-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Enables providing multiple tags for worker node security group discovery #3147
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enables providing multiple tags for worker node security group discovery #3147
Conversation
…lancer-controller into abitrary-tags-for-nlb-sg
…aws-load-balancer-controller into abitrary-tags-for-nlb-sg
Welcome @carflo! |
Hi @carflo. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
:) Really looking forward to this PR! |
Looking forward to this much needed functionality! |
Any update on this PR? |
@kishorj @johngmyers is there anything else I can do to get a review from you folks? Thanks in advance 🙇 |
It's in my queue |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The TargetGroupBinding reconciler is not an area I'm overly familiar with, so I'm learning as I go.
The name of the flag doesn't say much about what it does:
- "endpoint" is ambiguous. Perhaps use something more like
target-eni-security-group-tags
- This is documented in the section specific to
Service
s and the description suggests that it is not relevant toIngress
es. I haven't yet found where in the code this gets bypassed for the ALB case. If it is specific toService
, then the flag name should start withservice-
.
/ok-to-test |
left some minor comments. this seems an alternative solution to #2367, but requires more manual intervention(extra tags on SGs). I'm good with this change as a temporary solution and it works for customers that only want one SG to be modified. |
/retest |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
Thanks for making this contribution :D
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: carflo, M00nF1sh The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## main #3147 +/- ##
==========================================
+ Coverage 54.70% 55.78% +1.08%
==========================================
Files 148 149 +1
Lines 8590 8830 +240
==========================================
+ Hits 4699 4926 +227
- Misses 3559 3566 +7
- Partials 332 338 +6
☔ View full report in Codecov by Sentry. |
Issue
#2367
Description
--service-target-eni-security-group-tags
to allow users to specify additional tags that should be used when the controller looks for the security group to use when adding ingress rules for NLB targets. This addresses the limitation called out in the documentation here.Example: Using
--service-target-eni-security-group-tags=Name=aws-lbc-nlb-sg
will look for a security group that has the requiredkubernetes.io/cluster/${cluster-name}
tag AND aName=aws-lbc-nlb-sg
tag.Other:
Checklist
README.md
, or thedocs
directory)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯