Skip to content

[EKS] [request]: Security Groups per Pod #177

@mike-stewart

Description

@mike-stewart

Tell us about your request

It would be really helpful to be able to assign Security Groups at the pod level, such that other pods on the same node don't share the same SG.

Related issue in the CNI repo: aws/amazon-vpc-cni-k8s#208

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?

Although Network Policies with Calico and friends can provide network segmentation within the cluster, we're missing a straightforward way to control traffic to AWS resources outside of the cluster. For example, I would like to be able to restrict access to RDS instances by referencing the pod SG in the RDS SG.

Authentication (e.g. using IAM roles) can be used in most cases to provide a layer of security, but most compliance requirements also mandate network segmentation or firewall rules as an additional defence in depth step.

Are you currently working around this issue?
My understanding is that the only workaround is to use taints/nodeAffinity to restrict pods to nodes with the right security groups, but this will result in nodes being under scheduled in a multi-tenant cluster. This is less than ideal, as it negates much of the cost benefit of moving a workload into Kubernetes.

Additional context

Attachments

Metadata

Metadata

Assignees

Labels

EKSAmazon Elastic Kubernetes Service

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions