-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] - Fully Private EKS Cluster #136
Comments
@starchx can you specify where specifically private VPC endpoints are needed? Is it Velero for S3 access? Something else? |
Thanks @shapirov103 . The use case is when the customer only allows outbound access via an internal managed proxy server, or no outbound internet access at all. That means the cluster creator lambda and kubectl lambda (from cdk-eks module) will need to be placed inside the customer's VPC. EKS VPC endpoint support is on the roadmap (aws/containers-roadmap#298), so outbound internet is still required via proxy. For the blueprint, I think we can just add the proxy support, e.g. allow customers to specify their own proxy servers. We would need to pass that proxy to environment variables to both lambdas (https://docs.aws.amazon.com/cdk/api/v1/docs/@aws-cdk_aws-eks.Cluster.html#kubectlenvironment) |
This feature may not be needed anymore, thanks to EKS Private Endpoint: aws/containers-roadmap#298 |
This issue has been automatically marked as stale because it has been open 60 days |
This one is commonly required in the financial industry. User may provide proxy server but with strict outbound filtering (e.g. block Github access, which means all the addons need to be hosted within private repos internally).
This requires us to use AWS service VPC endpoint as much as we can and only use proxy when the AWS services that do not support VPC Endpoint (such as EKS service API).
Related to this issue: #49
The text was updated successfully, but these errors were encountered: