Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EKS] [Feature Request]: Support additional rules and dont limit to 24 rules in network policies. #2481

Open
Akuku25 opened this issue Nov 29, 2024 · 0 comments
Labels
EKS Networking EKS Networking related issues EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue

Comments

@Akuku25
Copy link

Akuku25 commented Nov 29, 2024

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Tell us about your request
Support additional rules and remove the 24 unique ports per protocol per pod selector rule in networkpolicies for vpc-cni

Which service(s) is this request for?
This request is for EKS VPC CNI add-on specifically network policies maximum unique ports limitation per protocol per pod selector

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
As of now, in network policies matching selector, we can add a maximum of 24 rules, and each rule can have port range defined. As an example,
- port: 8080
endPort: 29111
protocol: TCP

similar to above, we can add 24 rules with port range defined for a selector.

If you have more port ranges to be whitelisted for example, if you need to allow few ports in 1000 range, few more in 2000 range and so on, and if we proceed similarly it may exceed 24 ports. Due to limitation of VPC CNI, it may not be achievable as told before. To achive this, we need to allow broder range of ports which is not a best practice.

Are you currently working around this issue?
I'm currently working with port ranges. However, from a security perspective and future requirements, this is not a feasible approach

Additional context
Anything else we should know?
We opened a support ticket with ID 173208198600926

@Akuku25 Akuku25 added the Proposed Community submitted issue label Nov 29, 2024
@mikestef9 mikestef9 added EKS Amazon Elastic Kubernetes Service EKS Networking EKS Networking related issues labels Nov 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EKS Networking EKS Networking related issues EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue
Projects
None yet
Development

No branches or pull requests

2 participants