use of 172.17.0.0/16 in a subnet of my VPC , does it affect other subnets in my VPC or other VPCs I am connected to it?

0

regarding the following document https://docs.aws.amazon.com/vpc/latest/userguide/vpc-cidr-blocks.html if I use of 172.17.0.0/16 in a subnet of my VPC , does it affect other subnets in my VPC or other VPCs I am connected to it? if I am connected to VPC peering or transit gateway , will the other subnets face connectivity issues regarding connecting to services like AWS Cloud9 or Amazon SageMaker , etc or only the subnet with IP address 172.17.0.0/16 may face these connectivity issues ?

Thanks

1개 답변
0

Hello.

According to the Cloud9 troubleshooting document below, it seems that if you start with CIDR "172.17.0.0/16", you may not be able to connect.
Basically, I think that only the "172.17.0.0/16" VPC will be affected.
However, I think that communication from Cloud9 to "172.17.0.0/16" will be affected, so I think it is basically a good idea to avoid using "172.17.0.0/16".
https://docs.aws.amazon.com/cloud9/latest/user-guide/troubleshooting.html

Issue: For an EC2 environment, if you launch the EC2 instance into an Amazon VPC that uses the IPv4 Classless Inter-Domain Routing (CIDR) block 172.17.0.0/16, the connection might stall when you attempt to open that environment.

Cause: Docker uses a link layer device called a bridge network that enables containers that are connected to the same bridge network to communicate. AWS Cloud9 creates containers that use a default bridge for container communication. The default bridge typically uses the 172.17.0.0/16 subnet for container networking.

If the VPC subnet for your environment's instance uses the same address range that's already used by Docker, an IP address conflict might occur. So, when AWS Cloud9 tries to connect to its instance, that connection is routed by the gateway route table to the Docker bridge. This prevents AWS Cloud9 from connecting to the EC2 instance that backs the development environment.

Recommended solution: To resolve an IP address conflict that's caused by Amazon VPC and Docker using the same IPv4 CIDR address block, configure a new VPC for the instance backing your EC2 environment. For this new VPC, configure a CIDR block that's different from 172.17.0.0/16. (You can't change the IP address range of an existing VPC or subnet.)

profile picture
전문가
답변함 5달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠