Skip to content

Commit f07b140

Browse files
authored
Merge pull request #50 from worldcoin/remove-enclave.tools/track-raint
INFRA-5551 Remove second taint
2 parents 9437f4a + d249b12 commit f07b140

File tree

3 files changed

+6
-17
lines changed

3 files changed

+6
-17
lines changed

README.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,7 @@ Once the policy_arn is not specified, the default AmazonEKSAdminPolicy is used.
253253
#### AWS EKS Cluster Policies
254254

255255
Most common used AWS policies for EKS clusters:
256+
256257
- AmazonEKSClusterAdminPolicy: This policy grants administrator access to a cluster and is equivalent to the RBAC cluster-admin role with star permissions on everything.
257258
- AmazonEKSAdminPolicy: This policy is equivalent to the RBAC admin role. It provides broad permissions to resources, typically scoped to a specific namespace. It is somewhat restricted when it comes to modifying namespace configurations or affecting other namespaces. This policy is designed to support namespace-based multi-tenancy. If you want an IAM principal to have a more limited administrative scope, consider using AmazonEKSAdminPolicy instead of AmazonEKSClusterAdminPolicy.
258259
- AmazonEKSEditPolicy: This policy grants access to edit most Kubernetes resources, usually within a specific namespace. It allows reading secrets and editing resources, but it should not serve as a security boundary, as there are several possible privilege escalation paths to AmazonEKSClusterAdminPolicy.
@@ -330,6 +331,7 @@ module "eks" {
330331
```
331332

332333
Each track creates:
334+
333335
- Dedicated ASG with nodes spread across availability zones
334336
- Node labels: `enclave.tools/track=<track_name>`
335337
- Node taints: `enclave.tools/track=<track_name>:NoSchedule`
@@ -345,10 +347,6 @@ tolerations:
345347
- key: "enclave"
346348
operator: "Exists"
347349
effect: "NoExecute"
348-
- key: "enclave.tools/track"
349-
operator: "Equal"
350-
value: "stable"
351-
effect: "NoSchedule"
352350
```
353351
354352
For detailed enclave tracks documentation, see [ENCLAVE_TRACKS.md](./ENCLAVE_TRACKS.md).
@@ -542,9 +540,9 @@ To remove the cluster you have to:
542540

543541
| Name | Source | Version |
544542
|------|--------|---------|
545-
| <a name="module_alb"></a> [alb](#module\_alb) | git@github.com:worldcoin/terraform-aws-alb.git | v0.19.0 |
546-
| <a name="module_datadog_monitoring"></a> [datadog\_monitoring](#module\_datadog\_monitoring) | git@github.com:worldcoin/terraform-datadog-kubernetes | v1.2.2 |
547-
| <a name="module_nlb"></a> [nlb](#module\_nlb) | git@github.com:worldcoin/terraform-aws-nlb.git | v1.1.1 |
543+
| <a name="module_alb"></a> [alb](#module\_alb) | <git@github.com>:worldcoin/terraform-aws-alb.git | v0.19.0 |
544+
| <a name="module_datadog_monitoring"></a> [datadog\_monitoring](#module\_datadog\_monitoring) | <git@github.com>:worldcoin/terraform-datadog-kubernetes | v1.2.2 |
545+
| <a name="module_nlb"></a> [nlb](#module\_nlb) | <git@github.com>:worldcoin/terraform-aws-nlb.git | v1.1.1 |
548546

549547
## Resources
550548

@@ -727,7 +725,7 @@ To remove the cluster you have to:
727725
| <a name="input_use_private_subnets_for_internal_nlb"></a> [use\_private\_subnets\_for\_internal\_nlb](#input\_use\_private\_subnets\_for\_internal\_nlb) | Set to `true` if you want to use private subnets for internal NLB | `bool` | `false` | no |
728726
| <a name="input_vpc_cni_enable_pod_eni"></a> [vpc\_cni\_enable\_pod\_eni](#input\_vpc\_cni\_enable\_pod\_eni) | Enable pod ENI support | `bool` | `true` | no |
729727
| <a name="input_vpc_cni_enable_prefix_delegation"></a> [vpc\_cni\_enable\_prefix\_delegation](#input\_vpc\_cni\_enable\_prefix\_delegation) | Enable prefix delegation for IPv6, allocate IPs in /28 blocks (instead of all at once) | `bool` | `false` | no |
730-
| <a name="input_vpc_cni_external_snat"></a> [vpc\_cni\_external\_snat](#input\_vpc\_cni\_external\_snat) | Needed to enable cross-vpc pod-to-pod communication - see: https://github.com/aws/amazon-vpc-cni-k8s?tab=readme-ov-file#aws_vpc_k8s_cni_externalsnat | `string` | `false` | no |
728+
| <a name="input_vpc_cni_external_snat"></a> [vpc\_cni\_external\_snat](#input\_vpc\_cni\_external\_snat) | Needed to enable cross-vpc pod-to-pod communication - see: <https://github.com/aws/amazon-vpc-cni-k8s?tab=readme-ov-file#aws_vpc_k8s_cni_externalsnat> | `string` | `false` | no |
731729
| <a name="input_vpc_cni_pod_security_group_enforcing_mode"></a> [vpc\_cni\_pod\_security\_group\_enforcing\_mode](#input\_vpc\_cni\_pod\_security\_group\_enforcing\_mode) | Set pod security group enforcing mode | `string` | `"standard"` | no |
732730
| <a name="input_vpc_cni_version_override"></a> [vpc\_cni\_version\_override](#input\_vpc\_cni\_version\_override) | The version of the VPC CNI plugin to use. If not specified, the default version for the cluster version will be used. | `string` | `""` | no |
733731
| <a name="input_vpc_cni_warm_eni_target"></a> [vpc\_cni\_warm\_eni\_target](#input\_vpc\_cni\_warm\_eni\_target) | Number of ENIs to keep warm for each node to speed up pod scheduling | `string` | `"1"` | no |

node-groups-enclave-tracks.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -119,12 +119,6 @@ resource "aws_autoscaling_group" "enclave_track" {
119119
propagate_at_launch = false
120120
}
121121

122-
tag {
123-
key = "k8s.io/cluster-autoscaler/node-template/taint/enclave.tools/track"
124-
value = "${each.value.track_key}:NoSchedule"
125-
propagate_at_launch = false
126-
}
127-
128122
tag {
129123
key = "k8s.io/cluster-autoscaler/node-template/label/intent"
130124
value = "enclave"

templates/userdata-enclave-track.sh.tpl

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,6 @@ spec:
4949
registerWithTaints:
5050
- key: enclave
5151
effect: NoExecute
52-
- key: enclave.tools/track
53-
value: "${enclave_track}"
54-
effect: NoSchedule
5552
flags: # List of kubelet flags
5653
- --node-labels=aws-nitro-enclaves-k8s-dp=enabled,intent=enclave,enclave.tools/track=${enclave_track}
5754

0 commit comments

Comments
 (0)