Skip to content

Commit

Permalink
fixing some wording
Browse files Browse the repository at this point in the history
  • Loading branch information
steveruckdashel authored Jan 8, 2018
1 parent ddefd88 commit ce63762
Showing 1 changed file with 6 additions and 3 deletions.
9 changes: 6 additions & 3 deletions docs/cluster_spec.md
Original file line number Diff line number Diff line change
Expand Up @@ -376,6 +376,7 @@ spec:

### cloudConfig

#### disableSecurityGroupIngress
If you are using aws as `cloudProvider`, you can disable authorization of ELB security group to Kubernetes Nodes security group. In other words, it will not add security group rule.
This can be usefull to avoid AWS limit: 50 rules per security group.
```yaml
Expand All @@ -384,10 +385,12 @@ spec:
disableSecurityGroupIngress: true
```
#### WARNING: this works only for Kubernetes version above 1.7.0.
#### elbSecurityGroup
*WARNING: this works only for Kubernetes version above 1.7.0.*
For avoid to create security group per each elb, you can specify security group id, that will be assigned to your LoadBalancer. It must be security group id, not name. Also, security group must be empty, because Kubernetes will add rules per ports that are specified in service file.
This can be usefull to avoid AWS limits: 500 security groups per region and 50 rules per security group.
To avoid creating a security group per elb, you can specify security group id, that will be assigned to your LoadBalancer. It must be security group id, not name.
`api.loadBalancer.additionalSecurityGroups` must be empty, because Kubernetes will add rules per ports that are specified in service file.
This can be useful to avoid AWS limits: 500 security groups per region and 50 rules per security group.

```yaml
spec:
Expand Down

0 comments on commit ce63762

Please sign in to comment.