DEV Community

Discussion on: Configuring an isolated network in AWS

Collapse
 
yimapichai profile image
Jim Eric Skogman • Edited

Thank you so much for your response!
I see, so with this architecture, pods and applications should be kept on the private node group and access the internet through the NAT GW. In that case, if I wanted to deploy an Nginx ingress controller, should I deploy that to the private or public nodegroups?

Thank you again for your time and your hard work 🙏

Thread Thread
 
chabane profile image
Chabane R. • Edited

That's a good question. Your nginx ingress controller could create a network load balancer and it will be deployed in the public subnet.

aws.amazon.com/blogs/opensource/ne...

Even if your nginx ingress controler is deployed in the public nodegroup, it's supposed to have access to the public internet

The NACL "eks-ingress-external-zone-rules" allows access to all inbound and outbound traffic.

(You can try to replace to replace

  from_port  = 0
  to_port       = 0
Enter fullscreen mode Exit fullscreen mode

by

 from_port  = 0
  to_port     = 65535)
Enter fullscreen mode Exit fullscreen mode

A route table associates the IGW with the public subnets (eks+RDS)

So the issue could be elsewhere.

Before writing this post, I tested the solution proposed on this medium post: blog.devgenius.io/create-an-amazon...

Maybe it works with his terraform?

Thread Thread
 
yimapichai profile image
Jim Eric Skogman • Edited

Thank you again for your feedback, and for the link to that article.
I tried running a simple curl from a busybox pod deployed on a node in the public subnet earlier but it didn't seem to work, I'll try changing the ports you mentioned and test again.