-
Notifications
You must be signed in to change notification settings - Fork 820
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix Network Security Group Gameserver rule not applied on AKS cluster #2124
Fix Network Security Group Gameserver rule not applied on AKS cluster #2124
Conversation
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
@googlebot I signed it! |
We found a Contributor License Agreement for you (the sender of this pull request), but were unable to find agreements for all the commit author(s) or Co-authors. If you authored these, maybe you used a different email address in the git commits than was used to sign the CLA (login here to double check)? If these were authored by someone else, then they will need to sign a CLA as well, and confirm that they're okay with these being contributed to Google. ℹ️ Googlers: Go here for more info. |
Build Succeeded 👏 Build Id: d0cdfe57-5bfe-427e-94fb-8601c641113e The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
@googlebot I signed it! |
We found a Contributor License Agreement for you (the sender of this pull request), but were unable to find agreements for all the commit author(s) or Co-authors. If you authored these, maybe you used a different email address in the git commits than was used to sign the CLA (login here to double check)? If these were authored by someone else, then they will need to sign a CLA as well, and confirm that they're okay with these being contributed to Google. ℹ️ Googlers: Go here for more info. |
@googlebot I signed it! |
e62bfcf
to
3f5a491
Compare
Build Succeeded 👏 Build Id: c4c7dbcc-d720-4b3d-903e-d7e8e726c1ca The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
Build Succeeded 👏 Build Id: cc72d086-9547-49ef-96b2-52ee35ec3eb3 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
…fix-aks-install-terraform
Build Succeeded 👏 Build Id: a27a3d9c-bd99-4d62-8c98-8e85faf0f222 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
@dzmitry-lahoda: changing LGTM is restricted to collaborators In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @aLekSer |
…fix-aks-install-terraform
Build Succeeded 👏 Build Id: 9d53821a-02d9-4e73-8e84-fae7998e59d0 The following development artifacts have been built, and will exist for the next 30 days:
A preview of the website (the last 30 builds are retained): To install this version:
|
when I do this
I can see resources in created cluster. But the code in PR, and directly having name of node pool RG does not shows anything inside, while there are resource. So I have run copy pasted parts of PR, not full PR. |
I made output, without any filters,that group is shown empty.... :*
|
you forgot
|
Type is filter, I checked whole grope - nothing. It is aks 18.19 |
weird. no issue on my side. i have the security group as a member of data resources attribute array. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dzmitry-lahoda, markmandel, WeetA34 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Weird thing. Seems like group name is arbitrary. Like if it is either MC_ or mc_, so get weird artifacts.
Will try to run and see if it works. It is kind of sometimes lower, sometimes not (not the PR issue, but Azure one). |
perhaps depending on the provider version. |
ha, i reread your message. |
what you can do right now to ignore this random case issue is adding a lifecycle ignore_changes block inside the azurerm_network_security_rule resource:
|
let me test new version. |
with a new version it will be the same i guess. |
Used 2.62. Replaced with 2.65. I will rerun script couple of times within month and check (script is not above, but my local modification for windows cluster). |
Can you perform terraform plan with different azurerm version to see if it's random or related to a provider version? |
created in 2.62, applied in 2.65:
Seems ignore will help |
Ok. It seems forcing resource_group_name to lowercase is no more needed. |
i created a new cluster and encountered your previous issue with data security groups which returned no resources.
-->
Without the lowercase
-->
|
hummm weird |
regarding the security group rule with provider 2.65.0, resource_group_name has been saved in lowercase so when i apply again, it wants to recreate the security group rule
|
hello @dzmitry-lahoda, |
Sure, will check PR branch, so started from master
|
Hello, |
Sure, just to check that. On second attempt to run again, master passed well. No changes, just retried after some time. So kube_config is now
Switching to branch. |
let's continue discussion on PR2165 |
@WeetA34 used this for reference of hash https://github.com/Azure/aks-engine/blob/master/pkg/api/types.go#L1014-L1030 |
/kind cleanup
What this PR does / Why we need it:
Hello
This PR fixes AKS gameserver network security rule not added to the effective AKS node pool network security group.
AKS install terraform included a network security group and two network security rules which were not used.
This PR follows AKS create cluster documentation by adding the incoming gameserver security rule to the aks-agentpool-******-nsg network security group
Regards