Hi zizi, I answer your questions.
-
Unfortunately No...
The default allowed "SSH (22/tcp) from 0.0.0.0/0" must be overridden and restricted in the "option_settings". -
Not possible, as far as I know when "option_settings" is used.
This is because there is no description field in the SSHSourceRestriction section of the AWS document.
However, the description field can be set by using a security group that has already been created.
See KNOWLEDGE-CENTER for more information.
Just FYI,
Inbound HTTP (80/tcp) permission from AWSEBLoadBalancerSecurityGroup
is allowed by default without explicitly stating it.
Therefore, if only HTTP(from AWSEBLoadBalancer) and SSH(from your environment IP) connections are to be allowed, the following statement in "01-security-group.config" is all that is required.
option_settings: aws:autoscaling:launchconfiguration: SSHSourceRestriction: tcp, 22, 22, xx.xx.xx.xx/32
I hope this will help.
Relevant content
- asked 3 years ago
- asked 9 months ago
- Accepted Answerasked 4 years ago
- AWS OFFICIALUpdated 3 years ago
- How do I mount an Amazon EFS volume to an application directory in an Elastic Beanstalk environment?AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 6 months ago
Hi Tsumita, Thanks.