What rules should I add to my custom security group to avoid using the default VPC security group and still pass the health check?

0

I've been experimenting with running containerized services on ECS, utilizing the awsvpc network mode and ALB. However, I've encountered an issue where I have to attach the default VPC security group to the ALB's security group for the health checks to pass. Removing it results in the health checks becoming unhealthy. Therefore, I'm wondering what rules I should add within my custom security group to bypass the need for the default VPC security group while still allowing the health checks to pass.

Additionally, I've observed that when using the bridge networking mode, there's no requirement to include the default VPC security group, and health checks still pass.

I have two questions:

What rules should I add to my custom security group to avoid relying on the default VPC security group and still pass the health check?

Why is it unnecessary to add the default VPC security group when using the bridge networking mode, and the health checks still pass?

2개 답변
0

You will need to add rules to allow inbound traffic on the port that the Application Load Balancer (ALB) is using for health checks. By default this is port TCP/443 or TCP/80 depending on whether you specify HTTPS or HTTP health checks. The security group should allow ingress from the ALB security group on the health check port.

When using the bridge network mode, the containers are placed on the same network as the EC2 host instance. This means the security groups of the EC2 instance apply to the containers as well. Since the default VPC security group is associated with EC2 instances by default, it allows the health checks from the ALB to reach the containers without needing to be explicitly added.

In the awsvpc network mode, each container gets its own elastic network interface and thus its own security group.

profile picture
전문가
답변함 한 달 전
  • Thank you for your response. However, I have already added the following rules to the custom security group of ALB:

    • All traffic from 10.0.0.0/16

    Yet, it seems I still need to add the default VPC security group. Could you kindly advise on what part I might be missing?

0

As Giovanni mentioned, the security group needs to allow ingress from the ALB security group on the health check port.

See if following the documentation guidelines on security group configurations solves your problem here: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-update-security-groups.html

Or allowing the CIDR ranges on the target group IPv4 Addresses: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/target-group-register-targets.html

AWS
답변함 한 달 전
  • Hi,

    Thank you for your response. I've already configured the security group to allow all traffic from the source 10.0.0.0/16, which I believe encompasses both HTTP and HTTPS. Therefore, I'm a bit puzzled if the health check requires its own specific IP or if I might have overlooked something?

    Additionally, it's worth mentioning that simply adding the default VPC security group allows everything to function properly.

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠