You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. What kops version are you running? The command kops version, will display
this information.
1.19.0-beta.3
1. What Kubernetes version are you running? kubectl version will print the
version if a cluster is running or provide the Kubernetes version specified as
a kops flag.
Inspect the resulting ASG launch templates using the aws tool or the AWS Web console
1. What happened after the commands executed?
The security group nominated by its ID in the "spec.api.loadBalancer.additionalSecurityGroups" Cluster manifest is applied to all the ASGs involved in the cluster: master machines, worker machines, and bastion machines.
1. What did you expect to happen?
The security group nominated by its ID in the "spec.api.loadBalancer.additionalSecurityGroups" Cluster manifest should be applied to only the ASGs involved in hosting the cluster's API servers: namely, the master machines. Neither the worker machines nor the bastion machines should use this security group.
1. What
kops
version are you running? The commandkops version
, will displaythis information.
1.19.0-beta.3
1. What Kubernetes version are you running?
kubectl version
will print theversion if a cluster is running or provide the Kubernetes version specified as
a
kops
flag.version.Info{Major:"1", Minor:"19", GitVersion:"v1.19.4", GitCommit:"d360454c9bcd1634cf4cc52d1867af5491dc9c5f", GitTreeState:"clean", BuildDate:"2020-11-11T13:09:17Z", GoVersion:"go1.15.2", Compiler:"gc", Platform:"linux/amd64"}
3. What cloud provider are you using?
AWS
4. What commands did you run? What is the simplest way to reproduce this issue?
Set this to "Network"
Include at least one security group ID here.
1. What happened after the commands executed?
The security group nominated by its ID in the "spec.api.loadBalancer.additionalSecurityGroups" Cluster manifest is applied to all the ASGs involved in the cluster: master machines, worker machines, and bastion machines.
1. What did you expect to happen?
The security group nominated by its ID in the "spec.api.loadBalancer.additionalSecurityGroups" Cluster manifest should be applied to only the ASGs involved in hosting the cluster's API servers: namely, the master machines. Neither the worker machines nor the bastion machines should use this security group.
1. Anything else do we need to know?
This topic came up in discussion in the "kops-users" channel of the "Kubernetes" Slack workspace. There, @rifelpet noted that the defect lies in the
(*AutoscalingGroupModelBuilder).buildLaunchConfigurationTask
method, where it builds up the security group-related configuration for ASGs in clusters using an NLB in front of the API servers. It looks like we should skip that step if the target InstanceGroup role is not "Master."The text was updated successfully, but these errors were encountered: