-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with Reusing Pre-existing NLB Created via Terraform in Kubernetes Service #3576
Comments
Everything works on version |
We do not support using existing NLB for service now. But we are have a feature soon, You can track it here : #228 TargetGroupBlinding supports Existing ALB/NLB, can you take a look to see if it helps with your case: https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.7/guide/targetgroupbinding/targetgroupbinding/ |
Thanks for a response. You have been supporting this till version Now, when AWS introduced Security Groups for NLB and you changed you Controller to use this feature, you are totally ignoring:
Even adding this:
wont help because AWS Controller is building model with security groups:
Can you on given
|
@wbar, by 1.5.5 I suppose you mean helm chart version. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
It worked! Thanks :) |
Description:
I am encountering an issue when trying to integrate a Kubernetes Service with a pre-existing Network Load Balancer (NLB) that was created via Terraform. Despite correctly tagging the NLB and configuring the Service with the necessary annotations, I receive an error indicating a conflict due to the NLB having "the same name but with different settings". This seems related to the management of Security Groups by the AWS Load Balancer Controller, which has been introduced in a recent feature update for Network Load Balancers.
Environment:
Steps to Reproduce:
Expected Result:
The Kubernetes Service should successfully associate with the pre-created NLB without any conflicts regarding the load balancer's name or settings.
Actual Result:
Received an error message:
This suggests an issue with how the AWS Load Balancer Controller handles existing NLBs, particularly regarding Security Groups settings.
Additional Information:
service.beta.kubernetes.io/aws-load-balancer-security-groups: ""
in an attempt to bypass automatic Security Group management.The text was updated successfully, but these errors were encountered: