[aws-eks] Expose Security Group created by EKS cluster #8236
Labels
@aws-cdk/aws-eks
Related to Amazon Elastic Kubernetes Service
effort/small
Small work item – less than a day of effort
feature-request
A feature should be added or improved.
As described by EKS security groups considerations documentation, the cluster automatically creates a security group where every node is assigned. Based on documentation here, it is being exposed by CloudFormation as a resource attribute.
Unfortunately, CDK does not expose the
ClusterSecurityGroupId
neither with custom resource (when kubectl enabled) nor with native CloudFormation resource.Use Case
This feature is needed if you need to explicit allow traffic to/from another security group.
Proposed Solution
I have not been able to find a workaround whenever running the custom resource that creates the EKS cluster. But I will work on a PR that will have the EKS Cluster construct expose
ClusterSecurityGroupId
andEncryptionConfigKeyArn
attributes for both custom resource and CloudFormation option.Environment
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered: