Skip to content

OCPBUGS-85153 AWS custom security groups should address SG quotas#111466

Open
bscott-rh wants to merge 5 commits into
openshift:mainfrom
bscott-rh:OCPBUGS-85153
Open

OCPBUGS-85153 AWS custom security groups should address SG quotas#111466
bscott-rh wants to merge 5 commits into
openshift:mainfrom
bscott-rh:OCPBUGS-85153

Conversation

@bscott-rh
Copy link
Copy Markdown
Contributor

@bscott-rh bscott-rh commented May 8, 2026

Version(s):
4.22

Issue:
https://redhat.atlassian.net/browse/OCPBUGS-85153

Link to docs preview:
Account limits
Optional: Security groups

QE review:

  • QE has approved this change.

This PR also moves some links to Additional Resources to satisfy Vale.

@bscott-rh
Copy link
Copy Markdown
Contributor Author

/retest

@bscott-rh bscott-rh closed this May 11, 2026
@bscott-rh bscott-rh reopened this May 11, 2026
@openshift-ci openshift-ci Bot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label May 11, 2026
Comment thread modules/installation-aws-limits.adoc Outdated
Comment thread modules/installation-aws-security-groups.adoc Outdated
@openshift-ci openshift-ci Bot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels May 11, 2026
Copy link
Copy Markdown
Member

@tthvo tthvo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. I just have some suggestions (nits) :D

Comment thread installing/installing_aws/installing-aws-account.adoc Outdated
Comment thread modules/installation-aws-security-groups.adoc Outdated
Copy link
Copy Markdown
Member

@tthvo tthvo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Looks great from my end 👍

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label May 13, 2026
Copy link
Copy Markdown

@mdeore mdeore left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a few suggestions to improve clarity and understanding.

Comment thread modules/installation-aws-limits.adoc Outdated
|Security Groups on network interfaces
|Varies
|5 per network interface
|By default, {aws-short} allows 5 security groups per network interface. If you are installing a cluster into an existing VPC, and you add 3 or more additional security groups in the `install-config.yaml` file, the installation will fail. The installation will result in a `SecurityGroupsPerInterfaceLimitExceeded` error. You must increase the quota of security groups per network interface to a number equal to `3 + the number of additional security groups`, because the installation program creates 3 security groups for the control plane nodes. The maximum allowed quota is 16.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion:
By default, {aws-short} allows 5 security groups per network interface. If you are installing a cluster into an existing VPC and add 3 or more additional security groups in the install-config.yaml file, the installation completes successfully, but the additional security groups are applied only to compute nodes and not to control plane nodes and resulting in a SecurityGroupsPerInterfaceLimitExceeded error in installation logs. You must increase the quota for security groups per network interface to 3 + the number of additional security groups, because the installation program creates 3 security groups for the control plane nodes and 2 + the number of additional security groups for the compute nodes. The maximum supported quota is 16.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • Stating that the installation will fail is somewhat misleading for customers, because the installation completes successfully; however, the additional security groups are not applied to the control plane nodes.

  • As these security groups are also added to worker nodes, we should also add this 2 + the number of additional security groups information.


[IMPORTANT]
====
By default, {aws-short} allows 5 security groups per network interface. If you are installing a cluster into an existing VPC, and you add 3 or more additional security groups in the `install-config.yaml` file, the installation will fail. The installation will result in a `SecurityGroupsPerInterfaceLimitExceeded` error.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion:
By default, {aws-short} allows 5 security groups per network interface. If you are installing a cluster into an existing VPC and add 3 or more additional security groups in the install-config.yaml file, the installation completes successfully, but the additional security groups are applied only to compute nodes and not to control plane nodes, resulting in a SecurityGroupsPerInterfaceLimitExceeded error in installation logs. You must increase the quota for security groups per network interface to 3 + the number of additional security groups, because the installation program creates 3 security groups for the control plane nodes and 2 + the number of additional security groups for the compute nodes. The maximum supported quota is 16.

@openshift-ci openshift-ci Bot removed the lgtm Indicates that a PR is ready to be merged. label May 19, 2026
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 19, 2026

New changes are detected. LGTM label has been removed.

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 19, 2026

@bscott-rh: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

branch/enterprise-4.22 size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants