-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS VPC endpoint policy for installer-provided VPCs #2486
Comments
s3 api is used for pulling data, so that saves significant money, the rest like ec2, elb don't and there-fore we shouldn't create those. |
They still save money, just not much, right? "Doesn't save enough money" doesn't seem like enough of a reason to drop them, does it? They still help with the blackholed use case, and they still save some money. |
AFAIK ec2, elb VPC endpoints don't save money at all..
It's not about "saving money" _ though eveything kinda is ;)_ but more so the s3 VPC endpoint has very clear/ substantial effect to the users, while other don't in a installer created VPC.
they don't help in installer created VPC case, and user provided subnets they can't be setup. So not seeing how useful they are...? |
From here:
But you'd need a lot of ELB API calls to add up to a significant cost ;).
Ah, fair, you're not going to have an installer-created blackholed use case. You might have a case where a user wanted an installer-created VPC that they twiddled on day two to blackhole the subnets, but they could always add VPC endpoints during that day-2 twiddle. So remaining point is just "is the small amount of money you save by routing ELB API traffic through a free VPC endpoint instead of a cheap NAT gateway worth the trouble of setting up a new resource?". It's a few lines of Terraform, so not much trouble. I dunno if there's an easy way to actually put a number on the cost savings, but I'm fine tabling this until we think one up. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Spun off from #2485. I think we want VPC endpoints in installer-provided VPCs for all services that OpenShift components need (e.g. S3 for the registry, ELB for the cloud provider and ingress operator, etc.). This saves users money, as discussed in #745. It also allows cloud-API access without going through a proxy even from blackholed subnets, as discussed in #2485. Are there any downsides to including these VPC endpoints?
This issues is not discussing VPC endpoints in user-provided VPCs (we can circle back to that once we sort out installer-provided VPCs).
The text was updated successfully, but these errors were encountered: