Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upFix AWS NLB security group updates #68422
Conversation
k8s-ci-robot
added
release-note
size/S
cncf-cla: yes
needs-kind
needs-sig
needs-ok-to-test
labels
Sep 7, 2018
kellycampbell
referenced this pull request
Sep 7, 2018
Merged
Add elasticloadbalancing:DeregisterTargets permission to master policy #5752
k8s-ci-robot
added
sig/cloud-provider
and removed
needs-sig
labels
Sep 7, 2018
k8s-ci-robot
requested review from
chrislovecnm
and
jsafrane
Sep 7, 2018
kellycampbell
referenced this pull request
Sep 7, 2018
Open
AWS Security Group rules are removed when adding/removing worker nodes #64148
This comment has been minimized.
This comment has been minimized.
Really simple test case that reproduced the issue easily for me:
|
This comment has been minimized.
This comment has been minimized.
/sig aws |
k8s-ci-robot
added
sig/aws
kind/bug
and removed
needs-kind
labels
Sep 11, 2018
This comment has been minimized.
This comment has been minimized.
/assign @kris-nova |
k8s-ci-robot
assigned
kris-nova
Sep 26, 2018
This comment has been minimized.
This comment has been minimized.
@kris-nova related to 1.12/1.13 AWS goals: kubernetes/enhancements#423 (comment) |
k8s-ci-robot
added
size/M
and removed
size/S
labels
Oct 7, 2018
This comment has been minimized.
This comment has been minimized.
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
k8s-ci-robot
added
cncf-cla: no
and removed
cncf-cla: yes
labels
Oct 7, 2018
k8s-ci-robot
assigned
geojaz
Oct 10, 2018
k8s-ci-robot
added
the
lgtm
label
Oct 10, 2018
This comment has been minimized.
This comment has been minimized.
/test pull-kubernetes-e2e-kops-aws |
This comment has been minimized.
This comment has been minimized.
What's the procedure with merging this? I see it needs the |
This comment has been minimized.
This comment has been minimized.
acaire
commented
Nov 7, 2018
Thanks @kellycampbell this is great. We're running private clusters in VPCs with multiple CIDRs and the health check ingress rules only factor in the main CIDR, not the CIDR for the relevant target group instances. I'm still stepping through the code to see where the CIDRs originate from, just wanted to give you a heads up as I was hoping to figure out a fix before this is merged. |
k8s-ci-robot
added
the
needs-rebase
label
Nov 10, 2018
kellycampbell
and others
added some commits
Sep 7, 2018
kellycampbell
force-pushed the
kellycampbell:fix-nlb-secgroups
branch
from
3a94c65
to
996c37c
Nov 11, 2018
k8s-ci-robot
removed
the
needs-rebase
label
Nov 11, 2018
This comment has been minimized.
This comment has been minimized.
/label priority/important-soon @micahhausler I'd like to get this bugfix into the v1.13 milestone and release if possible. Also I would like to work on backporting it to 1.12 and 1.11 since NLB doesn't work at all for us without this and we'd like to use one of the features NLB provides. |
This comment has been minimized.
This comment has been minimized.
/assign @d-nishi |
k8s-ci-robot
assigned
d-nishi
Nov 21, 2018
justinsb
reviewed
Nov 28, 2018
} | ||
} else { | ||
if clientTraffic { | ||
klog.V(2).Infof("Removing rule for client MTU discovery from the network load balancer (%s) to instances (%s)", clientCidrs, instanceSecurityGroupID) | ||
klog.V(2).Infof("Removing rule for client traffic from the network load balancer (%s) to instance (%s)", clientCidrs, instanceSecurityGroupID) | ||
klog.V(2).Infof("Removing rule for client traffic from the network load balancer (%s) to instance (%s), port (%v)", clientCidrs, instanceSecurityGroupID, port) | ||
} |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
kellycampbell
Nov 28, 2018
Author
Contributor
Yeah, that looks like it was overlooked in the original code from @micahhausler f9445b9#diff-b390ae3de185e9f13a631a5c07b8f3ffR646
This comment has been minimized.
This comment has been minimized.
/approve |
k8s-ci-robot
added
the
lgtm
label
Nov 28, 2018
This comment has been minimized.
This comment has been minimized.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justinsb, kellycampbell, micahhausler The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
k8s-ci-robot
merged commit 69bab0d
into
kubernetes:master
Nov 29, 2018
18 checks passed
patrickleet
referenced this pull request
Dec 13, 2018
Open
[EKS|kops] [NLB stability]: Fixes for kube-controller not available on EKS yet #62
Jan 9, 2019
This was referenced
added a commit
that referenced
this pull request
Jan 10, 2019
This comment has been minimized.
This comment has been minimized.
brenix
commented
Jan 11, 2019
Did this get cherry-picked to the 1.11 release? I see the cherry-pick for 1.12, but not 1.11. It would be nice if it was as the latest release kops supports is 1.11 |
This comment has been minimized.
This comment has been minimized.
I don't think this has been picked into 1.13 yet either. |
This comment has been minimized.
This comment has been minimized.
d-nishi
commented
Jan 11, 2019
This has not been delivered yet. Slated for 1.14 and is with @M00nF1sh |
This comment has been minimized.
This comment has been minimized.
I didn't see any reason that this cannot be cherry-picked into v1.11 and v1.13, i'll create two PRs for them |
kellycampbell commentedSep 7, 2018
•
edited
This corrects a problem where valid security group ports were removed
unintentionally when updating a service or when node changes occur.
What this PR does / why we need it:
There is a bug in the existing logic that causes valid security group port mappings to be removed incorrectly.
Which issue(s) this PR fixes:
Fixes #60825
Special notes for your reviewer:
This still needs some unit tests. The existing loadbalancer tests are very minimal. Any pointers to how to mock security group actions?
Release note:
Root cause was an assumption that the list of security groups was actually a set.
Here's some psuedo code of the cause: