-
Notifications
You must be signed in to change notification settings - Fork 1.8k
OCPBUGS-18027: explain use of multiple AWS security groups #89569
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: enterprise-4.15
Are you sure you want to change the base?
OCPBUGS-18027: explain use of multiple AWS security groups #89569
Conversation
@jeana-redhat: This pull request references Jira Issue OCPBUGS-18027, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@damdo do you remember https://issues.redhat.com/browse/OCPBUGS-11524 from 2023? trying to get some of these bugs outta here this sprint 😅 (https://issues.redhat.com/browse/OCPBUGS-18027 is the corresponding docs bug) Edit: something is messed up with the edge annotations here and is making the build fail. But the new content should be reviewable and I can fix the numbering tomorrow :) |
<7> Optional: Specify one or more additional security groups using the format shown. | ||
When you specify multiple security groups, the rules are merged and applied to the instance as described in link:https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html[{aws-short} documentation about security group rules]. | ||
Refer to {aws-short} documentation for guidance on quotas and other limitations. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I moved some other things around to fix numbering, but this one is the new content
- filters: <7> | ||
- name: tag:Name | ||
values: | ||
- <optional_security_group> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New sample YAML
d585d90
to
99d2f19
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @jeana-redhat thanks for putting this together 👍
I had a look at the bug you linked.
Wouldn't this yield scenario 2 from the testing @sunzhaohua2 conducted here ?
If there are multiple groups and both have the
kubernetes.io/cluster/<infra-id>
tag, this is considered an error state and the CCM will not reconcile the security group rules
@sunzhaohua2 could you provide guidance on this?
Yeah, I am probably not understanding where that tag plays in. I thought by having the value I see
So do I need to somehow relate these things to each other in a way that only one SG gets the |
99d2f19
to
1b9bfb7
Compare
publicIp: true | ||
endif::edge[] | ||
tags: | ||
- name: kubernetes.io/cluster/<infrastructure_id> <1> | ||
tags: <9> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I moved the callout for tags
to the top level to make it easier to talk about this section more generally
ifndef::edge[] | ||
<8> Specify the infrastructure ID and zone. | ||
endif::edge[] | ||
ifdef::edge[] | ||
<8> The ID of the public subnet that you created in AWS {zone-type}. You created this public subnet ID when you finished the procedure for "Creating a subnet in an AWS zone". | ||
endif::edge[] | ||
<9> Optional: Specify custom tag data for your cluster in addition to the existing `kubernetes.io/cluster/<infrastructure_id>` tag. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I changed this from
Optional: Specify custom tag data for your cluster.
to
Optional: Specify custom tag data for your cluster in addition to the existing `kubernetes.io/cluster/<infrastructure_id>` tag.
because I moved the callout from the custom tag name line to the tags
stanza
Refreshed the PR with fixes to the callouts so that it will build correctly |
@jeana-redhat: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@jeana-redhat @damdo I will check this tomorrow |
Thanks! No rush :) |
Hi @jeana-redhat I checked this bug and I tested again on a 4.15 cluster, I can confirm Joel mentioned here are correct.
But regarding the traffic issue mentioned by Dam, I am not sure whether we should mention that multiple SGs are supported in the doc, even though the machine creation was successful and CCM did not report any errors. @damdo, do you have any concerns about this? And for the new versions, by default there are 2 SGs with tags in machineset, the tag is not 4.19.0-0.nightly-2025-03-05-160850 by default:
for 4.15.0-0.nightly-2025-03-05-202732 by default:
|
Hey, thank you! Can you post a spec that shows where these tags are?
I ask because I see one in |
Hi @jeana-redhat I was checked from aws console, for the 2 SGs in machineset, I checked again zhsun-aws37-nrfd5-lb is lb sg, it has tag And I tested again on 4.19, the results are same with before. For this issue |
Version(s):
4.12-4.15
Issue:
OCPBUGS-18027
Link to docs preview:
Sample YAML for a compute machine set custom resource on AWS:
QE review:
Additional information:
Also fixes mixed up callouts