安全组更新以允许未连接到任何VPC的AWS lambda函数
有两种应用。一个应用程序是通过AWS lambda开发的(帐户A中的存在),另一个应用程序在AWS中的ECS Fargate(帐户B中)中部署。
第一个应用程序(AWS lambda)正在消费API(来自第二个应用程序ECS Fargate)。我需要允许AWS lambda函数通过安全组的入站规则访问ECS应用程序(落后于应用程序负载均衡器)。
问题是AWS lambda均未附加任何VPC,并且两个应用程序都在单独的AWS帐户中运行。如何解决这个问题?
注意:这是一个内部应用程序,而不是互联网面对。
There are two applications. One application is developed through AWS Lambda (present in Account A) and other application is deployed in ECS Fargate (present in Account B) in AWS.
The first application (AWS Lambda) is consuming an API (from the second application ECS Fargate). I need to allow the AWS Lambda function to access the ECS application (which is behind Application Load balancer) through the inbound rule in the security group.
Problem is AWS Lambda is not attached to any VPC and both applications are running in separate AWS accounts. How to solve this problem?
Note: It is an internal application not internet facing.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
如果您的ECS应用程序的负载平衡程序设置为
内部
而不是public
,则未分配给VPC的AWS lambda函数将永远无法访问它。您正在询问安全组规则,但是没有安全组规则可以在Internet上访问未暴露于Internet的资源上的某些内容。进行此工作的唯一选择是将lambda功能移动到VPC中,并在两个VPC之间建立VPC凝视。
If your ECS application's load balancer scheme is set to
internal
instead ofpublic
, then an AWS Lambda function that is not assigned to a VPC would never be able to access it. You are asking about security group rules, but there is no security group rule that will give something on the Internet access to a resource that is not exposed to the Internet.Your only option to make this work is to move the Lambda function into a VPC, and establish VPC peering between the two VPCs.