-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(eks): attach cluster security group to self-managed nodes #12042
Conversation
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
…dk into epolon/self-managed-cluster-sg
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
… via the `LoadBalancer` service type (#12269) Following this [PR](#12042), self managed nodes are now attached with the cluster security group. This causes the self managed nodes to have multiple security groups with the "owned" tag. This in turn causes load balancers to reject these instances since its unable to determine which security groups should be added with ingress rules to allow the load balancer to connect to the instances. The fix is to exclude tagging the dedicated ASG security group with this tag, it is no longer necessary since the cluster security group has that tag by default. Fixes #12166 This breaksge is unfortunate, but I can't see a way out of it. And it does actually fix a bug. BREAKING CHANGE: Existing self managed nodes may loose the ability to host additional services of type `LoadBalancer` . See #12269 (comment) for possible mitigations. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
… via the `LoadBalancer` service type (aws#12269) Following this [PR](aws#12042), self managed nodes are now attached with the cluster security group. This causes the self managed nodes to have multiple security groups with the "owned" tag. This in turn causes load balancers to reject these instances since its unable to determine which security groups should be added with ingress rules to allow the load balancer to connect to the instances. The fix is to exclude tagging the dedicated ASG security group with this tag, it is no longer necessary since the cluster security group has that tag by default. Fixes aws#12166 This breaksge is unfortunate, but I can't see a way out of it. And it does actually fix a bug. BREAKING CHANGE: Existing self managed nodes may loose the ability to host additional services of type `LoadBalancer` . See aws#12269 (comment) for possible mitigations. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Attaching the EKS managed cluster security group to self managed nodes to allow free traffic flow between managed and self-managed nodes.
Closes #10884
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license