-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allowing 443 to nodes from EKS service #148
Allowing 443 to nodes from EKS service #148
Conversation
👍 had been doing this after the fact with module outputs. Any reason not to tighten up the control plan egress rules to match that latest cloud formation as well: Sample:
|
Nice. I think it's reasonable to have this access in place by default.
Sure but what do you mean exactly? In the AWS CFN port 1025-65535 is allowed from EKS service to nodes. And this module is the same? |
Current module uses egress to the internet from control plane by default: |
@mmcaya OK good idea. I'll do that in a separate PR. |
great, thanks! |
Paging @brandoconnor 🙂 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not that you need it but you've got my blessing 🙏
Thanks as always @max-rocket-internet and @mmcaya |
* upstream/master: (25 commits) Update documentation for removed `configure_kubectl_session` (terraform-aws-modules#171) remove the checksum step Add target_group_arns to worker ASG (terraform-aws-modules#167) Removing 2 providers from the module (terraform-aws-modules#168) Removing aws_iam_service_linked_role from module (terraform-aws-modules#160) Adjust the order and correct/update the info (terraform-aws-modules#163) Ruby ver `2.4.2` -> `2.4.4` Move env vars into env section Remove `v` in `v0.11.8` Better version control Add suspended_processes attributes to autoscaling_group (terraform-aws-modules#159) Updating changelog for v1.7.0 (terraform-aws-modules#158) Revert "Add suspended_processes attributes to autoscaling_group (terraform-aws-modules#153)" (terraform-aws-modules#157) Add suspended_processes attributes to autoscaling_group (terraform-aws-modules#153) Add option to change worker placement_tenancy. (terraform-aws-modules#142) Allowing 443 to nodes from EKS service (terraform-aws-modules#148) Fixed issue with 'workers_group_defaults_defaults.iam_role_id' and added explicit depends_on for 'update_config_map_aws_auth' (terraform-aws-modules#147) Added timeout configs and variables to aws_eks_cluster resource (terraform-aws-modules#149) Fixing travis config (terraform-aws-modules#151) Fix for ERROR: 'aws_iam_instance_profile.workers' not found (terraform-aws-modules#141) ...
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
PR o'clock
Description
This allows the EKS cluster service to connect to the nodes on port 443. This is require to run the metrics-server, details here. Metrics-server is required to run horrizontal pod autoscalers.
AWS CFN is here: https://github.com/awslabs/amazon-eks-ami/blob/master/amazon-eks-nodegroup.yaml#L251-L260
Checklist
terraform fmt
andterraform validate
both work from the root andexamples/eks_test_fixture
directories (look in CI for an example)terraform-docs
perREADME.md
instructions