-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Don't tag self managed node security group with kubernetes.io/cluster tag #1774
Conversation
I think the alternative here would be to not let the self managed node group create a security group, and instead supply your own security group |
That's fine, but right now the created security group for self managed nodes is unusable since it results in multiple tagged security groups. It can be worked around, but we should probably fix (or remove) the functionality that isn't working correctly. |
@daroga0002 thoughts? |
@imdevin567 could you pass here problematic module configuration which is solved by this PR? |
Sure thing.
This creates two problematic security groups:
Both security groups are attached to the self managed nodes, which causes the following error when trying to create LoadBalacer resources:
|
@@ -459,10 +459,6 @@ resource "aws_security_group" "this" { | |||
|
|||
tags = merge( | |||
var.tags, | |||
{ | |||
"Name" = local.security_group_name |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please add back in the "Name"
tag, then we should be good to go with this one
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be all set now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@antonbabenko good to go 👍🏽 - we might see an issue pop up since its removing a tag, but it is the right move to remove it and let user opt in to when and where they want to use that tag
### [18.2.7](v18.2.6...v18.2.7) (2022-02-02) ### Bug Fixes * Don't tag self managed node security group with kubernetes.io/cluster tag ([#1774](#1774)) ([a638e4a](a638e4a))
This PR is included in version 18.2.7 🎉 |
### [18.2.7](terraform-aws-modules/terraform-aws-eks@v18.2.6...v18.2.7) (2022-02-02) ### Bug Fixes * Don't tag self managed node security group with kubernetes.io/cluster tag ([#1774](terraform-aws-modules/terraform-aws-eks#1774)) ([e3cc25e](terraform-aws-modules/terraform-aws-eks@e3cc25e))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
This removes the forced kubernetes.io/cluster tag in self managed node security groups in favor of the user supplying it themselves.
Motivation and Context
We currently tag the created node security group with the
kubernetes.io/cluster/clustername = owned
tag. We are also tagging the self managed node security group with the same tag, which causes a conflict launching load balancers:Since we don't add this tag to the EKS managed node security group, this will ensure consistency among node groups.
Breaking Changes
No breaking change
How Has This Been Tested?
examples/*
projects