You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 20, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,16 @@ This is a Terraform module which provisions a NAT instance.
4
4
5
5
Features:
6
6
7
-
- Providing NAT for one or more private subnets
8
-
- Auto healing by the Auto Scaling Group
9
-
- Saving cost by spot requests
10
-
- Fixed public IP address using an Elastic IP and Elastic Network Interface
11
-
-Login with Systems Manager Session Manager
7
+
- Providing NAT for private subnet(s)
8
+
- Auto healing using an auto scaling group
9
+
- Saving cost using a spot instance
10
+
- Fixed source IP address by reattaching ENI
11
+
-Supporting Systems Manager Session Manager
12
12
13
13
Terraform 0.12 is required.
14
14
15
+
**Warning**: Generally you should use a NAT gateway. This module provides a very low cost solution for testing purpose.
16
+
15
17
16
18
## Getting Started
17
19
@@ -40,18 +42,19 @@ module "nat" {
40
42
}
41
43
```
42
44
43
-
You can log in to the NAT instance via [AWS Systems Manager Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html).
45
+
Now create an EC2 instance in the private subnet to verify the NAT configuration.
46
+
Open the [AWS Systems Manager Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html), log in to the instance and make sure you have external access from the instance.
You can log in to the NAT instance from [AWS Systems Manager Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html).
127
+
128
+
You can enable SSH access by setting `key_name` option and opening the security group. For example,
0 commit comments