-
Notifications
You must be signed in to change notification settings - Fork 129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
API Gateway Controller add-on to update cluster SG #312
Comments
We can add this in terraform using. Wonder if this needs to be in this module or sit outside ################################################################################
# Allow flow from VPC Lattice
################################################################################
# Lookup VPC Lattice prefix list IDs
data "aws_ec2_managed_prefix_list" "vpc_lattice" {
name = "com.amazonaws.${local.region}.vpc-lattice"
}
data "aws_ec2_managed_prefix_list" "vpc_lattice_ipv6" {
name = "com.amazonaws.${local.region}.ipv6.vpc-lattice"
}
# Authorize ingress from prefix lists to EKS cluster security group
resource "aws_security_group_rule" "vpc_lattice_ingress" {
security_group_id = module.eks.cluster_primary_security_group_id
prefix_list_ids = [
data.aws_ec2_managed_prefix_list.vpc_lattice.id,
data.aws_ec2_managed_prefix_list.vpc_lattice_ipv6.id
]
type = "ingress"
from_port = 0
to_port = 0
protocol = "-1"
} |
its generally not recommend to modify a Terraform controlled resource from two different locations. I think this is better suited for the user implementation - they would add these prefix list IDs into the the node security group rules (i.e. - here https://github.com/terraform-aws-modules/terraform-aws-eks/blob/ec454c51cb0026254b68cafe7aa9d05f873af990/node_groups.tf#L225) |
Agree, will add this in the pattern for vpc lattice |
This issue has been automatically marked as stale because it has been open 30 days |
Issue closed due to inactivity. |
Community Note
What is the outcome that you are trying to reach?
When deploying the Gateway API controller for VPC Lattice using the eks addon, we still need to manually authorize the EKS cluster Security Group to accept traffic from the VPC Lattice managed prefix IP, if we want to enable vpc lattice to target services inside the cluster.
This is describe in the documentation:
Describe the solution you would like
I would like the add-on to automatically add the rule in the EKS cluster security Group, so that I don't need to manually do it.
Describe alternatives you have considered
manually apply the rule with the previous command.
The text was updated successfully, but these errors were encountered: