-
Notifications
You must be signed in to change notification settings - Fork 318
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS node/instance security group - misuse of cluster tag #27
Comments
Completely agree. Would like to bump this post. We can't use istio nlb ingress with our worker pools that have multiple security groups. |
Looks like the cluster-api-provider-aws has new tags:
I'm still using Kops, but keen to migrate. However, it looks like the cloud-provider still documents the // ResourceLifecycleOwned is the value we use when tagging resources to indicate
// that the resource is considered owned and managed by the cluster,
// and in particular that the lifecycle is tied to the lifecycle of the cluster.
ResourceLifecycleOwned = "owned" Perhaps the intention is that this tag now signifies ownership by the cloud-provider (rather than the cluster)? Would appreciate it if a maintainer could chime in clarifying the situation. |
@Benjamin-Dobell Any updates on this ? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Cross post of k8s issue. Aside: Is there an official policy on where cloud provider issues should be opened?
The AWS cloud provider cluster tag, which defines ownership semantics, is presently being utilised improperly for unrelated purposes. In particular, attempting to identify which instance security groups should be updated to allow inbound load balancer traffic.
This means we (or our controllers) are unable to attach additional security groups to our instances (without "leaking" security group resources).
Please refer to the upstream issue for further details kubernetes/kubernetes#73906
The text was updated successfully, but these errors were encountered: