Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Requested features, general updates #110

Merged
merged 1 commit into from
Mar 2, 2022
Merged

Requested features, general updates #110

merged 1 commit into from
Mar 2, 2022

Conversation

Nuru
Copy link
Contributor

@Nuru Nuru commented Mar 2, 2022

what && why

Combine feature requests, bug fixes, and general updates into a single PR to reduce number of releases and also expedite requested changes to PRs.

@Nuru Nuru requested review from a team as code owners March 2, 2022 09:04
@Nuru Nuru added bugfix Change that restores intended behavior enhancement New feature or request labels Mar 2, 2022
@Nuru
Copy link
Contributor Author

Nuru commented Mar 2, 2022

/test all

Copy link
Member

@korenyoni korenyoni left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM but minor comment on use of the depends_on meta-attribute

@@ -162,7 +162,7 @@ module "eks_node_group" {

# Ensure ordering of resource creation to eliminate the race conditions when applying the Kubernetes Auth ConfigMap.
# Do not create Node Group before the EKS cluster is created and the `aws-auth` Kubernetes ConfigMap is applied.
depends_on = [module.eks_cluster.kubernetes_config_map_id]
depends_on = [module.eks_cluster, module.eks_cluster.kubernetes_config_map_id]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would think depends_on = [module.eks_cluster.kubernetes_config_map_id] implies depends_on = [module.eks_cluster], no?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would expect that you are right, but I did not want to spend the time to test it, and I ran into problems with the previous version.

from_port = 0
to_port = 65535
protocol = "tcp"
description = "Allow SSH egress"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we do we call it "SSH egress" if all the ports are open?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is called "SSH egress" because the ports are only open to destinations from which SSH ingress is allowed.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know this is an old PR, but I'm looking back on this and curious why the ssh egress rule was needed given SecurityGroups are stateful

Copy link
Member

@aknysh aknysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please see comments

@Nuru Nuru merged commit 5641f58 into master Mar 2, 2022
@Nuru Nuru deleted the maintenance branch March 2, 2022 18:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bugfix Change that restores intended behavior enhancement New feature or request
Projects
None yet
5 participants