Skip to content
This repository has been archived by the owner on Oct 22, 2024. It is now read-only.

Determine the security group configuration for the default router's AWS LoadBalancer #8

Open
mjlshen opened this issue Dec 7, 2022 · 0 comments · May be fixed by #16
Open

Determine the security group configuration for the default router's AWS LoadBalancer #8

mjlshen opened this issue Dec 7, 2022 · 0 comments · May be fixed by #16
Assignees

Comments

@mjlshen
Copy link
Owner

mjlshen commented Dec 7, 2022

For non-PrivateLink clusters, the security group of the default router's AWS Load Balancer must have these rules exactly. Investigation is needed to determine if this is also the case for PrivateLink clusters.

        "securityGroupRuleSet": {
            "items": [
                {
                    "isEgress": false,
                    "ipProtocol": "tcp",
                    "fromPort": 80,
                    "toPort": 80,
                    "cidrIpv4": "0.0.0.0/0"
                },
                {
                    "isEgress": false,
                    "ipProtocol": "tcp",
                    "fromPort": 443,
                    "toPort": 443,
                    "cidrIpv4": "0.0.0.0/0"
                },
                {
                    "isEgress": false,
                    "ipProtocol": "icmp",
                    "fromPort": 3,
                    "toPort": 4,
                    "cidrIpv4": "0.0.0.0/0"
                }
            ]
        }
@mjlshen mjlshen self-assigned this Dec 11, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant