-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Networking TF: Added EC2 Instance Connect Endpoint (EICE) #526
Conversation
* You may typically want to EICE enabled private network Security Group which can be looked up name `ssh_from_eice`. Add this SG to your VM instance created in private subnet. Then you no longer need public IP to connect to this instance. Just need to do like so. aws ec2-instance-connect ssh --connection-type eice --os-user <ubuntu|ec2-user> --instance-id <i-1234567replace> Or, punch local tunnel like so: aws ec2-instance-connect open-tunnel --instance-id <i-1234567replace> --local-port 2222
Patto, just FYI. I will replace the EICE you created in Dev account awhile ago with the resource from this stack. As EICE is limited to 1 resource per subnet per VPC. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good - good idea
Can we add an EICE for the AG account? I need to spin up a machine there to do some clinical NAGIM analysis - and would prefer it lives in private subnet |
Or will this happen in every account already once deployed? |
ignore me - is already deployed I can see.. |
You may typically want to EICE enabled private network Security Group
which can be looked up name
ssh_from_eice
. Add this SG to your VMinstance created in private subnet. Then you no longer need public IP
to connect to this instance. Just need to do like so.
Or, punch local tunnel like so: