[EKS] [request]: branch ENI tagging - SG for PODs #2206
Labels
EKS Networking
EKS Networking related issues
EKS
Amazon Elastic Kubernetes Service
Proposed
Community submitted issue
Community Note
Tell us about your request
When using SG for PODS, an ENI gets attached to each POD.
AWS Network Firewall supports tag-based filtering with ENIs as resources.
This request is to enable ENI tagging by the VPC CNI by the use of annotations so that AWS Network Firewall can leverage those to filter traffic.
Tags could be things like:
Which service(s) is this request for?
This could be EKS with VPC CNI
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Customers would like the ability to create outbound L7 filtering policies based on which pod(s) they are originated from.
i.e. I would like pods from a certain deployment to only be able to do HTTPs towards a specific URL.
Today VPC CNI does not allow that (not in the
NetworkPolicy
K8s spec. The use of different CNIs (i.e. Cilium) has significant challenges and does not support security-groups per pod.Are you currently working around this issue?
We are not.
Attachments
Original issue: aws/amazon-vpc-resource-controller-k8s#333
The text was updated successfully, but these errors were encountered: