In AWS nested security group works for load balancer












0














I have problem with the nested security groups (instead of adding CIDR I adding the security id into another security group as rule) to allow the traffic on the AWS load-balancer.



like we have 2 security group one with public ip's and another with private ip's which is open for all traffic. To access the web page I need add some customs ip's including public ip security group and private ip security group. Here I created a new security group by adding the custom ip's , private ip security group ID and public Security group ID by opening the ports 80 and 443. If I give the IP's directly i able to access the web page. But, I am Unable to access the web page by using Security ID. what can i do in this situation?



Private IP's security group:





Public Ip's security group:





By add the above security group id's and added some custom Ip's into this security group created this security group. I try to use this security group on UI load-balance to access the UI. But I am not able to access the UI:












share|improve this question
























  • Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
    – John Rotenstein
    Nov 22 at 21:16










  • thanks for response i added the snapshots of my security group for more clear...
    – Ravi Teja
    Nov 25 at 14:53










  • Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
    – John Rotenstein
    Nov 25 at 17:14










  • Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
    – Ravi Teja
    Nov 26 at 15:08










  • Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
    – John Rotenstein
    Nov 26 at 15:48
















0














I have problem with the nested security groups (instead of adding CIDR I adding the security id into another security group as rule) to allow the traffic on the AWS load-balancer.



like we have 2 security group one with public ip's and another with private ip's which is open for all traffic. To access the web page I need add some customs ip's including public ip security group and private ip security group. Here I created a new security group by adding the custom ip's , private ip security group ID and public Security group ID by opening the ports 80 and 443. If I give the IP's directly i able to access the web page. But, I am Unable to access the web page by using Security ID. what can i do in this situation?



Private IP's security group:





Public Ip's security group:





By add the above security group id's and added some custom Ip's into this security group created this security group. I try to use this security group on UI load-balance to access the UI. But I am not able to access the UI:












share|improve this question
























  • Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
    – John Rotenstein
    Nov 22 at 21:16










  • thanks for response i added the snapshots of my security group for more clear...
    – Ravi Teja
    Nov 25 at 14:53










  • Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
    – John Rotenstein
    Nov 25 at 17:14










  • Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
    – Ravi Teja
    Nov 26 at 15:08










  • Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
    – John Rotenstein
    Nov 26 at 15:48














0












0








0







I have problem with the nested security groups (instead of adding CIDR I adding the security id into another security group as rule) to allow the traffic on the AWS load-balancer.



like we have 2 security group one with public ip's and another with private ip's which is open for all traffic. To access the web page I need add some customs ip's including public ip security group and private ip security group. Here I created a new security group by adding the custom ip's , private ip security group ID and public Security group ID by opening the ports 80 and 443. If I give the IP's directly i able to access the web page. But, I am Unable to access the web page by using Security ID. what can i do in this situation?



Private IP's security group:





Public Ip's security group:





By add the above security group id's and added some custom Ip's into this security group created this security group. I try to use this security group on UI load-balance to access the UI. But I am not able to access the UI:












share|improve this question















I have problem with the nested security groups (instead of adding CIDR I adding the security id into another security group as rule) to allow the traffic on the AWS load-balancer.



like we have 2 security group one with public ip's and another with private ip's which is open for all traffic. To access the web page I need add some customs ip's including public ip security group and private ip security group. Here I created a new security group by adding the custom ip's , private ip security group ID and public Security group ID by opening the ports 80 and 443. If I give the IP's directly i able to access the web page. But, I am Unable to access the web page by using Security ID. what can i do in this situation?



Private IP's security group:





Public Ip's security group:





By add the above security group id's and added some custom Ip's into this security group created this security group. I try to use this security group on UI load-balance to access the UI. But I am not able to access the UI:









amazon-web-services






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 25 at 17:12









John Rotenstein

66.8k774118




66.8k774118










asked Nov 22 at 17:38









Ravi Teja

11




11












  • Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
    – John Rotenstein
    Nov 22 at 21:16










  • thanks for response i added the snapshots of my security group for more clear...
    – Ravi Teja
    Nov 25 at 14:53










  • Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
    – John Rotenstein
    Nov 25 at 17:14










  • Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
    – Ravi Teja
    Nov 26 at 15:08










  • Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
    – John Rotenstein
    Nov 26 at 15:48


















  • Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
    – John Rotenstein
    Nov 22 at 21:16










  • thanks for response i added the snapshots of my security group for more clear...
    – Ravi Teja
    Nov 25 at 14:53










  • Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
    – John Rotenstein
    Nov 25 at 17:14










  • Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
    – Ravi Teja
    Nov 26 at 15:08










  • Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
    – John Rotenstein
    Nov 26 at 15:48
















Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
– John Rotenstein
Nov 22 at 21:16




Unfortunately, it is hard to understand your configuration from the information given. Could you please explain a it a little clearer, perhaps by showing the security group configurations? Are both security groups associated with the Load Balancer? Could you please clarify what scenario works and what scenario does not work?
– John Rotenstein
Nov 22 at 21:16












thanks for response i added the snapshots of my security group for more clear...
– Ravi Teja
Nov 25 at 14:53




thanks for response i added the snapshots of my security group for more clear...
– Ravi Teja
Nov 25 at 14:53












Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
– John Rotenstein
Nov 25 at 17:14




Could you please clarify your configuration? You mention a Load Balancer. Are these security groups on the Load Balancer? What groups are in the instance(s)? Can you clarify what configuration works and what configuration doesn't work? Please explain as much as you can, so we can understand exactly what you have.
– John Rotenstein
Nov 25 at 17:14












Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
– Ravi Teja
Nov 26 at 15:08




Yes these security groups we are adding on top of load balancer. when i am adding the IP's instead of security group ID into to the security group 3 in that case i am able to access the UI web page, but when i am adding the "Public and private" Security group ID's instead of IP's into the 3rd Security groups of not able to access the UI web page..
– Ravi Teja
Nov 26 at 15:08












Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
– John Rotenstein
Nov 26 at 15:48




Your Private IP addresses appear to be in /16 and /19 ranges. This is a bit strange, because a whole VPC can't be bigger than /16 (I think). Are these from peered VPCs? A private IP address can only be referenced if it is in the same VPC or in a peered VPC.
– John Rotenstein
Nov 26 at 15:48

















active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53435971%2fin-aws-nested-security-group-works-for-load-balancer%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown






























active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53435971%2fin-aws-nested-security-group-works-for-load-balancer%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

A CLEAN and SIMPLE way to add appendices to Table of Contents and bookmarks

Calculate evaluation metrics using cross_val_predict sklearn

Insert data from modal to MySQL (multiple modal on website)