-
Couldn't load subscription status.
- Fork 636
✨ Support additional security group ingress rules for all nodes #5224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Support additional security group ingress rules for all nodes #5224
Conversation
|
/test pull-cluster-api-provider-aws-e2e |
1 similar comment
|
/test pull-cluster-api-provider-aws-e2e |
f852a0b to
e223ac7
Compare
|
Rebased onto /test pull-cluster-api-provider-aws-e2e |
|
/test pull-cluster-api-provider-aws-e2e |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
|
/test pull-cluster-api-provider-aws-e2e-eks |
|
Feel free to unhold when the eks e2e passes: /hold |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: richardcase The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/unhold |
…sg-ingress-rules ✨ Support additional security group ingress rules for all nodes
What type of PR is this?
/kind feature
What this PR does / why we need it:
It was already possible to add rules for control plane nodes, but not for all nodes. Example use case: pod network is deployed on separate VPC/ENIs (e.g. via Cilium AWS ENI allocator) and therefore doesn't have the
nodesecurity group which allows access to the kubelet API for metrics-server's scraping – that can now easily be allowed with custom rules.Checklist:
Release note: