<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Luciano Bastet</title>
    <description>The latest articles on DEV Community by Luciano Bastet (@lbastet).</description>
    <link>https://dev.to/lbastet</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1820273%2F82299259-4ba9-4f65-bc47-4d162102a00c.jpeg</url>
      <title>DEV Community: Luciano Bastet</title>
      <link>https://dev.to/lbastet</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lbastet"/>
    <language>en</language>
    <item>
      <title>🚀 Scaling GitOps on EKS with Helm + FluxCD: Lessons from the Field</title>
      <dc:creator>Luciano Bastet</dc:creator>
      <pubDate>Mon, 14 Jul 2025 17:59:55 +0000</pubDate>
      <link>https://dev.to/lbastet/scaling-gitops-on-eks-with-helm-fluxcd-lessons-from-the-field-5677</link>
      <guid>https://dev.to/lbastet/scaling-gitops-on-eks-with-helm-fluxcd-lessons-from-the-field-5677</guid>
      <description>&lt;p&gt;Some time ago, I led the design and implementation of a GitOps model for Kubernetes deployments using Helm and FluxCD, tailored for Amazon EKS. We built a multi-repo, multi-environment structure to support a fast-growing platform with dozens of microservices.&lt;/p&gt;

&lt;p&gt;🔍 What challenges did we face?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Manual, inconsistent deployments across environments&lt;/li&gt;
&lt;li&gt;CI/CD pipelines not integrated with Kubernetes state&lt;/li&gt;
&lt;li&gt;Limited scalability for new teams and services&lt;/li&gt;
&lt;li&gt;Slow feedback loop for developers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🛠 Our solution?&lt;br&gt;
 We combined Helm (for reusable, templated manifests) with FluxCD (for Git-driven, continuous delivery). CI pipelines update image tags and trigger Helm chart updates, while FluxCD takes care of the sync and rollout.&lt;/p&gt;

&lt;p&gt;🏗 Key design principles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Multi-repo structure per environment and service&lt;/li&gt;
&lt;li&gt;Developer ownership via Git workflows&lt;/li&gt;
&lt;li&gt;Full rollback and audit trail through Git&lt;/li&gt;
&lt;li&gt;Onboarding process defined and reproducible&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📉 Impact:&lt;br&gt;
 🔄 60% reduction in deployment cycle time&lt;br&gt;
 🧪 Reproducible environments from Git&lt;br&gt;
 🔐 Improved compliance and traceability&lt;br&gt;
 💪 Empowered dev teams, simplified ops&lt;/p&gt;

&lt;p&gt;💡 What I’d do differently next time:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gradual adoption with sandbox environments&lt;/li&gt;
&lt;li&gt;Assign GitOps champions per squad&lt;/li&gt;
&lt;li&gt;Invest earlier in visual dashboards&lt;/li&gt;
&lt;li&gt;Automate more of the Helm chart templating&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;GitOps WORKS — when it's done with purpose, clarity, and strong team support.&lt;/p&gt;

&lt;p&gt;If you're thinking about scaling GitOps in your org, happy to share insights!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>AWS Security Specialty - I failed (721), Then I passed! (810)</title>
      <dc:creator>Luciano Bastet</dc:creator>
      <pubDate>Tue, 20 Aug 2024 13:38:39 +0000</pubDate>
      <link>https://dev.to/lbastet/aws-security-specialty-i-failed-721-then-i-passed-810-42h6</link>
      <guid>https://dev.to/lbastet/aws-security-specialty-i-failed-721-then-i-passed-810-42h6</guid>
      <description>&lt;p&gt;It is a very challenging certification. At first I prepared it in 3 weeks and went to take it... I was very close since I failed because of one question (721). We learn from mistakes and successes emerge from failures. I reviewed the notes again, took new notes, review the mistakes from the mock exams results (TD), watched some lessons again, looked for answers to questions that left me thinking more than expected in the first attempt. &lt;/p&gt;

&lt;p&gt;As I could see the question bank is very large because in my second round no questions appeared like in the first exam. In both exams, the questions are a little more complicated or more difficult than those from Tutorial Dojo. &lt;/p&gt;

&lt;p&gt;The secret to pass;&lt;/p&gt;

&lt;p&gt;It is essential to have good reading comprehension in English and have knowledge of each of the services to be able to pass this exam.&lt;/p&gt;

&lt;p&gt;1- Read thoroughly and understand the fundamental requirements of the questions. Be attentive to connectors and the service they are asking you about (some times they include many services but then only ask about one).&lt;/p&gt;

&lt;p&gt;2- When the scenario is complex, use the WHITEBOARD (I know it is very uncomfortable sometimes, but it works)&lt;/p&gt;

&lt;p&gt;3- When you are between two possible answers, or the scenarios are too large, mark one answer and leave that question with a flag to carefully check later that the one you chose is the correct one.&lt;/p&gt;

&lt;p&gt;Courses to prepare the exam:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Udemy: Stephane Mareek for sure! (I also printed the slides and studied from there too) &lt;/li&gt;
&lt;li&gt;Exam test practice: Tutorial Dojo &lt;/li&gt;
&lt;li&gt;Exam Topics: There are like 173 questions, answers and discussion about what are the responses per question. &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://explore.skillbuilder.aws/learn/course/external/view/elearning/15222/aws-certified-security-specialty-official-practice-question-set-scs-c02-english" rel="noopener noreferrer"&gt;AWS Skill Builder &lt;/a&gt;(If you get above 80% you are probably good to go) &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Topics to handle for the exam: &lt;br&gt;
Aws signer &amp;amp; Lambda&lt;br&gt;
Forensic analysis for ec2&lt;br&gt;
Access analyzer Vs credential report&lt;br&gt;
EBS snapshot security &amp;amp; lifecycle, s3 lifecycle rules&lt;br&gt;
Compromised EC2 instance, EBS snapshots. NACLs, SG&lt;br&gt;
Alb vs NLB, performance &amp;amp; certificate configurations, encryption end-to-end&lt;br&gt;
EC2 auto-scaling, EBS encryption with kms, permissions&lt;br&gt;
Organizations, SCP, IAM, Control Tower and Service Catalog&lt;br&gt;
CloudFormation stack sets&lt;br&gt;
Cognito, Identity Center&lt;br&gt;
IAM policies, resource policies, key policies. NotAction, NotResource&lt;br&gt;
Organizational trails&lt;br&gt;
ECS and task role permissions&lt;br&gt;
S3 object lock&lt;br&gt;
Cross-account access&lt;br&gt;
CloudFront security&lt;br&gt;
Scenarios with NGW, Internet Gateway, SG, NACL&lt;br&gt;
Direct Connect, VPN&lt;br&gt;
VPC endpoints&lt;br&gt;
WAF &amp;amp; Shield&lt;br&gt;
Inspector, GuardDuty, Systems Manager&lt;br&gt;
KMS, Customer Managed Keys&lt;br&gt;
KMS rotation&lt;br&gt;
VPC Flow Logs&lt;/p&gt;

&lt;p&gt;Hope this information is useful for you. Good Luck on your exam!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>PRE-SALES Team</title>
      <dc:creator>Luciano Bastet</dc:creator>
      <pubDate>Wed, 31 Jul 2024 17:14:26 +0000</pubDate>
      <link>https://dev.to/lbastet/pre-sales-team-567f</link>
      <guid>https://dev.to/lbastet/pre-sales-team-567f</guid>
      <description>&lt;p&gt;Large software / consulting companies need a multidisciplinary pre-sales team where each role is very important and key; whether from the point of view of interviewing, obtaining requirements, being attentive to opportunities that may arise, having a vision of the future, being able to demonstrate professional technical and sales capacity, having human capital and skill in the presentation of numbers and conveniences of partnerships. The objective is to achieve a win-win on both sides. Aspire to a long lasting relationship as partners that complement each other with a common objective; thrive.&lt;br&gt;
A Pre sales team is normally composed of: Client Partner, Solution Owner, Architect and Contributors (names and profiles could varied between companies and the sale nature; Business Analyst, Product Expert, Industry Leader, etc). These roles work together to ensure that a client's needs are understood, a suitable solution is designed, and the solution will resolved the need. In the context of AWS, this involves leveraging a wide range of AWS services, mastering architecting and AWS partnerships program that will give the deal a booster efficiently impacting issues of costs, credits, work frameworks that accelerate processes in order to efficiently meet an objective. In this pre-sale stage it is important to demonstrate capacity and professionalism.&lt;/p&gt;

&lt;p&gt;**The team:&lt;/p&gt;

&lt;p&gt;Solution Owner**&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Define the overall vision and strategy for the solution.&lt;/li&gt;
&lt;li&gt;Gather and prioritize requirements from stakeholders.&lt;/li&gt;
&lt;li&gt;Oversee the solution design and ensure it aligns with client needs and business goals.&lt;/li&gt;
&lt;li&gt;Coordinate with development teams to ensure the solution is built as planned.&lt;/li&gt;
&lt;li&gt;Ensure the solution is delivered on time and within budget.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;** Client Partner**&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Act as the main point of contact between the company and the client.&lt;/li&gt;
&lt;li&gt;Develop and maintain strong relationships with key client stakeholders.&lt;/li&gt;
&lt;li&gt;Understand the client's business objectives and technological needs.&lt;/li&gt;
&lt;li&gt;Identify opportunities for upselling or cross-selling additional services.&lt;/li&gt;
&lt;li&gt;Oversee the delivery of services to ensure client satisfaction.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;Architect: *&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Design the technical architecture of the proposed solution.&lt;/li&gt;
&lt;li&gt;Choose appropriate technologies and AWS services to meet client requirements.&lt;/li&gt;
&lt;li&gt;Ensure the solution is scalable, secure, and cost-effective.&lt;/li&gt;
&lt;li&gt;Provide technical guidance and leadership to the development team.&lt;/li&gt;
&lt;li&gt;Create detailed architecture documentation and diagrams.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Importance of Collaboration and Continuous Learning&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It's crucial for the pre-sales team to foster a culture of collaboration and continuous learning. Given the rapid evolution of technology, especially in the cloud computing domain, staying updated with the latest AWS services, best practices, and industry trends is vital. Regular training sessions, workshops, and certifications can empower the team to stay ahead of the curve.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Leveraging AWS Resources&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
AWS provides a wealth of resources, such as the AWS Well-Architected Framework, AWS Training and Certification programs, and various partner tools, which can significantly enhance the team's efficiency and effectiveness. Utilizing these resources can help ensure that the proposed solutions are not only innovative but also adhere to AWS best practices, thereby adding value to the client engagement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Customer-Centric Approach&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ultimately, the success of a pre-sales team hinges on its ability to maintain a customer-centric approach. This involves not only addressing the immediate technical and business needs of the client but also anticipating future challenges and opportunities. By building strong, trust-based relationships and demonstrating a deep understanding of the client's industry and goals, the pre-sales team can position itself as a strategic partner, driving long-term success for both parties.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A multidisciplinary pre-sales team is indispensable for large software and consulting companies aiming to secure and sustain successful client relationships. By combining roles such as Client Partner, Solution Owner, and Architect, these teams ensure a comprehensive approach to understanding client needs, designing appropriate solutions, and delivering results. Leveraging AWS services and partnership programs enhances their capability to provide scalable, secure, and cost-effective solutions. This collaborative effort not only meets immediate business goals but also lays the foundation for long-term, synergistic partnerships that drive mutual growth and success.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>AWS BLACKBELT PROGRAM</title>
      <dc:creator>Luciano Bastet</dc:creator>
      <pubDate>Mon, 22 Jul 2024 14:10:11 +0000</pubDate>
      <link>https://dev.to/lbastet/aws-blackbelt-program-h27</link>
      <guid>https://dev.to/lbastet/aws-blackbelt-program-h27</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;WHAT IS?&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
The purpose of the blackbelt is to address various topics in greater technical depth such as: AI/ML, Gen-AI, Compute, Containers, Serverless, migration, security, observability, among others. The course modality is virtual, 5 hours per day, from Monday to Friday (2 or 3 breaks no more than 15 minutes).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;FOR WHOM?&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
The AWS Blackbelt program is available for AWS partners. Those who can access these programs must have at least associate level certifications and be current at the time of the date on which the program will be taught.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;COMPLETION REQUIEREMENTS?&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Starting in 2024, they began to give attendance certificates to those who met the requested requirements; attendance of 80%, participate in the CSAT at the end of each day and sometimes they may ask for the completion of laboratories and an activity that can be a group activity to present on the final day or develop an idea or use case with what has been seen in those days.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;MY EXPERIENCE&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
It is a very rich experience. Apart from learning certain services in more depth, you can meet other expert professionals who develop AWS technologies from the inside. Added to that, receiving a certificate and all the material taught (It cannot be shared since is under a confidentiality contract). It is also a good time to ask questions that have to do with a business need!!! Enjoy the next BlackBelt &lt;/p&gt;

</description>
      <category>aws</category>
      <category>devops</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Improving the operating model of service deployments in AWS EKS</title>
      <dc:creator>Luciano Bastet</dc:creator>
      <pubDate>Mon, 22 Jul 2024 14:07:51 +0000</pubDate>
      <link>https://dev.to/lbastet/improving-the-operating-model-of-service-deployments-in-aws-eks-5feh</link>
      <guid>https://dev.to/lbastet/improving-the-operating-model-of-service-deployments-in-aws-eks-5feh</guid>
      <description>&lt;h1&gt;
  
  
  Deploying Applications on Amazon EKS with Essential Plugins
&lt;/h1&gt;

&lt;p&gt;Deploying applications on Amazon Elastic Kubernetes Service (EKS) involves setting up several essential plugins to ensure smooth operation and integration with AWS services. This guide covers key plugins you need to activate and configure, including those that can be activated directly from the AWS console, as well as those requiring manual setup like the ALB Ingress Controller and External DNS. Combined, they automate the mapping of the creation of a new load balancer with the existence DNS record, improving the operating model of the platform.&lt;/p&gt;

&lt;p&gt;In this article, we assume that the cluster is up and running, and the kubeconfig is configured on your terminal and you can interact with the cluster.&lt;/p&gt;

&lt;h2&gt;
  
  
  Plugins Activated from the AWS Console
&lt;/h2&gt;

&lt;p&gt;AWS EKS allows you to activate several essential plugins directly from the console:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Amazon VPC CNI&lt;/strong&gt;: This plugin is installed by default and can be updated from the console.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;kube-proxy&lt;/strong&gt;: This plugin is responsible for network routing within the cluster and can be managed via the AWS console.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CoreDNS&lt;/strong&gt;: CoreDNS handles service discovery and DNS resolution within the cluster and can also be managed from the console.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To ensure these plugins are up-to-date and correctly configured, navigate to the "Add-ons" section of your EKS cluster in the AWS Management Console and check the status of each.&lt;/p&gt;

&lt;h2&gt;
  
  
  Setting Up the ALB Ingress Controller and External DNS
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Setting Up the ALB Ingress Controller
&lt;/h3&gt;

&lt;p&gt;The AWS Load Balancer (ALB) Ingress Controller manages Kubernetes ingress resources and provides load balancing. Here’s how to set it up manually:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create IAM Policy for the Controller&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-o&lt;/span&gt; alb-ingress-controller-iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/main/docs/install/iam_policy.json

aws iam create-policy &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--policy-name&lt;/span&gt; ALBIngressControllerIAMPolicy &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--policy-document&lt;/span&gt; file://alb-ingress-controller-iam-policy.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Associate IAM Role with EKS Service Account&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;eksctl create iamserviceaccount &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--cluster&lt;/span&gt; &amp;lt;your-cluster-name&amp;gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--namespace&lt;/span&gt; kube-system &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--name&lt;/span&gt; alb-ingress-controller &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--attach-policy-arn&lt;/span&gt; arn:aws:iam::&amp;lt;account-id&amp;gt;:policy/ALBIngressControllerIAMPolicy &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--approve&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Deploy the ALB Ingress Controller&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;kubectl apply &lt;span class="nt"&gt;-k&lt;/span&gt; github.com/aws/eks-charts/stable/aws-load-balancer-controller//crds?ref&lt;span class="o"&gt;=&lt;/span&gt;master

helm repo add eks https://aws.github.io/eks-charts

helm repo update

helm &lt;span class="nb"&gt;install &lt;/span&gt;aws-load-balancer-controller eks/aws-load-balancer-controller &lt;span class="nt"&gt;-n&lt;/span&gt; kube-system &lt;span class="nt"&gt;--set&lt;/span&gt; &lt;span class="nv"&gt;clusterName&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&amp;lt;your-cluster-name&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  2. Deploying External DNS
&lt;/h3&gt;

&lt;p&gt;To automatically update Route 53 records when services are deployed, set up External DNS:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create IAM Policy for External DNS&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-o&lt;/span&gt; external-dns-policy.json https://raw.githubusercontent.com/kubernetes-sigs/external-dns/master/docs/tutorials/aws.md

aws iam create-policy &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--policy-name&lt;/span&gt; ExternalDNSPolicy &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--policy-document&lt;/span&gt; file://external-dns-policy.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Deploy External DNS with Helm&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;helm repo add bitnami https://charts.bitnami.com/bitnami

helm repo update

helm &lt;span class="nb"&gt;install &lt;/span&gt;external-dns bitnami/external-dns &lt;span class="nt"&gt;--set&lt;/span&gt; &lt;span class="nv"&gt;provider&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;aws &lt;span class="nt"&gt;--set&lt;/span&gt; aws.zoneType&lt;span class="o"&gt;=&lt;/span&gt;public &lt;span class="nt"&gt;--set&lt;/span&gt; &lt;span class="nv"&gt;policy&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nb"&gt;sync&lt;/span&gt; &lt;span class="nt"&gt;--set&lt;/span&gt; &lt;span class="nv"&gt;txtOwnerId&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;external-dns
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure External DNS for Route 53&lt;/strong&gt;: &lt;br&gt;
Ensure your services have the correct annotations:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;apiVersion&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;v1&lt;/span&gt;
&lt;span class="na"&gt;kind&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Service&lt;/span&gt;
&lt;span class="na"&gt;metadata&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;annotations&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;external-dns.alpha.kubernetes.io/hostname&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;myservice.example.com&lt;/span&gt;
&lt;span class="na"&gt;spec&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;ports&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;port&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;80&lt;/span&gt;
  &lt;span class="na"&gt;selector&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;app&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;myservice&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Editing External DNS Deployment&lt;/strong&gt;: &lt;br&gt;
After deploying External DNS, you need to add a domain filter in the External DNS deployment manifest matching the DNS record:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;kubectl edit deployment external-dns &lt;span class="nt"&gt;-n&lt;/span&gt; kube-system
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ol&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;```yaml
apiVersion: apps/v1
kind: Deployment
metadata:
  name: external-dns
  namespace: external-dns
spec:
  selector:
    matchLabels:
      app: external-dns
  strategy:
    type: Recreate
  template:
    metadata:
      labels:
        app: external-dns
    spec:
      containers:
      - args:
        - --source=service
        - --source=ingress
        - --domain-filter=example.com
        - --provider=aws
        - --policy=upsert-only
        - --aws-zone-type=public
        - --registry=txt
        - --txt-owner-id=my-hostedzone-identifier
        image: registry.k8s.io/external-dns/external-dns:v0.13.4
        imagePullPolicy: IfNotPresent
        name: external-dns
```
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This setup ensures that any subdomain of &lt;code&gt;example.com&lt;/code&gt; will route to your ALB, allowing for dynamic service discovery and load balancing.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;By activating essential plugins from the AWS console and manually setting up the ALB Ingress Controller and External DNS, your EKS cluster will be well-equipped to handle dynamic workloads with seamless integration into AWS services. These steps ensure your cluster is robust, scalable, and easy to manage, allowing you to focus on building and deploying your applications.&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>aws</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
