-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose EFS toggle #109
Comments
We may also want to consider setting the helm chart config to add a storage class.
|
For reference, @ntwkninja found an example usage of it here. Note the addition of some supplemental resources (namely, a storage class, and some security group goodness):
|
One last(™️) one..
|
@blancharda, was there a use case you had in mind for adding the EFS endpoint? |
This isn't just the endpoint, it installs the EFS storage driver (as an alternative to EBS) which allows provisioning flexible storage backends and volumes that support RWM mounts -- if I understand correctly, enabling the endpoint would just allow us to access the EFS api from our private VPC without traversing out to the public internet. |
@blancharda Thanks for explaining the endpoint purpose. My understanding (could definitely be flawed) is that because the mount targets point towards the EKS AZs and also because they live in the same VPC the traffic should all stay private/not need to leave the VPC, but I will look into that to verify. |
(Very possible I don't understand the purpose of the endpoint correctly 😆 -- but it seems worth looking into) |
@blancharda, It definitely looks like you are correct about traffic traversing the public internet to reach the efs api without the vpc endpoint . I will go ahead and add that into the branch |
The supporting resources (particularly |
* WIP/base efs configs Signed-off-by: jase koonce <[email protected]> * tested/WIP Signed-off-by: jase koonce <[email protected]> * Add role-duration-seconds to aws creds step in workflow (#121) * fix race condition for destroying manifests and addons (#123) * fix race condition for destroying manifests and addons * delete extra sg configs (#118) * disable dynamoDB for loki, add configs to S3 (#117) * disable dynamoDB for loki, add configs to S3 * removed the count for enabling versioning --------- Co-authored-by: Gabe <[email protected]> * S3 output role arn (#126) * Output for IRSA Role ARN Signed-off-by: Tom Runyon <[email protected]> * refrence resource with count correctly Signed-off-by: Tom Runyon <[email protected]> * refrence resource with count correctly Signed-off-by: Tom Runyon <[email protected]> * precommit updates --------- Signed-off-by: Tom Runyon <[email protected]> Co-authored-by: Gabe <[email protected]> Co-authored-by: Gabe Scarberry <[email protected]> * WIP/base efs configs Signed-off-by: jase koonce <[email protected]> * adding vpc endpoint/randomizing efs names Signed-off-by: jase koonce <[email protected]> * fix race condition for destroying manifests and addons (#123) * fix race condition for destroying manifests and addons * WIP/base efs configs Signed-off-by: jase koonce <[email protected]> * duplicate variables fix/rebase Signed-off-by: jase koonce <[email protected]> * double argument fix Signed-off-by: jase koonce <[email protected]> * test fix Signed-off-by: jase koonce <[email protected]> * Add Provider Plugin Cache to automated testing (#130) * Update eks-addons.tf to fix Ondat issue (#131) * WIP/base efs configs Signed-off-by: jase koonce <[email protected]> * rebase for Ondat fix Signed-off-by: jase koonce <[email protected]> * rebase for Ondat fix Signed-off-by: jase koonce <[email protected]> * pre-commit Signed-off-by: jase koonce <[email protected]> * security group adjustment/tested Signed-off-by: jase koonce <[email protected]> * adding reclaim policy variable to efs storage class Signed-off-by: jase koonce <[email protected]> * pre-commit Signed-off-by: jase koonce <[email protected]> * Set enable efs to true in fixtures.common Signed-off-by: jase koonce <[email protected]> * Pre-commit Signed-off-by: jase koonce <[email protected]> --------- Signed-off-by: jase koonce <[email protected]> Signed-off-by: Tom Runyon <[email protected]> Signed-off-by: JaseKoonce <[email protected]> Signed-off-by: Gabe <[email protected]> Co-authored-by: Andy Roth <[email protected]> Co-authored-by: Zack A <[email protected]> Co-authored-by: Gabe <[email protected]> Co-authored-by: brianrexrode <[email protected]> Co-authored-by: Thomas Runyon <[email protected]> Co-authored-by: Gabe Scarberry <[email protected]>
The upstream blueprint module for EKS addons exposes enable_aws_efs_csi_driver as an input.
It would be nice to be able to toggle it on in our module, similar to EBS.
The text was updated successfully, but these errors were encountered: