-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Add new featuregate to enable/disable SG management #2919
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Welcome @djirik! |
Hi @djirik. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: djirik The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
40b0940
to
224600d
Compare
I'm planning on adding a |
@johngmyers how would it work? and do you have ETA? |
It would look like #2945 except for security groups instead of subnets. I'm completely dependent on code reviews and approvals, so don't have an ETA. Security groups would be fourth on my list because I don't have a need to specify them myself. You could use my PR as a template. |
Hi @johngmyers ! |
Maybe it's worth adding the ability to create a security group for each service with the LoadBalancer type? and add them only to those worker nodes on which the corresponding loads are located? The problem is that now it is very easy to run into two AWS limits:
This is a hard problem in AWS - as these limits are very small ! The problem described above concerns NLB, not ALB! |
The current solution proposed by @djirik will allow turning off the creation of rules by the operator, in this case, ports of 30000+ services are always allowed in the security group and new rules are not added to it, so we do not rest on the limits. |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Issue
We have a lot of services in k8s with type LoadBalancer, and for each of them controller was creating SG in AWS. We've reached the point when quota increase was denied from AWS support. So we decided to disable SG management for controller and switch to static rule which allows 30000-32767 port range to 0.0.0.0/0. Currently it can only be achieved by placing annotation on EACH service in k8s cluster, as our cluster is very big and there are a lot of different charts it is very hard for us. Hence here comes this PR.
#2358
Description
I have added new feature flag
ManageSecurityGroups
which is true by default for backwards compatibility, and in methodbuildManageSecurityGroupRulesFlag
I preserved the ability to use annotations to disable SG management.If you like this feature I will gladly write tests for it and will update the docs accordingly.
Checklist
README.md
, or thedocs
directory)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯