Top / Amazon Web Service / AWS Amazon EKSAmazon EKS55 examples and best practices for AWS Amazon EKS, including AWS Amazon EKS Addon and AWS Amazon EKS Cluster.Review your .tf file for AWS best practicesShisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).Start Review (free) >Addonaws_eks_addon (5 example cases)AWS::EKS::Addon (6 example cases)Clusteraws_eks_cluster (5 example cases) 4 best security practicesEnsure public access for AWS EKS cluster endpoint is disabledEnsure a CIDR range for AWS EKS cluster endpoint access is restricted enoughEnsure to enable control plane logging of your EKS clusterEnsure to enable envelope encryption of EKS secrets AWS::EKS::Cluster (10 example cases)Fargate Profileaws_eks_fargate_profile (4 example cases)AWS::EKS::FargateProfile (10 example cases)Identity Provider Configaws_eks_identity_provider_config (0 example case)AWS::EKS::Cluster Provider (0 example case)Node Groupaws_eks_node_group (5 example cases)AWS::EKS::Nodegroup (10 example cases)