[英]How to connect to AWS Elastic Search with from Browser with AWS Client VPN?
I have a AWS VPC with 3 private (A, B, C) and 1 public subnet.我有一个带有 3 个私有(A、B、C)和 1 个公有子网的 AWS VPC。 I have created a Client VPN which has association with A and B. Authorization Rules are for anyone.
我创建了一个与 A 和 B 关联的客户端 VPN。授权规则适用于任何人。 The route tables are the default route tables of A and B (which is the main route table).
路由表是A和B的默认路由表(即主路由表)。 I have created a private server in A which has a private 10.xxx ip address and I am able to connect to it locally using my client VPN.
我在 A 中创建了一个私有服务器,它有一个私有 10.xxx ip 地址,我可以使用我的客户端 VPN 在本地连接到它。 Which implies that my client VPN is configured properly.
这意味着我的客户端 VPN 配置正确。 It also has split tunnel and public DNS enabled (173.0.0.2 and 8.8.8.8).
它还启用了拆分隧道和公共 DNS(173.0.0.2 和 8.8.8.8)。
Now I created an elastic search domain in A. I got the ES and Kibana endpoints, and they look like this:现在我在 A 中创建了一个弹性搜索域。我得到了 ES 和 Kibana 端点,它们看起来像这样:
https://vpc-search-me-xxxxxxxxxxxxxxxxxxxxxxxxx.ap-south-1.es.amazonaws.com
But when I open it in browser it does not work.但是当我在浏览器中打开它时它不起作用。 I know its inside VPC but at the same time, I am using Client VPN.
我知道它在 VPC 内部,但同时我正在使用客户端 VPN。 I saw the documentation, which tells it should be possible with the VPN.
我看到了文档,它告诉它应该可以使用 VPN。 Anyone successfully configured it?
有人成功配置了吗? When I create it outside VPC I can properly access it.
当我在 VPC 之外创建它时,我可以正确访问它。
I figured it out.我想到了。 It was a security group issue.
这是一个安全组问题。 The security group which I used, was only open for port 22. I made it open for all port, then it worked.
我使用的安全组只对端口 22 开放。我让它对所有端口开放,然后它就可以工作了。 I think I need to open only the elastic search port and then it should work as well.
我想我只需要打开弹性搜索端口就可以了。
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.