admin管理员组文章数量:1406063
In aws I created a t3.nano aws-linux ec2 instance. Attached an instance profile with the following policies:
- AmazonEC2RoleforSSM
- AmazonSSMFullAccess
- AmazonSSMManagedEC2InstanceDefaultPolicy
- AmazonSSMManagedInstanceCore
The instance is in my vpc, in a private subnet. The private subnet route table is 10.0.0.0/16 local (no igw no nat gateway).
The instance's security group is also in the same vpc with following inbound/outbouns rules:
inbound: https port 443 0.0.0.0/0 ssh port 22 0.0.0.0/0
outbound: https port 443 0.0.0.0/0
I have created the following VPC endpoints on the same vpc and security group as the ec2:
- com.amazonaws.us-east-1.ssm
- com.amazonaws.us-east-1.ssmmessages
- com.amazonaws.us-east-1.ec2messages
Now, I am trying to connect to my instance via session manager. For that I need to start a session, but I don't see my EC2 in the target instances.
What could be the reason for that?
After VPC endpoints creation, do I need somehow to associate them to with instance?
本文标签: amazon web servicesAWS EC2 in Private Subnet Not Appearing in SSM Session ManagerStack Overflow
版权声明:本文标题:amazon web services - AWS EC2 in Private Subnet Not Appearing in SSM Session Manager - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1744960160a2634602.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论