Vpc Peering Internal Elb
Vpc peering is available for intra region and inter region connectivity for local or cross account vpcs.
Vpc peering internal elb. You will still have to add an entry to the imply cloud elb unmanaged security group to permit inbound access from the origin instance s security group as described in the non overlapping section. Google cloud vpc network peering allows internal ip address connectivity across two virtual private cloud vpc networks regardless of whether they belong to the same project or the same. The route must be directed towards the vpc peering id of your vpcs.
Previously access to network load balancers from an inter region peered vpc was not possible. This support on network load. Network load balancers support connections from clients over vpc peering aws managed vpn aws direct connect and third party vpn solutions.
To test this i ran a quick experiment. When you create an internal load balancer you can optionally specify one private ip address per subnet. Internal in your cluster configuration file before creating your cluster you can use vpc peering to enable your cortex cli to connect to your cluster operator from another vpc so that you may run cortex commands.
If you are using an internal operator load balancer i e. Network load balancers can also load balance to ip based targets that are deployed in an inter region peered vpc. The vpcs are peered with routing tables having routes that point to each others main cidr block.
I created an internal elb which references a private instance. Access a service behind an internal elb in one vpc from an instance in a different vpc. Theoretically if the vpc peering is setup and subnet routing properly configured instances between vpcs can talk to each other so accessing an internal elb should be no different.
If you do not specify an ip address from the subnet elastic load balancing chooses one for you. Currently i can access the elb from instances in the same vpc a but not yet from those in vpc b. Note that because the operator validates that the cli user is an active iam user in the same aws account as the cortex cluster it is usually unnecessary to configure the operator s.