-
Notifications
You must be signed in to change notification settings - Fork 1.6k
feat: Introduce annotation for setting explicit egress CIDR ranges on Service LB frontend security group #4348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
The committers listed above are authorized under a signed CLA. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: mtweten The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @mtweten! |
Hi @mtweten. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
… Service LB frontend security group
2edf5e6
to
c7cbffb
Compare
/ok-to-test |
Issue
Description
This PR implements a new annotation (
service.beta.kubernetes.io/aws-load-balancer-outbound-cidrs
) for Service load balancers to enable explicitly specifying a list of CIDR ranges to be added as egress rules to managed frontend security groups.Currently,
aws-load-balancer-controller
doesn't set any explicit egress rules during SG creation, relying instead on AWS to create a default all-protocol0.0.0.0/0
rule when no explicit egress rules are specified during SG creation. This egress rule is necessary for health checks on target groups, etc.However, some organizations may have security scans that trigger on this
0.0.0.0/0
rule, and it would be desirable to be able to scope that down to a specific set of CIDR ranges instead (e.g. the VPC CIDR, for example). There is currently no mechanism inaws-load-balancer-controller
to allow setting this, so that is what this is intended to provide.Note that this only implements this for the Service load balancer (e.g. nlb) workflow. I wanted to keep the PR more narrowly scoped, but it would probably relatively simple to implement for other workflows as well. There is also the
backend
SG where a command flag would need to be introduced, but it's easy enough just to use a statically created SG for the backend SG using the existing mechanisms instead.Checklist
README.md
, or thedocs
directory)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯