diff --git a/tests/integration/update_cluster/bastionadditional_user-data/kubernetes.tf b/tests/integration/update_cluster/bastionadditional_user-data/kubernetes.tf index 2cd9afd8f4ce9..63adfc0561b78 100644 --- a/tests/integration/update_cluster/bastionadditional_user-data/kubernetes.tf +++ b/tests/integration/update_cluster/bastionadditional_user-data/kubernetes.tf @@ -753,12 +753,12 @@ resource "aws_security_group_rule" "node-to-master-tcp-1-2379" { type = "ingress" } -resource "aws_security_group_rule" "node-to-master-tcp-2382-4001" { +resource "aws_security_group_rule" "node-to-master-tcp-2382-4000" { from_port = 2382 protocol = "tcp" security_group_id = aws_security_group.masters-bastionuserdata-example-com.id source_security_group_id = aws_security_group.nodes-bastionuserdata-example-com.id - to_port = 4001 + to_port = 4000 type = "ingress" } diff --git a/tests/integration/update_cluster/privatecalico/cloudformation.json b/tests/integration/update_cluster/privatecalico/cloudformation.json index c9cdba0c12866..54c8fc33409f7 100644 --- a/tests/integration/update_cluster/privatecalico/cloudformation.json +++ b/tests/integration/update_cluster/privatecalico/cloudformation.json @@ -847,7 +847,7 @@ "IpProtocol": "tcp" } }, - "AWSEC2SecurityGroupIngressnodetomastertcp23824001": { + "AWSEC2SecurityGroupIngressnodetomastertcp23824000": { "Type": "AWS::EC2::SecurityGroupIngress", "Properties": { "GroupId": { @@ -857,7 +857,7 @@ "Ref": "AWSEC2SecurityGroupnodesprivatecalicoexamplecom" }, "FromPort": 2382, - "ToPort": 4001, + "ToPort": 4000, "IpProtocol": "tcp" } }, diff --git a/tests/integration/update_cluster/privatecalico/kubernetes.tf b/tests/integration/update_cluster/privatecalico/kubernetes.tf index 98181269a619a..a7f5a59290632 100644 --- a/tests/integration/update_cluster/privatecalico/kubernetes.tf +++ b/tests/integration/update_cluster/privatecalico/kubernetes.tf @@ -752,12 +752,12 @@ resource "aws_security_group_rule" "node-to-master-tcp-1-2379" { type = "ingress" } -resource "aws_security_group_rule" "node-to-master-tcp-2382-4001" { +resource "aws_security_group_rule" "node-to-master-tcp-2382-4000" { from_port = 2382 protocol = "tcp" security_group_id = aws_security_group.masters-privatecalico-example-com.id source_security_group_id = aws_security_group.nodes-privatecalico-example-com.id - to_port = 4001 + to_port = 4000 type = "ingress" }