Site-to-site VPN tunnel to access to VPC with internal ALB and EKS

0

I have VPC1 / 10.1.0.0/24 which is routed to our on-premise networks behind Customer gateway. VPC2 / 10.2.0.0/24 contain EKS with internal ALB, but we do not wanna put that range in our router. I have Transit gateway between VPC and communication is established and VPN connection to my on-prem network. I can reach VPC1 from on-prem network, but not VPC2, obviously. Can i use NLB somehow or any other AWS service which I'll put in VPC1 and make route to VPC2 and allow access from my on-prem network? I tried with NLB and add target group to be ALB but that won't work as I do not have peered networks. Might I missed something...

4 Answers
0
Accepted Answer

You’re going to have to create a NLB in the EKS vpc pointing to the ALB and then use private link to make the NLB available to the gateway VpC.

In the gateway VPC you have to create an endpoint service attached to your private link service you have created.

Create a DNS record alias pointing to the endpoint service you have created in the gateway vpc so that onprem machines can resolve.

profile picture
EXPERT
answered 5 months ago
0

Hello Demenjazi,

As Matt mentioned, NAT instance in VPC1 is one way to do it. https://docs.aws.amazon.com/vpc/latest/userguide/VPC_NAT_Instance.html#basics

Or you can create the NLB-ALB in VPC2 and create an Endpoint Service (AWS Private Link) in VPC2 with NLB as Target. An Interface Endpoint can then be created in VPC1 which consumes the Endpoint Service from VPC2. This Interface Endpoint in VPC1 can be accessed from On-premise through VPN connection.

Reference: https://aws.amazon.com/blogs/networking-and-content-delivery/application-load-balancer-type-target-group-for-network-load-balancer/

https://docs.aws.amazon.com/vpc/latest/privatelink/what-is-privatelink.html

profile pictureAWS
EXPERT
answered 6 months ago
profile picture
EXPERT
reviewed 6 months ago
0

Not sure how the ALB can help here. If you don't want to define the encryption domain of VPC2 10.2.0.0/24, then the Site-to-Site VPN connection will not carry any traffic for that CIDR. What you could do (but need testing and deep dive into your architecture to see if this will even work) is to use a Linux NAT machine in VPC1, NAT the traffic of 10.2.0.0/24 to 10.1.x.x/32, routing from VPC2 to on-prem would need to be configured so that it can go through VPC1, and separate TGW route table might be needed.

profile pictureAWS
Matt_E
answered 6 months ago
  • ALB is provision by ingress for the web applications in my EKS, I want web apps to be accessible only form our on-prem networks.

0

Enter image description here

What I want to achieve is to reach applications in VPC 10.144 form my on-prem network, while I have only route to 10.159 (decided by network team). I use Route53 with public zone for the web apps. What would be the optimal solution? NAT Gateway EC2 instance in GatewayVPC is not an option. Picture is not ideal, I apologies foe that.

Note. I tired with VPC peering, create NLB in 10.159 and Target group type Application LB in VPC144, but those 2 can't see each other.

answered 5 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions