Skip to content

Commit c0943cc

Browse files
author
Martin Linkhorst
committed
enable complete worker-to-worker network connectivity
1 parent 2e25569 commit c0943cc

File tree

2 files changed

+3
-60
lines changed

2 files changed

+3
-60
lines changed

cluster/cluster.yaml

Lines changed: 3 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -143,16 +143,6 @@ Resources:
143143
IpProtocol: tcp
144144
SourceSecurityGroupId: !Ref EKSWorkerSecurityGroup
145145
ToPort: 443
146-
{{- if eq .Cluster.ConfigItems.open_sg_for_steadybit "true" }}
147-
EKSWorkerSecurityGroupIngressFromWorkerToWorkerSteadyBit:
148-
Properties:
149-
FromPort: 8085
150-
GroupId: !Ref EKSWorkerSecurityGroup
151-
IpProtocol: tcp
152-
SourceSecurityGroupId: !Ref EKSWorkerSecurityGroup
153-
ToPort: 8087
154-
Type: 'AWS::EC2::SecurityGroupIngress'
155-
{{- end }}
156146
EKSCluster:
157147
Type: AWS::EKS::Cluster
158148
Properties:
@@ -925,56 +915,12 @@ Resources:
925915
SourceSecurityGroupId: !Ref MasterSecurityGroup
926916
ToPort: 10250
927917
Type: 'AWS::EC2::SecurityGroupIngress'
928-
WorkerSecurityGroupIngressFromWorkerToFlannel:
929-
Properties:
930-
FromPort: 8472
931-
GroupId: !Ref WorkerSecurityGroup
932-
IpProtocol: udp
933-
SourceSecurityGroupId: !Ref WorkerSecurityGroup
934-
ToPort: 8472
935-
Type: 'AWS::EC2::SecurityGroupIngress'
936-
WorkerSecurityGroupIngressFromWorkerToWorkerKubeletAndKubeProxy:
937-
Properties:
938-
FromPort: 10249 # KubeProxy
939-
GroupId: !Ref WorkerSecurityGroup
940-
IpProtocol: tcp
941-
SourceSecurityGroupId: !Ref WorkerSecurityGroup
942-
ToPort: 10250 # Kubelet
943-
Type: 'AWS::EC2::SecurityGroupIngress'
944-
{{- if eq .Cluster.ConfigItems.open_sg_for_steadybit "true" }}
945-
WorkerSecurityGroupIngressFromWorkerToWorkerSteadyBit:
946-
Properties:
947-
FromPort: 8085
948-
GroupId: !Ref WorkerSecurityGroup
949-
IpProtocol: tcp
950-
SourceSecurityGroupId: !Ref WorkerSecurityGroup
951-
ToPort: 8087
952-
Type: 'AWS::EC2::SecurityGroupIngress'
953-
{{- end }}
954-
WorkerSecurityGroupIngressFromWorkerToWorkerSkipperMetrics:
955-
Properties:
956-
FromPort: 9911
957-
GroupId: !Ref WorkerSecurityGroup
958-
IpProtocol: tcp
959-
SourceSecurityGroupId: !Ref WorkerSecurityGroup
960-
ToPort: 9911
961-
Type: 'AWS::EC2::SecurityGroupIngress'
962-
WorkerSecurityGroupIngressFromWorkerToWorkerSkipperTokeninfoMetrics:
963-
Properties:
964-
FromPort: 9022
965-
GroupId: !Ref WorkerSecurityGroup
966-
IpProtocol: tcp
967-
SourceSecurityGroupId: !Ref WorkerSecurityGroup
968-
ToPort: 9022
969-
Type: 'AWS::EC2::SecurityGroupIngress'
970-
WorkerSecurityGroupIngressFromWorkerToNodeMonitor:
918+
WorkerSecurityGroupWorkerToWorker:
919+
Type: AWS::EC2::SecurityGroupIngress
971920
Properties:
972-
FromPort: 9100
973-
ToPort: 9101
921+
IpProtocol: "-1"
974922
GroupId: !Ref WorkerSecurityGroup
975-
IpProtocol: tcp
976923
SourceSecurityGroupId: !Ref WorkerSecurityGroup
977-
Type: 'AWS::EC2::SecurityGroupIngress'
978924
EFSSecurityGroupIngressFromWorkerSecurityGroup:
979925
Properties:
980926
FromPort: 2049

cluster/config-defaults.yaml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1129,9 +1129,6 @@ enable_statefulset_autodelete_pvc: "true"
11291129
# Source for the template function: sgIngressRanges: https://github.com/zalando-incubator/cluster-lifecycle-manager/blob/42695865a251fef58e22ce612d6549e75fa5d103/provisioner/template.go#L336-L417
11301130
open_sg_ingress_ranges: ""
11311131

1132-
# open ports 8085-8087 between worker nodes for steadybit components
1133-
open_sg_for_steadybit: "false"
1134-
11351132
# Each subdomain can reach a max of 63 bytes on Route53
11361133
# This custom value sets the subdomain max allowed length taking into consideration the 'cname-' prefix added by external-dns
11371134
subdomain_max_length: "57"

0 commit comments

Comments
 (0)