Skip to content

Commit e5d26e1

Browse files
authored
docs: Clarify usage of both AWS-Managed Node Groups and Self-Managed Worker Groups (#1094)
1 parent 6321746 commit e5d26e1

File tree

2 files changed

+21
-0
lines changed

2 files changed

+21
-0
lines changed

docs/faq.md

+6
Original file line numberDiff line numberDiff line change
@@ -197,3 +197,9 @@ Reference the `--node-labels` argument for your version of Kubenetes for the all
197197
`worker_groups` are [self-managed nodes](https://docs.aws.amazon.com/eks/latest/userguide/worker.html) (provisions a typical "Autoscaling group" on EC2). It gives you full control over nodes in the cluster like using custom AMI for the nodes. As AWS says, "with worker groups the customer controls the data plane & AWS controls the control plane".
198198

199199
Both can be used together in the same cluster.
200+
201+
## I'm using both AWS-Managed node groups and Self-Managed worker groups and pods scheduled on a AWS Managed node groups are unable resolve DNS (even communication between pods)
202+
203+
This happen because Core DNS can be scheduled on Self-Managed worker groups and by default, the terraform module doesn't create security group rules to ensure communication between pods schedulled on Self-Managed worker group and AWS-Managed node groups.
204+
205+
You can set `var.worker_create_cluster_primary_security_group_rules` to `true` to create required rules.

examples/managed_node_groups/main.tf

+15
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,21 @@ module "eks" {
112112
}
113113
}
114114

115+
# Create security group rules to allow communication between pods on workers and pods in managed node groups.
116+
# Set this to true if you have AWS-Managed node groups and Self-Managed worker groups.
117+
# See https://github.com/terraform-aws-modules/terraform-aws-eks/issues/1089
118+
119+
# worker_create_cluster_primary_security_group_rules = true
120+
121+
# worker_groups_launch_template = [
122+
# {
123+
# name = "worker-group-1"
124+
# instance_type = "t2.small"
125+
# asg_desired_capacity = 2
126+
# public_ip = true
127+
# }
128+
# ]
129+
115130
map_roles = var.map_roles
116131
map_users = var.map_users
117132
map_accounts = var.map_accounts

0 commit comments

Comments
 (0)