-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(eks): Self managed nodes cannot be added to LoadBalancers created via the LoadBalancer
service type
#12269
Conversation
After applying this fix, the dedicated security group of self managed nodes will no longer be tagged with the "owned" tag.
While this will not cause any immediate disruption, it does pose an operational risk for future service deployments. The proper setup for nodes should be that they are attached with exactly one owned security group. We suggest one of the following approaches to achieve that:
|
LoadBalancer
LoadBalancer
service type
@eladb I failed miserably in trying to get the integ test to deterministically cover this scenario. To make sure its tested properly, we need to force the load balancer to only connect to self-managed nodes, since this is what fails and will cause the service not to be deployed. Supposedly this is done by attaching labels to the nodes (i.e
However, this doesn't seem to work. I'm probably missing something, but I figured its not worth delaying this PR for. I verified the expected behavior manually and we also have a unit test and the current integ test to make sure we don't attach the unnecessary tag. I feel we can merge this. Let me know if you think differently. |
Yeah sounds reasonable |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
… via the `LoadBalancer` service type (aws#12269) Following this [PR](aws#12042), self managed nodes are now attached with the cluster security group. This causes the self managed nodes to have multiple security groups with the "owned" tag. This in turn causes load balancers to reject these instances since its unable to determine which security groups should be added with ingress rules to allow the load balancer to connect to the instances. The fix is to exclude tagging the dedicated ASG security group with this tag, it is no longer necessary since the cluster security group has that tag by default. Fixes aws#12166 This breaksge is unfortunate, but I can't see a way out of it. And it does actually fix a bug. BREAKING CHANGE: Existing self managed nodes may loose the ability to host additional services of type `LoadBalancer` . See aws#12269 (comment) for possible mitigations. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Following this PR, self managed nodes are now attached with the cluster security group. This causes the self managed nodes to have multiple security groups with the "owned" tag. This in turn causes load balancers to reject these instances since its unable to determine which security groups should be added with ingress rules to allow the load balancer to connect to the instances.
The fix is to exclude tagging the dedicated ASG security group with this tag, it is no longer necessary since the cluster security group has that tag by default.
Fixes #12166
This breaksge is unfortunate, but I can't see a way out of it. And it does actually fix a bug.
BREAKING CHANGE: Existing self managed nodes may loose the ability to host additional services of type
LoadBalancer
. See #12269 (comment) for possible mitigations.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license