944,953 'addon':651,659,663,672,680,686,696,704,710,720,728,736,923,932,942,951 'addon-nam':658,679,703,727 'addon-vers':662,685,709,735 'al2':470 'allow':188,351,559,1124 'amazon':30 'ami':468 'ami-typ':467 'annot':632,814 'api':91,976,1136,1266 'apivers':620,753,805 'app':509,588,608,628,761,767,770,774,777,782,786,813,828,831,1183,1225,1254 'applic':22,750 'approv':490,520 'apps/v1':754 'arn':210,211,229,230,373,374,394,395,415,416,444,514,515,562,636,743,744,1009 'associ':127,482 'associate-iam-oidc-provid':481 'assum':178,341,611 'assume-role-policy-docu':177,340,610 'assumerol':194,357 'assumerolewithwebident':574 'attach':198,361,382,403,512 'attach-policy-arn':511 'attach-role-polici':197,360,381,402 'aud':595 'audit':979 'auth':1148,1155 'autosc':1037 'autoscal':1061 'avail':1021 'aw':2,26,28,53,88,104,138,159,165,195,212,214,218,231,250,262,328,358,375,377,379,396,398,400,417,419,424,445,516,518,530,563,598,637,647,668,692,716,731,745,838,845,853,862,869,880,888,897,906,919,928,938,947,965,995,1010,1075,1092,1101,1147,1154,1172,1195,1203 'aws-auth':1146,1153 'aws-ebs-csi-driv':730 'aws.github.io':1286 'aws.github.io/aws-eks-best-practices/)':1285 'az':98,1025 'bash':161,278,324,475,524,645,991,1072,1138,1174,1211 'best':73,76,956,1282 'best-practic':75 'budget':1033 'busybox':1236 'caller':1096,1207 'cannot':1068,1170 'cat':550 'check':1089,1115,1139,1145,1160,1185,1212,1242 'cli':68,71,160,832,1272 'cli-refer':70 'cloudwatch':982 'cluster':7,15,158,163,175,206,217,222,226,249,254,259,270,280,287,291,430,434,486,489,500,503,534,538,653,657,674,678,698,702,722,726,834,842,844,849,851,857,860,866,868,968,999,1003,1060,1071,1083,1099,1105,1109 'cluster-act':253 'cluster-nam':429,652,673,697,721 'cluster.identity.oidc.issuer':540 'cluster.status':1111 'cni':150,667,684 'command':836,878,917 'common':63,66,154 'common-pattern':65 'communic':1130 'comput':120 'concept':59,62,83 'condit':575 'config':238,460,858,902,1006 'configmap':1149,1152 'configur':16,473,874,1034 'connect':1069 'contain':784 'containerport':792 'content':57 'control':43,48,84,95,1128 'core':58,61,82 'core-concept':60 'coredn':145,646,661,1213,1243 'cost':1038 'cpu':796,801 'creat':14,156,162,168,216,221,279,286,325,331,421,427,491,498,547,601,650,671,695,719,841,843,883,885,922,998 'create-addon':649,670,694,718,921 'create-clust':220,840,997 'create-nodegroup':426,882 'create-rol':167,330,600 'credenti':1197 'critic':1046 'csi':152,714,733 'default':505,585,631 'delet':865,867,909,911,950 'delete-addon':949 'delete-clust':864 'delete-nodegroup':908 'deploy':21,749,756,1022 'deployment.yaml':752 'describ':533,848,891,931,1104,1151,1179 'describe-addon':930 'describe-clust':532,847,1103 'describe-nodegroup':890 'descript':102,837,879,918 'desireds':465 'detail':852,896,937 'disrupt':1032 'dns':1209,1228,1230,1257 'docs.aws.amazon.com':1263,1269,1275 'docs.aws.amazon.com/cli/latest/reference/eks/)':1274 'docs.aws.amazon.com/eks/latest/apireference/)':1268 'docs.aws.amazon.com/eks/latest/userguide/)':1262 'document':181,344,614 'driver':153,715,734 'east':274,295,1014,1087 'eb':151,713,732 'ec2':113 'ec2.amazonaws.com':354 'effect':187,350,558 'effici':1065 'ek':1,3,29,34,45,174,205,219,251,263,337,368,389,410,425,531,648,669,693,717,839,846,854,863,870,881,889,898,907,920,929,939,948,996,1076,1102,1259,1265,1271,1281 'eks-cluster-rol':173,204 'eks-node-rol':336,367,388,409 'eks.amazonaws.com':191,634 'eks.amazonaws.com/role-arn:':633 'eksctl':276,285,479,497,1277 'eksctl.io':1279 'eksctl.io/)':1278 'elast':31 'enabl':476,967,978,992 'encrypt':969,994,1005 'encryption-config':1004 'endpoint':974 'env':1193 'environ':1187 'eof':552,597 'etcd':93 'exec':1189,1199 'fargat':115,1055 'feder':561 'fine':136 'fine-grain':135 'get':525,850,893,933,1095,1143,1206,1216 'get-caller-ident':1094,1205 'grain':137 'grep':1194 'group':9,20,100,284,323,423,877,887,895,905,913,985,1029,1123 'guid':1261,1284 'high':1020 'horizont':1035 'iam':122,132,166,196,213,232,329,359,376,380,397,401,418,446,483,492,517,564,599,638,746,1090,1117 'iamserviceaccount':499 'id':544,571,581,594 'ident':1091,1097,1208 'imag':787,1235 'implement':988,1059 'instal':38,641,924 'instanc':114,455,1042 'instance-typ':454 'integr':24,51 'irsa':17,121,474,522,960,1176 'issu':1210 'issuer':527,529,546 'join':1114 'journalctl':1166 'k8s':1224,1253 'k8s-app':1223,1252 'karpent':1063 'key':1017 'keyarn':1008 'kind':622,755,807 'kms':971,1011 'kube':147,690,707,1158,1220,1227,1249,1256 'kube-dn':1226,1255 'kube-proxi':146,689,706 'kube-system':1157,1219,1248 'kubeconfig':261,266,873,1074,1079 'kubectl':875,1142,1150,1178,1188,1198,1215,1232,1245 'kubelet':1168 'kubernet':4,32,36,90,128,616,1241 'l':1222,1251 'label':773 'level':964 'limit':800 'loadbalanc':821 'log':980,1162,1244,1246 'manag':5,18,46,86,103,105,110,112,282,319,321,835,1027 'manual':521 'matchlabel':766 'max':317 'maxsiz':463 'memori':798,803 'metadata':624,757,772,809 'min':313 'minsiz':461 'multipl':97,1024 'my-app':759,768,775,811,829 'my-app-rol':606 'my-app-sa':507,586,626,780,1181 'my-clust':224,257,268,289,432,487,501,536,655,676,700,724,1001,1081,1107 'my-pod':1190,1200 'n':1156,1218,1247 'name':172,203,223,256,267,288,301,335,366,387,408,431,437,506,535,605,625,654,660,675,681,699,705,723,729,758,785,810,1000,1080,1106 'namespac':504,630 'network':989,1133 'nlb':818 'node':8,19,99,283,306,309,312,316,322,326,338,369,390,411,422,442,876,886,894,904,912,1028,1051,1112,1116,1126,1131,1140,1144,1161,1165 'node-rol':441 'node-to-control-plan':1125 'node-typ':305 'nodegroup':300,428,436,884,892,901,910 'nodegroup-nam':299,435 'nodes-max':315 'nodes-min':311 'non':1045 'non-crit':1044 'nslookup':1240 'oidc':477,484,526,528,543,545,567,570,580,593 'oidc-provid':566 'oidc.eks.us-east-1.amazonaws.com':578,591 'oidc.eks.us-east-1.amazonaws.com/id/$':577,590 'on':142,644,916 'oper':40,143 'optim':1039 'output':541 'pattern':64,67,155 'per':118 'per-pod':117 'permiss':139,966 'plane':44,49,85,1129 'pod':119,963,987,1031,1036,1053,1169,1186,1192,1202,1214,1217 'pod-level':962 'polici':180,200,209,343,363,372,384,393,405,414,513,549,613,990,1121 'policy-arn':208,371,392,413 'policy/amazonec2containerregistryreadonly':399 'policy/amazoneks_cni_policy':420 'policy/amazoneksclusterpolicy':215 'policy/amazoneksworkernodepolicy':378 'policy/amazons3readonlyaccess':519 'port':791,822,823 'practic':74,77,957,1283 'princip':189,352,560 'privat':973 'provid':478,485,568,1007 'provis':106 'proxi':148,691,708 'queri':539,1110 'recommend':277 'refer':69,72,80,81,833,1258,1267,1273 'region':271,292,1084 'remov':952 'replica':763 'request':795 'requir':1120 'resolut':1231 'resourc':236,794,1018 'resources-vpc-config':235 'right':1049 'right-siz':1048 'rm':1238 'role':123,133,164,169,171,176,179,199,202,207,228,327,332,334,339,342,362,365,370,383,386,391,404,407,412,443,493,602,604,609,612,742,1118 'role-arn':227 'role-nam':170,201,333,364,385,406,603 'role/ebs-csi-role':748 'role/eks-cluster-role':234 'role/eks-node-role':448 'role/my-app-role':640 'run':35,89,1233 'sa':510,589,629,783,1180,1184 'scale':459,1066 'scaling-config':458 'secret':993,1019 'secur':958,984,1122 'securitygroupid':244 'selector':765,827 'self':109 'self-manag':108 'server':92,977,1137 'serverless':116 'servic':27,33,54,125,129,190,353,495,617,740,808,1173 'service-account-role-arn':739 'service.beta.kubernetes.io':816 'service.beta.kubernetes.io/aws-load-balancer-type:':815 'serviceaccount':584,623 'serviceaccountnam':779 'set':861,1030 'setup':523,1177 'sg':245 'size':1050 'skill' 'skill-eks' 'softwar':144 'source-itsmostafa' 'spec':762,778,819 'spot':1041 'ssh':1163 'standard':303,439 'standard-work':302,438 'statement':186,349,557 'status':1100,1141 'stringequ':576 'sts':193,356,573,1093,1204 'sts.amazonaws.com':596 'sub':582 'subnet':240,242,449,450,452 'subnetid':239 'system':583,1159,1221,1250 't3.medium':308,457 'tabl':55 'targetport':825 'templat':771 'test':1196,1229,1234 'text':542 'topic-agent-skills' 'topic-agentic-ai' 'topic-aws' 'topic-claude-code' 'topic-claude-skills' 'topic-codex' 'topic-coding-agents' 'troubleshoot':78,79,1067 'trust':548 'trust-policy.json':551,615 'type':101,307,456,469,820 'u':1167 'updat':107,260,265,856,859,872,900,903,941,943,1078 'update-addon':940 'update-cluster-config':855 'update-kubeconfig':264,871,1077 'update-nodegroup-config':899 'us':273,294,1013,1086 'us-east':272,293,1012,1085 'use':12,959,972,983,1026,1040,1054,1062 'user':1260 'util':480 'v1':621,806 'v1.11.1-eksbuild.4':665 'v1.16.0-eksbuild.1':688 'v1.27.0-eksbuild.1':738 'v1.29.0-eksbuild.1':712 'variabl':1057 'verifi':1073,1098,1175 'version':182,297,345,553,664,687,711,737 'vpc':149,237,666,683 'vpc-cni':682 'wait':247,252 'without':37 'worker':304,440 'workload':11,1047,1058 'x86':471 'yaml':619,751","prices":[{"id":"441ac6ae-319d-46ef-afb4-77c9ce2c1b1c","listingId":"5a5404c2-c779-46d2-9e84-ba95d26fc87d","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"itsmostafa","category":"aws-agent-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:55:41.642Z"}],"sources":[{"listingId":"5a5404c2-c779-46d2-9e84-ba95d26fc87d","source":"github","sourceId":"itsmostafa/aws-agent-skills/eks","sourceUrl":"https://github.com/itsmostafa/aws-agent-skills/tree/main/skills/eks","isPrimary":false,"firstSeenAt":"2026-04-18T21:55:41.642Z","lastSeenAt":"2026-05-03T00:52:58.627Z"}],"details":{"listingId":"5a5404c2-c779-46d2-9e84-ba95d26fc87d","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"itsmostafa","slug":"eks","github":{"repo":"itsmostafa/aws-agent-skills","stars":1085,"topics":["agent-skills","agentic-ai","aws","claude-code","claude-skills","codex","coding-agents"],"license":"mit","html_url":"https://github.com/itsmostafa/aws-agent-skills","pushed_at":"2026-04-27T09:45:24Z","description":"AWS Skills for Agents","skill_md_sha":"1cd2376e423ff9fc1b248d2b6f65eba00f55f264","skill_md_path":"skills/eks/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/itsmostafa/aws-agent-skills/tree/main/skills/eks"},"layout":"multi","source":"github","category":"aws-agent-skills","frontmatter":{"name":"eks","description":"AWS EKS Kubernetes management for clusters, node groups, and workloads. Use when creating clusters, configuring IRSA, managing node groups, deploying applications, or integrating with AWS services."},"skills_sh_url":"https://skills.sh/itsmostafa/aws-agent-skills/eks"},"updatedAt":"2026-05-03T00:52:58.627Z"}}