Three things that shipped this month that your team should know about — including one that eliminates an entire category of CI/CD glue code.
Managing EKS node groups means tracking AMI updates, configuring launch templates, tuning autoscaler parameters, and debugging kubelet version mismatches. AWS launched EKS Auto Mode to eliminate all of that — AWS manages the compute layer entirely, including provisioning, scaling, and OS patching — but our reference architecture components didn't support it yet.
Now they do. The updated eks/cluster component supports EKS Auto Mode alongside traditional managed node groups. You can adopt Auto Mode for new clusters or migrate existing ones incrementally. The component handles the compute configuration, node class selection, and the IAM roles that Auto Mode requires.
Many teams spend a week per quarter upgrading clusters — a full month every year on EKS maintenance alone. If that sounds familiar, Auto Mode is worth evaluating.
Setting up kubectl access to EKS clusters has always been more steps than it should be — running aws eks update-kubeconfig, managing multiple contexts, and re-authenticating when tokens expire. ECR is similarly painful: aws ecr get-login-password | docker login every 12 hours, or managing credential helpers across your team.
Atmos Auth now handles both natively:
atmos auth login automatically provisions kubeconfig entries for all linked clusters. No more aws eks update-kubeconfig commands. The new atmos aws eks token command works as a kubectl credential plugin for short-lived STS tokens without requiring the AWS CLI.atmos auth login. No credential helpers, no 12-hour token dance.Both integrations clean up automatically on logout. Your team configures it once in atmos.yaml and everyone gets consistent access from day one.
In February, we mentioned Native CI/CD Support as a roadmap item. It's shipped, and it eliminates the entire category of bash glue code that most teams write to make Terraform work in GitHub Actions.
The problem: Getting Terraform plan output into GitHub in a useful format meant writing bash scripts to parse stdout, awk/grep for resource counts, and separate GitHub Actions to post PR comments. Every team wrote their own version, and they all broke in slightly different ways.
The solution: Atmos now auto-detects CI environments and does the right thing:
$GITHUB_OUTPUT automatically — has_changes, has_additions, plan_summary — ready for downstream jobs.The key insight: the same command works everywhere. atmos terraform plan vpc -s prod produces the same result locally and in CI. The difference is just the output format — Atmos handles that automatically.
# Your entire GitHub Actions step:
- run: atmos terraform plan vpc -s prod
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}No separate GitHub Actions, no wrapper scripts, no shellfu. Just clean, reproducible commands.
This lines up with a pattern we're seeing across customer teams: pulling back on the sprawl of third-party GitHub Actions. With Native CI, your workflow depends on the atmos binary — no npm, no marketplace actions to vet, version-pin, and audit. Fewer supply-chain surfaces, smaller blast radius, and one toolchain to reason about across local dev and CI.
PR comment integration is part of this release too — Atmos posts plan summaries directly as PR comments, no extra action required. Custom Go templates are available if you want full control over the formatting.
If you're currently using custom GitHub Actions workflows with Terraform, we can help you migrate to Native CI. The migration typically eliminates 50-100 lines of bash per workflow.
To schedule: Reply to this email or book directly.
Native CI gives you the in-CI experience — plan summaries, status checks, output variables. But once you're running Atmos across multiple repos, multiple environments, and multiple approvers, you start needing things that don't belong inside a single Actions run: a dashboard view of drift across all your stacks, an audit trail of who approved what, and gates on apply jobs.
That's Atmos Pro — the control plane for Atmos. A hosted service that installs as a GitHub App, watches every stack across your repos, and adds:
Open-source Atmos still does what it always has, locally and in CI. Atmos Pro is the control plane on top — coordinating drift, approvals, and rollbacks across every workspace once you've outgrown "the CI logs are the source of truth."
We're opening up subscriptions over the next few weeks at atmos-pro.com. If you want early access, reply to this email.
Check the Atmos Roadmap for detailed timelines.
Office Hours continues weekly — if you have questions about any of these changes, it's the fastest way to get answers. Register here if you don't already have it on your calendar, or catch up via the podcast.
Questions about any of these changes? Reply to this email or schedule time with us.
