Open hans72118 opened 1 year ago
I'm trying to troubleshoot a squid proxy that I'm using for my Terraform-created EKS cluster. I want to try and add a nodegroup using eksctl because that's worked for me in other VPCs to get a node group that uses squid, but this validation is blocking me.
We should be able to have whatever rules we want in the outbound rules. This validation is a bit of an over-reach imo.
@matthenry87, we are planning to relax the validation but need some time to give it more thought. The team is occupied with other major deliverables at the moment. If this is a blocker for you, I'd recommend downgrading to an older version in the meantime.
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.
This issue was closed because it has been stalled for 5 days with no activity.
Hello Team,
Are this improvement on this year roadmap?
Please fix this, somehow it deleted my outbound rules from my SG!! Took some time to figure out why my entire Dev cluster was dead.. Had to manually re-add outbound rules for All Traffic on IPv4 and IPv6
Looks like it's NOT fixed in 0.179.0 The workaround is:
This issue has been scoped down and only applies to self-managed nodegroups now. The long term plan might involve adding the SG rules directly via API, instead of using CFN. More context - https://github.com/eksctl-io/eksctl/issues/6455#issuecomment-1697275161
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.
What were you trying to accomplish?
https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html#security-group-restricting-cluster-traffic
What happened?
Related to: https://github.com/eksctl-io/eksctl/issues/6455 https://github.com/eksctl-io/eksctl/pull/7030
After eksctl version 0.157.0, security group rule seems to be validated to have default IPv4 egress rule with
All Traffic
and0.0.0.0/0
. Since a security group created in AWS default has IPv6 and IPv4 egress rule for::/0
and0.0.0.0/0
, we experienced the following error:Where the egress rules
How to reproduce it?
Use a security group with default AWS egress rule as following in
vpc.securityGroup
to create nodegroup.Nodegroup.yaml
Logs
Anything else we need to know?
Versions