-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: When using Managed NG and Self-Managed NG, the Security Group does not allow Port 53 by default #619
Labels
bug
Something isn't working
Comments
I fixed the issue on my own using additional security group rules below:
|
Hi @darrenlin, this is a known "issue" and is by design in the upstream module. As a security best practice only the ports required are opened. See
|
I think attaching the primary cluster security group will solve this issue Is it possible to add this as a variable of EKS Blueprint module? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Welcome to Amazon EKS Blueprints!
Amazon EKS Blueprints Release version
4.0.9
What is your environment, configuration and the example used?
I tried to create two node groups. One is managed node group, and another is self-managed node group (for local zones and outpost, but they are not required to reproduce the issue).
I am using the example below.
What did you do and What did you see instead?
I found that:
However, the security group rules does not allow UDP 53 data transfer, and will result errors for add-on installations and difficult to debug for new customers.
Additional Information
The security groups and rules are nicely created when I use
eksctl
to create self-managed node groups.No response
The text was updated successfully, but these errors were encountered: