Setting up AWS EKS manually takes 2-4 weeks. rapid-eks does it in 13 minutes with production best practices: multi-AZ VPC, Karpenter autoscaling, Prometheus monitoring, AWS Load Balancer Controller. One command. Zero YAML hell. Destroy just as fast. Open source (MIT). Built because I was tired of burning sprints on infrastructure.Setting up AWS EKS manually takes 2-4 weeks. rapid-eks does it in 13 minutes with production best practices: multi-AZ VPC, Karpenter autoscaling, Prometheus monitoring, AWS Load Balancer Controller. One command. Zero YAML hell. Destroy just as fast. Open source (MIT). Built because I was tired of burning sprints on infrastructure.

Rapid-eks – Production EKS in 13 minutes with Terraform + Python

Hey HN! I built rapid-eks - a CLI that deploys production-ready AWS EKS clusters in 13 minutes (validated).

GitHub: https://github.com/jtaylortech/rapid-eks

The Problem

I've set up EKS at 5+ companies. Every time, same 2-4 week grind:

  • Multi-AZ VPC with proper CIDR planning
  • IRSA (IAM Roles for Service Accounts) - always breaks
  • Karpenter, ALB Controller, Prometheus - manual Helm hell
  • IAM policies that are too permissive or too restrictive
  • Debugging "why can't my pod access S3?"

It's undifferentiated heavy lifting. Same bugs, every time.

How It Works

rapid-eks is a Python CLI that generates and manages Terraform:

  1. Config validation (Pydantic) - Type-safe YAML parsing
  2. Preflight checks - AWS creds, Terraform version, kubectl, quotas
  3. Terraform generation (Jinja2) - Uses official AWS modules
  4. Deployment - Runs terraform apply with progress tracking
  5. Health validation - Waits for cluster/nodes/addons to be ready
  6. IRSA configuration - Automatically sets up pod→AWS auth

All generated Terraform lives in .rapid-eks/ - you can inspect/modify it.

What You Get (13 minutes)

Infrastructure:

  • Multi-AZ VPC (3 AZs, 6 subnets, 3 NAT gateways)
  • EKS 1.31 with OIDC provider
  • Managed node group (t3.medium, 2-4 nodes, autoscaling)

Addons (with IRSA):

  • Karpenter - Node autoscaling with spot instance support
  • AWS Load Balancer Controller - Native ALB/NLB integration
  • Prometheus + Grafana - Monitoring stack

Security:

  • IRSA for all workloads (no static credentials)
  • Least-privilege IAM policies
  • Private subnets for nodes
  • Security groups with minimal access

Technical Details

Stack:

  • Python 3.11+ with type hints (Pydantic for validation)
  • Jinja2 templates for Terraform generation
  • Click for CLI, Rich for output
  • Uses official terraform-aws-modules (vpc, eks, iam)

Why generate Terraform vs pure Python?

  • Terraform state management is battle-tested
  • AWS modules are well-maintained
  • Users can inspect/modify generated code
  • Easier to debug than boto3 API calls
  • Idempotent by default

Preflight checks:

def validate_aws_credentials(): """Verify AWS creds work and have necessary permissions""" try: sts = boto3.client('sts') identity = sts.get_caller_identity() # Check for required IAM permissions return True except ClientError: return False

IRSA setup:

  • Creates OIDC provider for cluster
  • Generates IAM roles with trust policies
  • Annotates ServiceAccounts with role ARNs
  • Validates pod→AWS auth works

Health validation:

def wait_for_cluster_ready(cluster_name, region, timeout=600): """Poll EKS API until cluster is ACTIVE""" eks = boto3.client('eks', region_name=region) start = time.time() while time.time() - start < timeout: cluster = eks.describe_cluster(name=cluster_name) if cluster['cluster']['status'] == 'ACTIVE': return True time.sleep(10) return False

Try It

pip install git+https://github.com/jtaylortech/rapid-eks.git rapid-eks create demo --region us-east-1 # ~13 minutes later kubectl get nodes

Destroy is just as fast:

rapid-eks destroy demo --auto-approve # ~17 minutes, validates clean removal

Feedback Wanted

  • Edge cases I'm missing?
  • Additional addons needed? (cert-manager, external-dns, etc.)
  • AWS regions with issues?
  • Better IRSA patterns?
  • Documentation gaps?

All code is on GitHub, MIT licensed. Issues and PRs welcome.

https://github.com/jtaylortech/rapid-eks/tree/main/docs?embedable=true

\

Market Opportunity
4 Logo
4 Price(4)
$0,02286
$0,02286$0,02286
-8,11%
USD
4 (4) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

VivoPower To Load Up On XRP At 65% Discount: Here’s How

VivoPower To Load Up On XRP At 65% Discount: Here’s How

VivoPower International, a Nasdaq-listed B-Corp now pivoting to an XRP-centric treasury, said on September 16 it has structured its mining and treasury operations so that it can acquire the token “at up to a 65% discount” to prevailing market prices—by mining other proof-of-work assets and swapping those mined tokens. VivoPower Doubles Down On XRP The […]
Share
Bitcoinist2025/09/18 10:00
Today’s Wordle #1671 Hints And Answer For Thursday, January 15

Today’s Wordle #1671 Hints And Answer For Thursday, January 15

The post Today’s Wordle #1671 Hints And Answer For Thursday, January 15 appeared on BitcoinEthereumNews.com. How to solve today’s Wordle. SOPA Images/LightRocket
Share
BitcoinEthereumNews2026/01/15 09:05
CME Group to launch options on XRP and SOL futures

CME Group to launch options on XRP and SOL futures

The post CME Group to launch options on XRP and SOL futures appeared on BitcoinEthereumNews.com. CME Group will offer options based on the derivative markets on Solana (SOL) and XRP. The new markets will open on October 13, after regulatory approval.  CME Group will expand its crypto products with options on the futures markets of Solana (SOL) and XRP. The futures market will start on October 13, after regulatory review and approval.  The options will allow the trading of MicroSol, XRP, and MicroXRP futures, with expiry dates available every business day, monthly, and quarterly. The new products will be added to the existing BTC and ETH options markets. ‘The launch of these options contracts builds on the significant growth and increasing liquidity we have seen across our suite of Solana and XRP futures,’ said Giovanni Vicioso, CME Group Global Head of Cryptocurrency Products. The options contracts will have two main sizes, tracking the futures contracts. The new market will be suitable for sophisticated institutional traders, as well as active individual traders. The addition of options markets singles out XRP and SOL as liquid enough to offer the potential to bet on a market direction.  The options on futures arrive a few months after the launch of SOL futures. Both SOL and XRP had peak volumes in August, though XRP activity has slowed down in September. XRP and SOL options to tap both institutions and active traders Crypto options are one of the indicators of market attitudes, with XRP and SOL receiving a new way to gauge sentiment. The contracts will be supported by the Cumberland team.  ‘As one of the biggest liquidity providers in the ecosystem, the Cumberland team is excited to support CME Group’s continued expansion of crypto offerings,’ said Roman Makarov, Head of Cumberland Options Trading at DRW. ‘The launch of options on Solana and XRP futures is the latest example of the…
Share
BitcoinEthereumNews2025/09/18 00:56