You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It should be attaching the network security group to the nic when it creates the network interface, but I don't think it does that, actually, looking at the code. It looks like the only setting that gets used in the nic create function is the name of the interface.
My temporary solution was to associate the Network Security Group in a Resource Group starting with mc_ which was created for the AKS system node pool directly with the subnet where nodes are created by Karpenter which effectively allowed all VMs in this subnet to use it.
Creting role assignments for the AKS identity or Karpenter Managed identity with Contributor & Network Contributor on the Subnet & the Resource Group starting with mc_ didn't help.
I'm running Kubernetes v1.31.3 + Karpenter 0.7.2 without overlay networking, without cilium & the AKS cluster is a private one with vnet integration enabled.
Version
karpenter image: mcr.microsoft.com/aks/karpenter/controller:0.7.0@sha256:ed567cce316a29729e6c7652c3577f8f253a83ff7b5d065d22c2f737cc8e862c
Client Version: v1.31.3
Kustomize Version: v5.4.2
Server Version: v1.31.1
Expected Behavior
Nodes should have the agentpool security group attached.
Actual Behavior
They don't have the security group attached.
Steps to Reproduce the Problem
Spin up some nodes, inspect the network interfaces.
Resource Specs and Logs
no relevant logs.
Community Note
The text was updated successfully, but these errors were encountered: