Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SNATing for pod IP space to be done only when leaving a private network #44

Closed
k10a opened this issue Mar 2, 2018 · 3 comments
Closed
Milestone

Comments

@k10a
Copy link

k10a commented Mar 2, 2018

Pods in a VPC can talk to:

  1. Internet
  2. Pods or Instances in another VPC that is connected with a VPC peering connection.
  3. Instances or pods in other AWS accounts, but the VPCs involved are part of the same network space and are reachable to each other eg: using architecture like transit-vpc
  4. Resources on prem directly reachable using a private IP space using aws components like Direct Connect Gateway.

SNATing should not be done in cases 2-4.
What IP space should involve NATing should be configurable instead of defaulting to VPC CIDR

natCmd := []string{"!", "-d", vpcCIDR.String(), "-m", "comment", "--comment", "AWS, SNAT",

@incognick
Copy link

Is this being addressed? Currently in the EKS preview I cannot access Pods through a VPC peering connection that are assigned secondary IPs.

@liwenwu-amazon liwenwu-amazon added this to the v1.1 milestone Jun 22, 2018
@liwenwu-amazon
Copy link
Contributor

this should be addressed by PR #81

@incognick
Copy link

incognick commented Sep 19, 2018

@liwenwu-amazon This is still an issue. I have updated to the latest CNI Will use the environment var - AWS_VPC_K8S_CNI_EXTERNALSNAT

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants