View source | Discuss this page | Page history | Printable version   
Toolbox
Main Page
Upload file
What links here
Recent changes
Help

PDF Books
Add page
Show collection (0 pages)
Collections help

Search

Release Management/Managing EC2 firewall

Contents

Introduction

Amazon EC2 includes a security service that allows defining groups, launching instances in these groups and a firewall that allows managing the permissions on these groups. This document has two main goals:

The second point requires a clarification. Whenever you start a new instance you get a new external IP address, but also a new internal IP address. Having a fixed external IP address is solved by using the Elastic IP feature, which allows assigning a static IP to a running instance. There is no way, however, to keep the same IP address.

This is very important if you aim to "High availability". That is, having to start a new instance of a running machine is not so strange, and could happen for various reasons (The hardware behind the instance is degraded, you want to migrate to another instance with better features, an attack has accessed your instance, etc.). And there are many places in the infrastructure where specifying the internal IP address seems unavoidable (firewall rules, program configurations, etc).

This document explains how to achieve these goals.

External IPs: Elastic IPs

Whenever you start a new instance you can assign a Elastic IP to it, which means it will have a static IP address. The syntax is simple.

Request a new static IP address:

ec2-allocate-address
ADDRESS	xx.xx.xx.xx

Assign the given IP to a running instance:

ec2-associate-address -i i-yyyyyy xx.xx.xx.xx

And the i-yyyyyy will have the xx.xx.xx.xx IP address in a matter of seconds.

Internal IPs

There is no tool such as the Elastic IPs to solve this problem.

However, there are alternatives to specifying the IPs in the situations describes in the following subsections.

Internal operations

If you use the internal IP address inside the EC2 network all the traffic is free. That is, if you access instance A from instance B using the internal IP address there's no additional cost. But if you use the external IP for this communication then you pay for the traffic.

One option is to specify the internal IP address everywhere it is needed: programs using a database server in another instance, monitoring services, etc. But this is tedious because you need to change this configuration every time you start a new instance.

There solution for this is to use DNS CNAME records. That is, register a DNS address for every critical instance you have, by adding it as a CNAME to ec2-79-125-3-243.eu-west-1.compute.amazonaws.com (in EU region). Then the good thing is that if you use ec2-79-125-3-243.eu-west-1.compute.amazonaws.com in the ourside world it will resolve to 79.125.3.243. But if you try to use it inside the EC2 network it will resolve to its internal IP address. Example:

Outside EC2:

$ host ec2-79-125-3-243.eu-west-1.compute.amazonaws.com
ec2-79-125-3-243.eu-west-1.compute.amazonaws.com has address 79.125.3.243

Inside EC2:

$ host ec2-79-125-3-243.eu-west-1.compute.amazonaws.com
ec2-79-125-3-244.eu-west-1.compute.amazonaws.com has address 10.226.14.202


EC2 firewall

It is also typical to specify access to an instance by using the internal IP address. For example, let's imagine we have a database server instance running in the dbserver security group. And an application server instance running in the appserver security group. This is what you'd typically do to allow the application server access the database server:

$ ec2-authorize -p 3306 -s 10.226.14.202/32 dbserver

Where 10.226.14.202/32 would be the internal IP address in this case.

Instead of doing it, it fits better our needs to use a group based authorization, so that you allow the appserver group access the dbserver group on that port:

$ ec2-authorize dbserver -p 3306 -P tcp -u AWS_USER_ID -o appserver

Two notes in this command:

  1. Do not forget adding -P tcp explicitly or it will not work. This argument is not mandatory in the first command where we specified the source IP, but it is mandatory in this one.
  2. You must specify the Amazon user ID owning the source security group (appserver in this case).

Retrieved from "http://wiki.openbravo.com/wiki/Release_Management/Managing_EC2_firewall"

This page has been accessed 1,698 times. This page was last modified on 2 February 2010, at 07:26. Content is available under Creative Commons Attribution-ShareAlike 2.5 Spain License.