Can I access RDS and elasticache redis through AWS fargate task role?

0

I tried to access the aws service rds and elasticache redis through fargate's task role.

I connected the full access of the service to the task role, but it was not connected, so I allowed the subnet with the security group setting, and the connection was possible.

Is it possible to access only after setting the original role and security group?

Or did I not set the role properly?

1개 답변
0

Hi AWS-User-3005727,

If I understood your question correctly, it's if you can enable access to RDS from a Fargate task without modifying the RDS Security Group?

Supposing that's your quesiton, the answer would be NO, since RDS is always protected by a Security Group, there is no way any Fargate task role, by itself, can bypass that security group.

Enter image description here

What you could do (but I wouldn't recommend it from a Security Standpoint) is in the RDS Security group add a rule to Allow all Inbound from your Private Subnet's CIDR, that way by default any instance that lives in the subnet will be able to access the database.

I hope this answers your question, if it does please mark it as accepted answer, otherwise please create a new question with a more detailed question (hopefully with a diagram) to see how to best help you.

May you have happy holidays!

AWS
답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠