-
Notifications
You must be signed in to change notification settings - Fork 90
Ops Manager Security Group for Private blocks access to AWS #85
Comments
We have created an issue in Pivotal Tracker to manage this. Unfortunately, the Pivotal Tracker project is private so you may be unable to view the contents of the story. The labels on this github issue will be updated when the story is started. |
This is resolved by https://github.com/pivotal-cf/terraforming-aws/pull/86 unless you want to figure out how to only allow traffic to AWS endpoints. |
An alternative that was proposed was to use an internal Interface VPC Endpoint to access the EC2 API: |
As another potential alternative you can get all of the public AWS IP addresses with the following:
Source: https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html |
Had some time today so took a first crack at creating the VPCE using terraform. This works perfectly, and the routes for |
There are some new options that might help this work now: https://bosh.io/jobs/aws_cpi?source=github.com/cloudfoundry/bosh-aws-cpi-release&version=73#p%3daws.region If I get another opportunity, I'll take a crack at it. |
We encountered this issue elsewhere, and the solution was to turn off all the verifiers:
Might be worth checking out again, also related to https://www.pivotaltracker.com/n/projects/803319/stories/162745406 |
https://github.com/pivotal-cf/terraforming-aws/blob/master/modules/ops_manager/security_group.tf#L29
When the ops manager is deployed privately, this egress rule makes it so that the Ops Manager cannot reach AWS itself, causing all of the calls to fail.
The text was updated successfully, but these errors were encountered: