aws-vpc

AWS Application in Private EC2 and HTTP traffic

有些话、适合烂在心里 提交于 2019-12-04 13:40:27
问题 I have an application running in an EC2 instance in a private subnet (to add extra security), receiving traffic directly from an internet-facing NLB that is associated to the public subnet. I have also configured a NAT Gateway in the public subnet so that the private EC2 instance can download whatever needed from the Internet. I have just come out to the next conclusion: If I request from the Internet: http://index.html The private EC2 Instance uses the NAT Gateway to send back the HTTP

AWS Application in Private EC2 and HTTP traffic

一个人想着一个人 提交于 2019-12-03 08:37:24
I have an application running in an EC2 instance in a private subnet (to add extra security), receiving traffic directly from an internet-facing NLB that is associated to the public subnet. I have also configured a NAT Gateway in the public subnet so that the private EC2 instance can download whatever needed from the Internet. I have just come out to the next conclusion: If I request from the Internet: http://index.html The private EC2 Instance uses the NAT Gateway to send back the HTTP response, and therefore you are charged for that NAT processing. https://aws.amazon.com/vpc/pricing/ "Data

VPN clients to resolve private DNS hostnames in AWS [closed]

天大地大妈咪最大 提交于 2019-12-03 03:30:21
Closed. This question is off-topic. It is not currently accepting answers. Learn more . Want to improve this question? Update the question so it's on-topic for Stack Overflow. I've recently setup OpenVPN server on an AWS EC2 instance in order to connect my office to the AWS VPC environment. I'm using TunnelBlick as the VPN client and all is good! I can ssh to the private IPs in the VPC. However, resolving the DNS VPC names from my office hosts( which I could if i'd run it from an EC2 instance in the VPC ) is NOT working. My current solution is to setup a DNS forwarder using Unbound on an EC2