Skip to content
This repository has been archived by the owner on Apr 30, 2021. It is now read-only.

Commit

Permalink
Remove unneeded security group rules
Browse files Browse the repository at this point in the history
These rules are analogous to similar ones defined in the original
nodegroup.yaml cloudformation template.  I deliberately didn't
replicate these rules when introducing the new security group because
`nodes-from-controller` is already covered by `nodes-from-vpc` and
`controller-to-nodes` is covered by `controller-egress`.
  • Loading branch information
philandstuff committed Oct 4, 2019
1 parent 490845a commit 3e76e6e
Showing 1 changed file with 0 additions and 22 deletions.
22 changes: 0 additions & 22 deletions modules/k8s-cluster/security.tf
Original file line number Diff line number Diff line change
Expand Up @@ -109,28 +109,6 @@ resource "aws_security_group_rule" "nodes-from-vpc" {
cidr_blocks = ["${data.aws_vpc.private.cidr_block}"]
}

resource "aws_security_group_rule" "nodes-from-controller" {
security_group_id = "${aws_security_group.node.id}"

type = "ingress"
protocol = "tcp"
from_port = 1025
to_port = 65535

source_security_group_id = "${aws_security_group.controller.id}"
}

resource "aws_security_group_rule" "controller-to-nodes" {
security_group_id = "${aws_security_group.controller.id}"

type = "egress"
protocol = "tcp"
from_port = 1025
to_port = 65535

source_security_group_id = "${aws_security_group.node.id}"
}

resource "aws_security_group_rule" "controller-from-nodes" {
security_group_id = "${aws_security_group.controller.id}"

Expand Down

0 comments on commit 3e76e6e

Please sign in to comment.