You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What happened:
Our EKS clusters are using public endpoint and the nodes are on public subnet. We've configured security groups for pods in the cluster and have added security group policies CRDs for our pods.
The first issue was with a connection timeout to the sts endpoint. https:://sts.us-west-2.amazonaws.com:443. After having a look at the issue #1796 , I tried adding a VPC endpoint for sts and it started working. The question here is why do I need a VPC endpoint when I am on public network and the security group currently allows all ingress and egress connections.
The cluster and node security groups allow ingress from the pod security groups.
The second part of this issue is that, we need connectivity to a dynamodb in another region us-east-1 from our cluster in us-west-2. This also started throwing timeout issue for us. In this case we cannot add a VPC endpoint as the resource is in another region. I would like to get some clarity on the root cause of this network issue.
The question here is why do I need a VPC endpoint when I am on public network and the security group currently allows all ingress and egress connections.
Does this behavior happen after your enabled security groups for pods (on existing pods)?
Does this happen with new pods or new nodes?
What is your SecurityGroupPolicy and security group rules that demonstrate this behavior?
This issue is now closed. Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
What happened:
Our EKS clusters are using public endpoint and the nodes are on public subnet. We've configured security groups for pods in the cluster and have added security group policies CRDs for our pods.
The first issue was with a connection timeout to the
sts
endpoint.https:://sts.us-west-2.amazonaws.com:443
. After having a look at the issue #1796 , I tried adding a VPC endpoint for sts and it started working. The question here is why do I need a VPC endpoint when I am on public network and the security group currently allows all ingress and egress connections.The cluster and node security groups allow ingress from the pod security groups.
The second part of this issue is that, we need connectivity to a dynamodb in another region
us-east-1
from our cluster inus-west-2
. This also started throwing timeout issue for us. In this case we cannot add a VPC endpoint as the resource is in another region. I would like to get some clarity on the root cause of this network issue.Environment:
kubectl version
):Client Version: v1.29.1
Kustomize Version: v5.0.4-0.20230601165947-6ce0bf390ce3
Server Version: v1.29.3-eks-adc7111
cat /etc/os-release
):uname -a
):The text was updated successfully, but these errors were encountered: