@@ -116,31 +116,6 @@ resource "aws_security_group_rule" "controller-cilium-metrics-self" {
116116 self = true
117117}
118118
119- # IANA VXLAN default
120- resource "aws_security_group_rule" "controller-vxlan" {
121- count = var. networking == " flannel" ? 1 : 0
122-
123- security_group_id = aws_security_group. controller . id
124-
125- type = " ingress"
126- protocol = " udp"
127- from_port = 4789
128- to_port = 4789
129- source_security_group_id = aws_security_group. worker . id
130- }
131-
132- resource "aws_security_group_rule" "controller-vxlan-self" {
133- count = var. networking == " flannel" ? 1 : 0
134-
135- security_group_id = aws_security_group. controller . id
136-
137- type = " ingress"
138- protocol = " udp"
139- from_port = 4789
140- to_port = 4789
141- self = true
142- }
143-
144119resource "aws_security_group_rule" "controller-apiserver" {
145120 security_group_id = aws_security_group. controller . id
146121
@@ -152,9 +127,7 @@ resource "aws_security_group_rule" "controller-apiserver" {
152127}
153128
154129# Linux VXLAN default
155- resource "aws_security_group_rule" "controller-linux-vxlan" {
156- count = var. networking == " cilium" ? 1 : 0
157-
130+ resource "aws_security_group_rule" "controller-vxlan" {
158131 security_group_id = aws_security_group. controller . id
159132
160133 type = " ingress"
@@ -164,9 +137,7 @@ resource "aws_security_group_rule" "controller-linux-vxlan" {
164137 source_security_group_id = aws_security_group. worker . id
165138}
166139
167- resource "aws_security_group_rule" "controller-linux-vxlan-self" {
168- count = var. networking == " cilium" ? 1 : 0
169-
140+ resource "aws_security_group_rule" "controller-vxlan-self" {
170141 security_group_id = aws_security_group. controller . id
171142
172143 type = " ingress"
@@ -367,35 +338,8 @@ resource "aws_security_group_rule" "worker-cilium-metrics-self" {
367338 self = true
368339}
369340
370- # IANA VXLAN default
371- resource "aws_security_group_rule" "worker-vxlan" {
372- count = var. networking == " flannel" ? 1 : 0
373-
374- security_group_id = aws_security_group. worker . id
375-
376- type = " ingress"
377- protocol = " udp"
378- from_port = 4789
379- to_port = 4789
380- source_security_group_id = aws_security_group. controller . id
381- }
382-
383- resource "aws_security_group_rule" "worker-vxlan-self" {
384- count = var. networking == " flannel" ? 1 : 0
385-
386- security_group_id = aws_security_group. worker . id
387-
388- type = " ingress"
389- protocol = " udp"
390- from_port = 4789
391- to_port = 4789
392- self = true
393- }
394-
395341# Linux VXLAN default
396- resource "aws_security_group_rule" "worker-linux-vxlan" {
397- count = var. networking == " cilium" ? 1 : 0
398-
342+ resource "aws_security_group_rule" "worker-vxlan" {
399343 security_group_id = aws_security_group. worker . id
400344
401345 type = " ingress"
@@ -405,9 +349,7 @@ resource "aws_security_group_rule" "worker-linux-vxlan" {
405349 source_security_group_id = aws_security_group. controller . id
406350}
407351
408- resource "aws_security_group_rule" "worker-linux-vxlan-self" {
409- count = var. networking == " cilium" ? 1 : 0
410-
352+ resource "aws_security_group_rule" "worker-vxlan-self" {
411353 security_group_id = aws_security_group. worker . id
412354
413355 type = " ingress"
0 commit comments