Additional Amazon EKS add-ons from independent software vendors
In addition to the previous list of Amazon EKS add-ons, you can also add a wide selection of operational software Amazon EKS add-ons from independent software vendors. Choose an add-on to learn more about it and its installation requirements.
Accuknox
The add-on name is accuknox_kubearmor
and the namespace is kubearmor
. Accuknox publishes the add-on.
For information about the add-on, see Getting Started with KubeArmor
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Akuity
The add-on name is akuity_agent
and the namespace is akuity
. Akuity publishes the add-on.
For information about how the add-on, see Installing the Akuity Agent on Amazon EKS with the Akuity EKS add-on
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Calyptia
The add-on name is calyptia_fluent-bit
and the namespace is calytia-fluentbit
. Calyptia publishes the add-on.
For information about the add-on, see Getting Started with Calyptia Core Agent
Service account name
The service account name is clyptia-fluentbit
.
AWS managed IAM policy
This add-on uses the AWSMarketplaceMeteringRegisterUsage
managed policy. For more information, see AWSMarketplaceMeteringRegisterUsage in the AWS Managed Policy Reference Guide.
Command to create required IAM role
The following command requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one, or to create one, see Create an IAM OIDC provider for your cluster. Replace my-cluster
with the name of your cluster and my-calyptia-role
with the name for your role. This command requires that you have eksctl
eksctl create iamserviceaccount --name service-account-name --namespace calyptia-fluentbit --cluster my-cluster --role-name my-calyptia-role \ --role-only --attach-policy-arn arn:aws:iam::aws:policy/AWSMarketplaceMeteringRegisterUsage --approve
Cisco Observability Collector
The add-on name is cisco_cisco-cloud-observability-collectors
and the namespace is appdynamics
. Cisco pubishes the add-on.
For information about the add-on, see Use the Cisco Cloud Observability AWS Marketplace Add-Ons
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Cisco Observability Operator
The add-on name is cisco_cisco-cloud-observability-operators
and the namespace is appdynamics
. Cisco publishes the add-on.
For information about the add-on, see Use the Cisco Cloud Observability AWS Marketplace Add-Ons
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
CLOUDSOFT
The add-on name is cloudsoft_cloudsoft-amp
and the namespace is cloudsoft-amp
. CLOUDSOFT publishes the add-on.
For information about the add-on, see Amazon EKS ADDON
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Cribl
The add-on name is cribl_cribledge
and the namespace is cribledge
. Cribl publishes the add-on.
For information about the add-on, see Installing the Cribl Amazon EKS Add-on for Edge
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Dynatrace
The add-on name is dynatrace_dynatrace-operator
and the namespace is dynatrace
. Dynatrace publishes the add-on.
For information about the add-on, see Kubernetes monitoring
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Datree
The add-on name is datree_engine-pro
and the namespace is datree
. Datree publishes the add-on.
For information about the add-on, see Amazon EKS-intergration
Service account name
The service account name is datree-webhook-server-awsmp.
AWS managed IAM policy
The managed policy is AWSLicenseManagerConsumptionPolicy. For more information, see AWSLicenseManagerConsumptionPolicy in the AWS Managed Policy Reference Guide..
Command to create required IAM role
The following command requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one, or to create one, see Create an IAM OIDC provider for your cluster. Replace my-cluster
with the name of your cluster and my-datree-role
with the name for your role. This command requires that you have eksctl
eksctl create iamserviceaccount --name datree-webhook-server-awsmp --namespace datree --cluster my-cluster --role-name my-datree-role \ --role-only --attach-policy-arn arn:aws:iam::aws:policy/service-role/AWSLicenseManagerConsumptionPolicy --approve
Custom permissions
Custom permissions aren’t used with this add-on.
Datadog
The add-on name is datadog_operator
and the namespace is datadog-agent
. Datadog publishes the add-on.
For information about the add-on, see Installing the Datadog Agent on Amazon EKS with the Datadog Operator Add-on
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Groundcover
The add-on name is groundcover_agent
and the namespace is groundcover
. groundcover publishes the add-on.
For information about the add-on, see Installing the groundcover Amazon EKS Add-on
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Grafana Labs
The add-on name is grafana-labs_kubernetes-monitoring
and the namespace is monitoring
. Grafana Labs publishes the add-on.
For information about the add-on, see Configure Kubernetes Monitoring as an Add-on with Amazon EKS
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Guance
-
Publisher – GUANCE
-
Name –
guance_datakit
-
Namespace –
datakit
-
Service account name – A service account isn’t used with this add-on.
-
AWS managed IAM policy – A managed policy isn’t used with this add-on.
-
Custom IAM permissions – Custom permissions aren’t used with this add-on.
-
Setup and usage instructions – See Using Amazon EKS add-on
in the Guance documentation.
HA Proxy
The name is haproxy-technologies_kubernetes-ingress-ee
and the namespace is haproxy-controller
. HA Proxy publishes the add-on.
For information about the add-on, see Amazon EKS-intergration
Service account name
The service account name is customer defined
.
AWS managed IAM policy
The managed policy is AWSLicenseManagerConsumptionPolicy. For more information, see AWSLicenseManagerConsumptionPolicy in the AWS Managed Policy Reference Guide..
Command to create required IAM role
The following command requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one, or to create one, see Create an IAM OIDC provider for your cluster. Replace my-cluster
with the name of your cluster and my-haproxy-role
with the name for your role. This command requires that you have eksctl
eksctl create iamserviceaccount --name service-account-name --namespace haproxy-controller --cluster my-cluster --role-name my-haproxy-role \ --role-only --attach-policy-arn arn:aws:iam::aws:policy/service-role/AWSLicenseManagerConsumptionPolicy --approve
Custom permissions
Custom permissions aren’t used with this add-on.
Kpow
The add-on name is factorhouse_kpow
and the namespace is factorhouse
. Factorhouse publishes the add-on.
For information about the add-on, see AWS Marketplace LM
Service account name
The service account name is kpow
.
AWS managed IAM policy
The managed policy is AWSLicenseManagerConsumptionPolicy. For more information, see AWSLicenseManagerConsumptionPolicy in the AWS Managed Policy Reference Guide..
Command to create required IAM role
The following command requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one, or to create one, see Create an IAM OIDC provider for your cluster. Replace my-cluster
with the name of your cluster and my-kpow-role
with the name for your role. This command requires that you have eksctl
eksctl create iamserviceaccount --name kpow --namespace factorhouse --cluster my-cluster --role-name my-kpow-role \ --role-only --attach-policy-arn arn:aws:iam::aws:policy/service-role/AWSLicenseManagerConsumptionPolicy --approve
Custom permissions
Custom permissions aren’t used with this add-on.
Kubecost
The add-on name is kubecost_kubecost
and the namespace is kubecost
. Kubecost publishes the add-on.
For information about the add-on, see AWS Cloud Billing Integration
If your cluster is version 1.23
or later, you must have the Store Kubernetes volumes with Amazon EBSStore Kubernetes volumes with Amazon EBS installed on your cluster. otherwise you will receive an error.
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Kasten
The add-on name is kasten_k10
and the namespace is kasten-io
. Kasten by Veeam publishes the add-on.
For information about the add-on, see Installing K10 on AWS using Amazon EKS Add-on
If your Amazon EKS cluster is version Kubernetes
1.23
or later, you must have the Amazon EBS CSI driver installed on your cluster with a default StorageClass
.
Service account name
The service account name is k10-k10
.
AWS managed IAM policy
The managed policy is AWSLicenseManagerConsumptionPolicy. For more information, see AWSLicenseManagerConsumptionPolicy in the AWS Managed Policy Reference Guide..
Command to create required IAM role
The following command requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one, or to create one, see Create an IAM OIDC provider for your cluster. Replace my-cluster
with the name of your cluster and my-kasten-role
with the name for your role. This command requires that you have eksctl
eksctl create iamserviceaccount --name k10-k10 --namespace kasten-io --cluster my-cluster --role-name my-kasten-role \ --role-only --attach-policy-arn arn:aws:iam::aws:policy/service-role/AWSLicenseManagerConsumptionPolicy --approve
Custom permissions
Custom permissions aren’t used with this add-on.
Kong
The add-on name is kong_konnect-ri
and the namespace is kong
. Kong publishes the add-on.
For information about the add-on, see Installing the Kong Gateway EKS Add-on
If your cluster is version 1.23
or later, you must have the Store Kubernetes volumes with Amazon EBSStore Kubernetes volumes with Amazon EBS installed on your cluster. otherwise you will receive an error.
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
LeakSignal
The add-on name is leaksignal_leakagent
and the namespace is leakagent
. LeakSignal publishes the add-on.
For information about the add-on, see https://www.leaksignal.com/docs/LeakAgent/Deployment/
If your cluster is version 1.23
or later, you must have the Store Kubernetes volumes with Amazon EBSStore Kubernetes volumes with Amazon EBS installed on your cluster. otherwise you will receive an error.
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
NetApp
The add-on name is netapp_trident-operator
and the namespace is trident
. NetApp publishes the add-on.
For information about the add-on, see Configure the Trident EKS add-on
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
New Relic
The add-on name is new-relic_kubernetes-operator
and the namespace is newrelic
. New Relic publishes the add-on.
For information about the add-on, see Installing the New Relic Add-on for EKS
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Rafay
The add-on name is rafay-systems_rafay-operator
and the namespace is rafay-system
. Rafay publishes the add-on.
For information about the add-on, see Installing the Rafay Amazon EKS Add-on
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Rad Security
-
Publisher – RAD SECURITY
-
Name –
rad-security_rad-security
-
Namespace –
ksoc
-
Service account name – A service account isn’t used with this add-on.
-
AWS managed IAM policy – A managed policy isn’t used with this add-on.
-
Custom IAM permissions – Custom permissions aren’t used with this add-on.
-
Setup and usage instructions – See Installing Rad Through The AWS Marketplace
in the Rad Security documentation.
SolarWinds
-
Publisher – SOLARWINDS
-
Name –
solarwinds_swo-k8s-collector-addon
-
Namespace –
solarwinds
-
Service account name – A service account isn’t used with this add-on.
-
AWS managed IAM policy – A managed policy isn’t used with this add-on.
-
Custom IAM permissions – Custom permissions aren’t used with this add-on.
-
Setup and usage instructions – See Monitor an Amazon EKS cluster
in the SolarWinds documentation.
Solo
The add-on name is solo-io_istio-distro
and the namespace is istio-system
. Solo publishes the add-on.
For information about the add-on, see Installing Istio
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Snyk
-
Publisher – SNYK
-
Name –
snyk_runtime-sensor
-
Namespace –
snyk_runtime-sensor
-
Service account name – A service account isn’t used with this add-on.
-
AWS managed IAM policy – A managed policy isn’t used with this add-on.
-
Custom IAM permissions – Custom permissions aren’t used with this add-on.
-
Setup and usage instructions – See Snyk runtime sensor
in the Snyk user docs.
Stormforge
The add-on name is stormforge_optimize-Live
and the namespace is stormforge-system
. Stormforge publishes the add-on.
For information about the add-on, see Installing the StormForge Agent
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Splunk
The add-on name is splunk_splunk-otel-collector-chart
and the namespace is splunk-monitoring
. Splunk publishes the add-on.
For information about the add-on, see Install the Splunk add-on for Amazon EKS
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Teleport
The add-on name is teleport_teleport
and the namespace is teleport
. Teleport publishes the add-on.
For information about the add-on, see How Teleport Works
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Tetrate
The add-on name is tetrate-io_istio-distro
and the namespace is istio-system
. Tetrate Io publishes the add-on.
For information about the add-on, see the Tetrate Istio Distro
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Upbound Universal Crossplane
The add-on name is upbound_universal-crossplane
and the namespace is upbound-system
. Upbound publishes the add-on.
For information about the add-on, see Upbound Universal Crossplane (UXP)
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.
Upwind
The add-on name is upwind
and the namespace is upwind
. Upwind publishes the add-on.
For information about the add-on, see Upwind documentation
Service account name
A service account isn’t used with this add-on.
AWS managed IAM policy
A managed policy isn’t used with this add-on.
Custom IAM permissions
Custom permissions aren’t used with this add-on.