-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply clusterSecurityGroupTags
to the EKS created primary Cluster Security Group
#1194
Comments
Hi @sanketg86 - I'm not familiar with karpenter and how it does discovery with security group tags, but Is it insufficient for this tags to be within a separate additional security group attached to the EKS cluster? This is how our EKS provider is architected currently since the default security group is created automatically by AWS whenever a new EKS cluster is provision to enable communication between the worker nodes and K8s control plane. There isn't a straightforward way to modify this security group during the |
as EKS cluster security group assigned to AWS manage node and if some workload running on AWS managed nodegroup which assigned EKS cluster security group and some workload running on Karpenter managed nodegroup with different security group, they can not communicate with each other. so I would like to assign same security group to Karpenter nodes which assign to AWS managed nodegroup for that i have to add Karpenter discovery tag to cluster SG. |
Thanks for the additional info here. I'll confer with the team to see if there's a way to resolve this. |
@sanketg86 the primary cluster security group is auto created by EKS itself and not within pulumi. You could tag it like this: const primaryClusterSecurityGroup = cluster.eksCluster.vpcConfig.clusterSecurityGroupId;
new aws.ec2.Tag("exampletagResourceResourceFromEc2tag", {
key: "my-tag",
resourceId: primaryClusterSecurityGroup,
value: "my-value",
}); As an enhancement we could do this for users automatically unless they opt out of it. |
clusterSecurityGroupTags
to the EKS created primary Cluster Security Group
What happened?
When I try to use clusterSecurityGroupTags parameter in eks.cluster package to create cluster and assign some more tags to Cluster security group, it assigned to additional security group.
Example
Output of
pulumi about
Additional context
No response
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: