Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Option to skip creating node and cluster security groups #747

Closed
vinay-kosaraju opened this issue Jul 26, 2022 · 5 comments
Closed

Option to skip creating node and cluster security groups #747

vinay-kosaraju opened this issue Jul 26, 2022 · 5 comments
Assignees
Labels
impact/breaking Fixing this issue will require a breaking change kind/enhancement Improvements or new features resolution/fixed This issue was fixed

Comments

@vinay-kosaraju
Copy link

Hello!

  • Vote on this issue by adding a 👍 reaction
  • If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)

Issue details

Currently, it looks like node security group and cluster security group with default ingress and egress rules are created if they are not specified in the cluster args.

Could we please get an option to skip creation of the security groups and let EKS create the security group with default rules? (https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html)

@vinay-kosaraju vinay-kosaraju added kind/enhancement Improvements or new features needs-triage Needs attention from the triage team labels Jul 26, 2022
@viveklak viveklak removed the needs-triage Needs attention from the triage team label Jul 27, 2022
@viveklak
Copy link
Contributor

@roothorp could you take a look and prioritize accordingly?

@t0yv0
Copy link
Member

t0yv0 commented Sep 9, 2024

NOTE: skipDefaultNodeGroup should be implied by skipping security group.

@mjeffryes mjeffryes added this to the 0.110 milestone Sep 12, 2024
@t0yv0 t0yv0 added the impact/breaking Fixing this issue will require a breaking change label Sep 16, 2024
@t0yv0
Copy link
Member

t0yv0 commented Sep 16, 2024

Quick update, apologies for the further delay but we decided to defer this item until the upcoming major release of the provider. It appears that the current signature implies that the eks.Cluster resource must return non-optional Node Security Group and Cluster Ingress rule. Making these optional is a technically breaking change, and we considered sending some sentinel values but decided against it for the moment.

IN the upcoming major release the default NodeGroup is going to be removed; the default behavior will use a ManagedNodeGroup but there will be a way to opt out of it. We will need to revisit these settings in the new context, likely will be either removed or moved optional for special cases and not used by default.

We will track this item and follow up as part of the major release work.

@cleverguy25
Copy link

Added to epic https://github.com/pulumi/home/issues/3558

@t0yv0 t0yv0 removed their assignment Sep 27, 2024
@mjeffryes mjeffryes removed this from the 0.110 milestone Oct 2, 2024
flostadler added a commit that referenced this issue Oct 3, 2024
Pulumi EKS currently always creates a cluster security group and node
security group.
- The cluster security group gets assigned to the control plane ENIs in
addition to the security group EKS creates (see [AWS
Docs](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html)).
This security group gets an ingress rule from the node security group.
- The node security group gets assigned to `NodeGroup` and `NodeGroupV2`
components that do not specify a custom security group.

Users that either manage the node security themselves or use the
`ManagedNodeGroup` component (uses the EKS created SG) do not need those
default security groups.

This change adds a flag on the cluster (`skipDefaultSecurityGroups`)
that will skip creating those default security groups. Instead.

This introduces a small breaking change, the `clusterSecurityGroup`,
`nodeSecurityGroup` and `clusterIngressRule` outputs are now optional.
The impact of this should be minimal because users that create custom
node groups usually do not use the security groups of the cluster for
that. If they do, they need to add a null check.

Fixes #747
@flostadler
Copy link
Contributor

We've addressed this as part of #1416. This will be released with EKS v3

@flostadler flostadler self-assigned this Oct 4, 2024
flostadler added a commit that referenced this issue Oct 17, 2024
Pulumi EKS currently always creates a cluster security group and node
security group.
- The cluster security group gets assigned to the control plane ENIs in
addition to the security group EKS creates (see [AWS
Docs](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html)).
This security group gets an ingress rule from the node security group.
- The node security group gets assigned to `NodeGroup` and `NodeGroupV2`
components that do not specify a custom security group.

Users that either manage the node security themselves or use the
`ManagedNodeGroup` component (uses the EKS created SG) do not need those
default security groups.

This change adds a flag on the cluster (`skipDefaultSecurityGroups`)
that will skip creating those default security groups. Instead.

This introduces a small breaking change, the `clusterSecurityGroup`,
`nodeSecurityGroup` and `clusterIngressRule` outputs are now optional.
The impact of this should be minimal because users that create custom
node groups usually do not use the security groups of the cluster for
that. If they do, they need to add a null check.

Fixes #747
@pulumi-bot pulumi-bot added the resolution/fixed This issue was fixed label Oct 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
impact/breaking Fixing this issue will require a breaking change kind/enhancement Improvements or new features resolution/fixed This issue was fixed
Projects
Status: Done
Development

No branches or pull requests

8 participants