-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: SecurityGroupIngressRule / SecurityGroupEgressRules not reconciling and crashing EC2 Pod #1242
Comments
I wanted to call out this behavior also shows up for ManagedPrefixLists and Route. |
@vibe Thanks for the bug report. Anything that causes the provider pod to crash is concerning. Could you provide a bit more detail? In particular, it would be useful to be able to see the output of I'm particularly interested to know what precisely you are doing with
and what you mean by
I think I know what you mean, but a yaml manifest is the most clear way to explain that without any ambiguity. Also, I'm curious to know what happens if you add "either wait for 10 minutes or make some edit to any annotation on the SecurityGroupIngressRule" to your STRs in between recreating the security group and setting the policy to required. I think that might trigger the Finally, please put your yaml manifests in ``` triple backticks, so that github will preserve the whitespace. Otherwise they become very difficult to read. My first impression is that the panic is a bug in the terraform aws provider, but perhaps one that we can avoid triggering through better validation logic. |
the problem here is if someone missing to specify one of referencedSecurityGroupId the provider will crash - i wonder if we can enhance upjet to add some CEL rules an easier version of CEL validation we doing in our reference platform - it will not cover the full combinations of inputs but it would be a good start https://github.com/upbound/configuration-aws-securitygroup/blob/main/apis/definition.yaml#L49
the other issue we can see if policy: always is used for selector/reference the pod crashes |
Is there an existing issue for this?
Affected Resource(s)
ec2.aws.upbound.io/v1beta1 - SecurityGroupIngressRule
ec2.aws.upbound.io/v1beta1 - SecurityGroupEgressRule
ec2.aws.upbound.io/v1beta1 - SecurityGroup
Resource MRs required to reproduce the bug
Steps to Reproduce
Create Security Group
Create SecurityGroupIngressRule
Recreate Security Group (so security id changes)
SecurityGroupIngressRule still points to old id
Update policy to
resolve
always
on ingress ruleEc2 pod crashes
no way out of this other than to delete security group ingress rules.
What happened?
Security Group Rules should get recreated.
SecurityGroupId is also missing from the securitygroupingress rule spec after changing policy to "always". (suspecting this causes the crash)
Relevant Error Output Snippet
Crossplane Version
1.15.1
Provider Version
1.2.1
Kubernetes Version
1.29
Kubernetes Distribution
EKS
Additional Info
No response
The text was updated successfully, but these errors were encountered: