Skip to content

Commit 5d9d4fb

Browse files
Allowing 443 to nodes from EKS service (#148)
1 parent cd7e56c commit 5d9d4fb

File tree

2 files changed

+12
-0
lines changed

2 files changed

+12
-0
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ project adheres to [Semantic Versioning](http://semver.org/).
1212
- A useful addition (slam dunk, @self 🔥)
1313
- Worker groups can be created with a specified IAM profile. (from @laverya)
1414
- exposed `aws_eks_cluster` create and destroy timeouts (by @RGPosadas)
15+
- Allow port 443 from EKS service to nodes to run `metrics-server`. (by @max-rocket-internet)
1516

1617
### Changed
1718

workers.tf

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,17 @@ resource "aws_security_group_rule" "workers_ingress_cluster" {
9090
count = "${var.worker_security_group_id == "" ? 1 : 0}"
9191
}
9292

93+
resource "aws_security_group_rule" "workers_ingress_cluster_https" {
94+
description = "Allow pods running extension API servers on port 443 to receive communication from cluster control plane."
95+
protocol = "tcp"
96+
security_group_id = "${aws_security_group.workers.id}"
97+
source_security_group_id = "${local.cluster_security_group_id}"
98+
from_port = 443
99+
to_port = 443
100+
type = "ingress"
101+
count = "${var.worker_security_group_id == "" ? 1 : 0}"
102+
}
103+
93104
resource "aws_iam_role" "workers" {
94105
name_prefix = "${aws_eks_cluster.this.name}"
95106
assume_role_policy = "${data.aws_iam_policy_document.workers_assume_role_policy.json}"

0 commit comments

Comments
 (0)