-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [request]: Managed Node Groups Custom Userdata support #596
Comments
We have to install certain agents onto EC2 instances for security compliance. This would give us an option to do that on startup without going down the path and headache of managing our own ami. |
This would also allow us to set taints on various nodegroups by passing kubelet arguments, which does not appear to be possible in the current state of nodegroups. |
I’m specifically looking to add taints to nodes, whether via specifying user data or direct api support. |
we have exact same usecase with @atheiman where we need to install agent and configure system level to integrate with our central auth service through PAM for SSH access |
Userdata is the standard, AWS-native way to modify an instance post-launch. We perform a considerable amount of dynamic instance customisation in userdata for things like networking. Baking a custom AMI is the only alternative. |
Also, Userdata is the only current recommended way of "Restricting Access to Amazon EC2 Instance Profile Credentials" (https://docs.aws.amazon.com/eks/latest/userguide/restrict-ec2-credential-access.html ). If you don't do this it leaves your cluster vulnerable by default, allowing any pod using an un-annotated service account (e.g. default) to interfere with ENIs and cluster IPs on the host. |
@tabern any change to get this on the roadmap? |
Also looking for the ability to Explicitly stated here under the Feature parity with unmanaged nodegroups section is: "Control over the node bootstrapping process and customization of the kubelet are not supported. This includes the following fields: maxPodsPerNode, taints, targetGroupARNs, preBootstrapCommands, overrideBootstrapCommand, clusterDNS and kubeletExtraConfig." Exposing the |
This is a big blocker for our usage of node groups. We need to set |
we need the ability to use custom user data to configure http proxy for the docker daemon and kubelet. |
Any update on this feature request ? This is required for our internal security compliance |
Hey guys, |
Hi @MatteoMori, this feature will come as part of #585. We are working on it, but no timeline that I can share right now. |
I also came here looking for a way to add taints to nodegroups, any news? |
System.aws.out.println("¡Ándale, Ándale AWS!") GKE already has the support for this for years... I'm not here to troll. I'm just really pissed off. This is basic security we are talking about... |
We'd need this to be able to configure additional services for logrotation, for example ipamd. |
need add args for bootstrap.sh --kubelet-extra-args , make the node support --allowed-unsafe-sysctls=net.ipv4.* |
@mikestef9 Can you tell when this feature will be released in production? |
Can't give specific dates in this forum, but with that said, I'd highly recommend checking out the AWS container day presentations at Kubecon next week :) |
I also noticed in the CloudFormation release history that https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/ReleaseHistory.html |
Closing as this feature request is addressed by launch template support. See #585 for details! An important note is that user data must in MIME multi-part archive format, as by default, EKS will merge the bootstrapping command required for nodes to join the cluster with your user data. If you use a custom AMI in your launch template, this merging will not happen and you are responsible for nodes joining the cluster. See docs for more details. |
Community Note
Tell us about your request
EKS Managed Node Groups should support adding additional custom user-data and additional bootstrap/kubelet args
Which service(s) is this request for?
EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Are you currently working around this issue?
Old way of launching worker nodes
The text was updated successfully, but these errors were encountered: