You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
In the context of NetworkACL, AWS creates 2 default rules (one for ingress, one for egress) for DENY ALL (ruleNumber: 32767).
When creating a NetworkACL ACK object, it will go into the reason multple rules with the same rule number and Egress in the desired spec.
Then, after applying (updating) the object one more time, it will move into the ACK.ResourceSynced status.
Steps to reproduce
Created a simple NetworkACL object with those 2 default rules and an additional ALLOW rule customily defined.
Now, ACK brought all the rules from cloud and it's in the sync state.
If we don't add these 2 default rules in the initial manifest, we can't use it in a GitOps context (eg: ArgoCD), because after ACK will sync the object, it will have these rules
Describe the bug
In the context of
NetworkACL
, AWS creates 2 default rules (one for ingress, one for egress) forDENY ALL
(ruleNumber
: 32767).When creating a
NetworkACL
ACK object, it will go into the reasonmultple rules with the same rule number and Egress in the desired spec
.Then, after applying (updating) the object one more time, it will move into the
ACK.ResourceSynced
status.Steps to reproduce
Created a simple
NetworkACL
object with those 2 default rules and an additionalALLOW
rule customily defined.I applied this object on the cluster
kubectl get networkacls.ec2.services.k8s.aws demo-nacl-test-itaiatu -o yaml
This is how the object looks in the cloud
ACK controller brought those 2 default rules besides those added in the initial spec of the object.
Then, I applied it one more time (update in terms of ACK controller).
The object looks like this now
This is how the object looks in the cloud
Now, ACK brought all the rules from cloud and it's in the sync state.
If we don't add these 2 default rules in the initial manifest, we can't use it in a GitOps context (eg: ArgoCD), because after ACK will sync the object, it will have these rules
And in the manifest, there will be only the custom rule (
ruleNumber
: 100)Expected outcome
We expect that ACK EC2 controller to not add these 2 default rules in the
NetworkACL
's object spec.Environment
The text was updated successfully, but these errors were encountered: