-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Subnet validation inhibits use of NAT instances #4876
Labels
Comments
ChrisLahaye
added
bug
This issue is a bug.
needs-triage
This issue or PR still needs to be triaged.
labels
Nov 6, 2019
As a work around, you should be able to make them ISOLATED from the PoV of the Vpc construct, and modify the routes manually afterwards. But I'm on this. |
rix0rrr
added
p1
and removed
needs-triage
This issue or PR still needs to be triaged.
labels
Nov 7, 2019
rix0rrr
added a commit
that referenced
this issue
Nov 7, 2019
Add support for NAT instances (as opposed to NAT gateways) on VPCs. Introduced the concept of a 'NAT provider', and provide two implementations: one for gateways, one for instances. To make it easier to pick the right AMI for the NAT instance, add an AMI context provider, which will look up AMIs available to the user. Fixes #4876.
rix0rrr
added a commit
that referenced
this issue
Nov 7, 2019
Add support for NAT instances (as opposed to NAT gateways) on VPCs. This change introduces the concept of a 'NAT provider', and provides two implementations out of the box: one for gateways, one for instances. Instances are not guarded against termination; a future implementation should use ASGs to make sure there are always instances running. To make it easier to pick the right AMI for the NAT instance, add an AMI context provider, which will look up AMIs available to the user. Fixes #4876.
rix0rrr
added a commit
that referenced
this issue
Nov 11, 2019
Add support for NAT instances (as opposed to NAT gateways) on VPCs. This change introduces the concept of a 'NAT provider', and provides two implementations out of the box: one for gateways, one for instances. Instances are not guarded against termination; a future implementation should use ASGs to make sure there are always instances running. To make it easier to pick the right AMI for the NAT instance, add an AMI context provider, which will look up AMIs available to the user. Fixes #4876.
SomayaB
added
@aws-cdk/aws-ec2
Related to Amazon Elastic Compute Cloud
and removed
package/vpc
labels
May 27, 2020
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Creating a VPC with public and private subnets results in an error when natGateways is zero. This inhibits the use of NAT instances (https://docs.aws.amazon.com/vpc/latest/userguide/VPC_NAT_Instance.html).
Reproduction Steps
Error Log
If you do not want NAT gateways (natGateways=0), make sure you don't configure any PRIVATE subnets in 'subnetConfiguration' (make them PUBLIC or ISOLATED instead)
Other
Introduced by https://github.com/aws/aws-cdk/pull/4668/files#diff-9454c0a15b2246a5b9b2267f5266e3ebR1573
This is 🐛 Bug Report
The text was updated successfully, but these errors were encountered: