-
Notifications
You must be signed in to change notification settings - Fork 39.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Still unable to manage all SGs outside K8S after PR #49445 #79723
Comments
/sig aws |
Note - I'm not sure if this is related to the aws cloud config, which I can't change as I'm using EKS Add aws cloud config:
|
/sig cloud-provider |
We're also having this issue which makes @Raffo could you please take a look? |
This is also an issue for us, using these service annotations should have been straightforward. A custom security group id used in the Instead, this customer security group gets purged, leaving the port mapping untouched, but all sources become 0.0.0.0/0. |
@uty unfortunately I can't, I don't have access at AWS resources to work on that. To be honest, it was pointed out a number of times that the load balancer code will need a refactor and better tests, I would suggest pinging AWS directly or bringing it up during the |
Suppose you have an existing EKS cluster, gateways, the whole nine yards... Also, suppose you have a custom security group with entries already defined, for example, an SG that holds the rules of your corporate office network ranges, or even customer-specific IPs. You expect, by using this SG id (sg-133780085) in conjunction with this service annotation that:
Gotcha, looks like it doesn't. It's reverted back to 0.0.0.0/0 as the source for all rules. Temporary solution: Run the override script (in our case, assign the serviceAnnotations to the gateway). As of 08/22, this cheap workaround, works. Still needs investigating. |
Any subsequent updates to the cluster, reverts all configurations back to 0.0.0.0/0. EKS was updated from eks.2 to eks.3. Which somehow triggered the changes with istio. |
Hi, It looks I have the same issue. Company policy dictates that all SG's have a specific name. I'm now in the process of getting the correct name. So I created a custom SG "A" which has ingress rules SG "A1" and "A2". I add this with
in the /etc/cloud/cloud.cfg.d location. But I cannot get it to work. I cannot find ( or am probably not able to read correctly) the correct config. Maybe someone can help me out with some pointers? Thanks in advance. |
It's possible to work around this by setting |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
What happened:
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Environment:
kubectl version
): v1.13.7cat /etc/os-release
):uname -a
):The text was updated successfully, but these errors were encountered: