Skip to content

Commit b2f9656

Browse files
rtripatmicahhausler
authored andcommitted
Allow communication on TCP:443 from EKS Cluster to Worker nodes
This is required since most common plugins which use aggregation layer are deployed as services listening on port 443.
1 parent 72184ce commit b2f9656

File tree

2 files changed

+24
-2
lines changed

2 files changed

+24
-2
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ versions by running `aws s3 ls s3://amazon-eks/cloudformation/`.
6161

6262
| CloudFormation Version | EKS AMI versions |
6363
| ---------------------- | -------------------- |
64-
| 2018-08-21 | amazon-eks-node-v23+ |
64+
| 2018-08-30 | amazon-eks-node-v23+ |
6565

6666
For older versions of the EKS AMI (v20-v22), you can find the CloudFormation
6767
templates in the same bucket under the path `s3://amazon-eks/1.10.3/2018-06-05/`.

amazon-eks-nodegroup.yaml

+23-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
AWSTemplateFormatVersion: '2010-09-09'
3-
Description: 'Amazon EKS - Node Group - Released 2018-08-21'
3+
Description: 'Amazon EKS - Node Group - Released 2018-08-30'
44

55
Parameters:
66

@@ -237,6 +237,28 @@ Resources:
237237
FromPort: 1025
238238
ToPort: 65535
239239

240+
NodeSecurityGroupFromControlPlaneOn443Ingress:
241+
Type: AWS::EC2::SecurityGroupIngress
242+
DependsOn: NodeSecurityGroup
243+
Properties:
244+
Description: Allow pods running extension API servers on port 443 to receive communication from cluster control plane
245+
GroupId: !Ref NodeSecurityGroup
246+
SourceSecurityGroupId: !Ref ClusterControlPlaneSecurityGroup
247+
IpProtocol: tcp
248+
FromPort: 443
249+
ToPort: 443
250+
251+
ControlPlaneEgressToNodeSecurityGroupOn443:
252+
Type: AWS::EC2::SecurityGroupEgress
253+
DependsOn: NodeSecurityGroup
254+
Properties:
255+
Description: Allow the cluster control plane to communicate with pods running extension API servers on port 443
256+
GroupId: !Ref ClusterControlPlaneSecurityGroup
257+
DestinationSecurityGroupId: !Ref NodeSecurityGroup
258+
IpProtocol: tcp
259+
FromPort: 443
260+
ToPort: 443
261+
240262
ClusterControlPlaneSecurityGroupIngress:
241263
Type: AWS::EC2::SecurityGroupIngress
242264
DependsOn: NodeSecurityGroup

0 commit comments

Comments
 (0)