Common questions about rapid-eks.
A CLI tool that deploys production-ready AWS EKS clusters in 10-15 minutes.
Yes. 100% open source (MIT License). No subscriptions, no paywalls.
eksctl:
- Official AWS tool
- More features
- More complex
rapid-eks:
- Opinionated (best practices built-in)
- Faster setup
- Includes monitoring by default
Both are great. rapid-eks is simpler for common use cases.
- Multi-AZ for high availability
- OIDC provider for IRSA
- Managed nodegroups with autoscaling
- Monitoring (Prometheus + Grafana)
- Security best practices
pip install git+https://github.com/jtaylortech/rapid-eks.git- Python 3.11+
- AWS credentials configured
- Terraform installed
- kubectl installed (for validation)
- helm installed (for addons)
Not yet. Coming soon after more testing.
10-15 minutes typically. Validated at 13 minutes.
Minimal cluster: ~$240/month
- EKS control plane: $73
- 2x t3.medium: $60
- 3x NAT gateways: $96
- Data transfer + EBS: $11
Yes. Create a YAML config file. See CONFIGURATION.md.
Not yet. Coming in v0.2.0.
Not yet. Coming in v0.3.0.
rapid-eks destroy my-cluster --auto-approveTakes 15-20 minutes.
Check TROUBLESHOOTING.md for manual cleanup steps.
Terraform (default). CDK support coming in v0.2.0.
Locally in .rapid-eks/ directory. Remote state support coming soon.
Yes. Check .rapid-eks/terraform/ for Terraform code.
Yes, but changes will be overwritten on next deployment. Better to customize via config.
Latest stable (currently 1.31). Configurable in YAML.
- Prometheus + Grafana (monitoring)
- Karpenter (node autoscaling)
- AWS Load Balancer Controller
See ADDONS.md for details.
Modify rapid_eks/addons/manager.py or install manually with Helm after deployment.
Yes. Automatically configured for all addons.
- KMS encryption enabled by default
- OIDC provider for IRSA
- Security groups follow AWS best practices
- No hardcoded credentials
- Check error message
- See TROUBLESHOOTING.md
- Open GitHub issue if not resolved
Yes. Fix the issue and run the same command again.
Displayed after deployment. Or retrieve from Kubernetes:
kubectl get secret -n monitoring prometheus-grafana \
-o jsonpath="{.data.admin-password}" | base64 -dWait 5 minutes. If still not ready, check:
kubectl describe node <node-name>Check pod status:
kubectl get pods -A
kubectl describe pod -n <namespace> <pod-name>See CONTRIBUTING.md.
See GitHub Issues for roadmap.
Yes! Open a GitHub issue.
Open a GitHub issue with:
- rapid-eks version
- AWS region
- Error message
- Steps to reproduce
Yes. Implementation services, custom features, training available.
Contact: jtaylortechnologies@gmail.com
- Check documentation
- Search GitHub Issues
- Open new GitHub Issue
- Email for consulting
Yes, but test thoroughly first. Currently v0.1.0 (stable but new).
None. This is open source software. For SLA, contact for paid support.
| Feature | rapid-eks | eksctl |
|---|---|---|
| Setup time | 10-15 min | 15-20 min |
| Monitoring | Included | Manual |
| Opinionated | Yes | No |
| Complexity | Low | Medium |
| Features | Core | Extensive |
| Feature | rapid-eks | Terraform |
|---|---|---|
| Setup time | 10-15 min | 1-2 hours |
| Learning curve | Low | Medium |
| Flexibility | Medium | High |
| Maintenance | Automated | Manual |
| Feature | rapid-eks | Console |
|---|---|---|
| Setup time | 10-15 min | 2-4 weeks |
| Reproducible | Yes | No |
| Best practices | Built-in | Manual |
| Automation | Full | None |
- CDK backend
- Remote state management
- Additional addons
- GovCloud support
- FIPS compliance
- Private ECR
- Production hardening
- Multi-cluster management
- GitOps integration
MIT License. Very permissive.
Yes. No restrictions.
Yes. Fork it, modify it, redistribute it.
Not required, but appreciated!
Questions? jtaylortechnologies@gmail.com
GitHub: https://github.com/jtaylortech/rapid-eks
Issues: https://github.com/jtaylortech/rapid-eks/issues