无法通过客户VPN连接到AWS ALB
我正在创建staging
使用aws
,我希望仅通过vpn
才能访问。
ENV是使用Fargate创建的。
我有:
- 1
前LB
连接到几个前部任务。 - 1
Back LB
连接到几个后退任务。
我创建了VPN客户端端点。
我可以连接到VPN和SSH,以与我的正面和后LB相同的安全组中的实例。
但是由于某种原因,我使用其 albs 无法使用其 dns名称或在路线53 记录。
我是否错过了应该配置DNS通过VPN在AWS上工作的东西?
我希望这足够详细,谢谢。
I am creating a staging
env using AWS
and i want it to be accessible through VPN
only.
The env was created using Fargate.
I have:
- 1
front lb
connected to several front tasks. - 1
back lb
connected to several back tasks.
I created the VPN client endpoint.
I can connect to the VPN and ssh to instances in the same security group as my front and back lb. (I tried to start an ec2 instance with the same security group and it works).
But for some reason i am unable to connect to the albs using their dns name or the name used in the route 53 record.
Did i miss something that should be configured for dns to work on aws ressources through the VPN?
I hope this was detailed enough, Thanks in advance.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
听起来您创建了一个面向互联网的公众。要使ALB在VPC内部(仅在VPC中)进行内部工作,您需要创建一个内部ALB。
请参阅文档< /a>。
It sounds like you created a public, Internet-facing ALB. For the ALB to work internally in the VPC (and only in the VPC), you need to create an internal ALB.
See the "Scheme" setting in the documentation.