-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: worker security group handling when worker_create_security_group=false #1461
Conversation
Hello @barryib @max-rocket-internet , I'm hoping to get some reviews on this PR. Please let me know if I should be pinging different person or channel. Thank you for maintaining this project. |
Just hit this as well as #1447. Had to fork the base repo, and everything now works beautifully. Hope this gets merged soon. |
I am having the same issue and this appears to be a direct fix for the problem, would appreciate a speedy merge on this small PR. EDIT: Just want to confirm that my problems were solved by using the source fork for this PR as my source for the module. |
@antonbabenko @bryantbiggs please take a look at this PR if you can. We tested this in our fork of the module, and fix works just as expected. |
This is the only PR preventing us to go back from fork to official module. I can confirm that the fix is actually working and battle-tested. Please, review this 😢 |
Hi @yafanasiev ! I will review it during this week and merge it. Sorry that it takes so long time. |
I couldn't make it to work on an existing cluster created with Error messages are like this:
Could you please try to create a cluster using examples, then apply this PR (add Please update the example, if necessary. |
Thanks for the review @antonbabenko .
I think it makes sense because there gotta be a security group in place before the cluster to work. I also tested with |
Thanks, @sunghospark-calm ! v17.13.0 has been just released. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
PR o'clock
Description
Currently when you enable create_launch_template=true on the nodegroup, it switches from using primary cluster security group to worker security group which can cause various problems.
The first work around attempted was to use cluster_primary_security_group_id as worker_security_group_id, but that caused variable cycle error.
The second workaround was to add the primary security group as worker_additional_security_group_ids, however that causes the ALB ingress controller to fail in AWS because the ingress controller cannot work when there are multiple SG attached to the network interface.
The solution was to delete the unused worker security group, however that causes the failure on launch template creation due to the empty security group id.
This PR cleans up the security groups for launch template if theres an empty string in the list.
There was also a
cluster_private_access_sg_source
rule which was trying to add the worker security group when the worker security group didn't exist, which is fixed in this PR.Checklist