- 최신
- 최다 투표
- 가장 많은 댓글
Check out this document. You can do it via the console as shown in the document or via the CLI:
aws ec2 describe-network-interfaces --filters Name=group-id,Values=<group-id> --region <region> --output json
Hope this helps
Hello @BigD63
We answered your question in the latest episode of AWS Supports You. Please take a look at the YouTube video here, and we hope it helps answer your question! https://www.youtube.com/watch?v=lzadlmq4LcM
Please don't hesitate to comment here if you have any follow up questions. If this helped to answer your question, please make sure to mark this question as answered.
Have a great day!
This will definitely show you all the resources your security group is associate with aws ec2 describe-network-interfaces --filters Name=group-id,Values=<group-id> --region <region> --output json --query 'NetworkInterfaces'
Hey, does checking into network interfaces cover all cases? or there might be some cases further left and we end up deleting the wrong one. Couple of things on top of my head
- What if a security group is referenced by another security group but not there in a network interface
- What if security group is used by another account?
there might be other cases ,how can we make sure that these cases are also handled or am i just being too much paranoid?
Thanks
관련 콘텐츠
- AWS 공식업데이트됨 2년 전
- AWS 공식업데이트됨 일 년 전
Unfortunately this will only catch resources in the current account, but if you have VPC peering you could have SG in a different account referencing it. You should loop on every account having a peering in fact.