Closed bd-spl closed 2 years ago
@bd-spl I think you need to play with the vpc-endpoint module, each endpoint can reference a security group. To avoid dependencies loop, the best think would be to use the default vpc security group for endpoints which allowed 0.0.0.0/0 in teks default. And then switch to allow the cluster security group
@bd-spl I'll close this for now, could you please reopen in Discussions as it is not technically tEKS issue
When deploying w/o NAT gateway, what is the expected pattern for giving a list of required VPC endpoints, with EKS cluster security group ID(s) and policies (aws_iam_policy_document) maybe?
To my understanding, endpoints would be the right place to add it there?
FTR, I want to follow that guide to deploy on a private VPC and Fargate workers instead of EC2, so I need the following PrivateLinks (VPC endpoints):
What I couldn't get is, how/should I specify other module inputs for endpoints then: aws_iam_policy_document and security_group, like it is shown in example?
Please confirm if that can be done like that:
cluster_security_group_id = "sg-xxxx"
and settingcreate_cluster_security_group = false