Skip to content
This repository has been archived by the owner on Sep 16, 2020. It is now read-only.

Allow all outbound traffic no matter what #86

Closed
wants to merge 1 commit into from

Conversation

voor
Copy link
Contributor

@voor voor commented Nov 14, 2018

This should resolve https://github.com/pivotal-cf/terraforming-aws/issues/85 by allowing outbound traffic even when ops manager is on a private subnet.

@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this. Unfortunately, the Pivotal Tracker project is private so you may be unable to view the contents of the story.

The labels on this github issue will be updated when the story is started.

@cdutra
Copy link
Contributor

cdutra commented Nov 14, 2018

@voor This PR removes a feature to not allow connections outside the vpc. Why is that?

@voor
Copy link
Contributor Author

voor commented Nov 14, 2018

You are correct, this does not allow connections outside the VPC. It also does not allow connections to AWS API endpoints, therefore all Bosh CPI calls fail.

@cdutra
Copy link
Contributor

cdutra commented Nov 14, 2018

We should fix the feature not remove it. On that, I don't know if there's a easy way to fix

@voor
Copy link
Contributor Author

voor commented Dec 7, 2018

Closing this PR, issue still remains open at https://github.com/pivotal-cf/terraforming-aws/issues/85 just this isn't the best way to fix this.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Ops Manager Security Group for Private blocks access to AWS
3 participants