Open haorenfsa opened 1 year ago
@haorenfsa, thanks for reporting, this is a bug, and we need to fix it /kind bug /assign
@oliviassss When do you guys expect to fix that?
I think this bug is wider than initially reported. We have an ingress created with 2 SGs, then it was edited for one Ingress instance and one more group added. Now we cannot add new services to it, all other services are unmanegable.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
keep open....
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
keep open....
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
Keep open..
/reopen
@WalterKhumalo: You can't reopen an issue/PR unless you authored it or you are a collaborator.
/reopen
@haorenfsa: Reopened this issue.
em. looks like it's not gonna be solved in a short time. For anyone run into this.
Here's our walk around solution:
we wrote a controller to scan all ingresses in same group. It gathers all the security groups in their annotations, and then use them to update these ingresses.
The deleting ingresses should also be updated until they're gone.
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
/reopen
@haorenfsa: Reopened this issue.
Describe the bug Ingress can not be deleted when securitygroups updated in the meantime by other ingress in the same group
Steps to reproduce
Ingress A
ofingress group A
withsecuritygroup A
;Ingress B
ofingress group A
withsecuritygroup A & B
;Ingress A
Your would see events like this:
Expected outcome A can be deleted
Environment
Additional Context: