Make Environment Publicly Accessible using AWS LB Configuration
For internal use
Introduction
This document provides step-by-step instructions to make environment publicly accessible without wire guard configuration. Generally, all environments are privately accessible using wire guard configuration.
Note
The naming conventions may vary depending on the environment.
Create a new Target Groups and LB on AWS
The steps below outline the process for creating new Target Groups and Load Balancers (LB) on AWS.
Creating Target Group for external-http
Creating Target Group for external-httpsredirect
Creating a Target Group for PostgreSQL
Creating external network Load Balancer
Creating Target Group for external-http
Choose a target type -
IP addressesTarget Group name -
openg2p-<envname>-external-httpProtocol : Port -
TCP : 30080VPC -
general-vpcHealth check protocol : Path : Port (Traffic Port)-
HTTP : /healthz/ready : 30521Next, navigate to "Register Targets", verify the network settings, add the internal IP addresses of the cluster instances, and create the target group.
Creating Target Group for external-httpsredirect
Choose a target type -
IP addressesTarget Group name -
openg2p-<envname>-ext-httpsredirectProtocol : Port -
TCP : 30081VPC -
general-vpcHealth check protocol : Path : Port (Overide) -
HTTP : /healthz/ready : 30521Next, navigate to "Register Targets", verify the network settings, add the internal IP addresses of the cluster instances, and create the target group.
Creating Target Group for PostgreSQL
For PostgreSQL, there is no need to create a Target Group (TG). Instead, create a record with the name internal.sandbox-name and map the Internal NLB DNS name of the environment to it.
Creating external network Load Balancer
Create NLB with name -
openg2p-<envname>-externalSelect VPC -
general-vpcdo map forap-south-1a, 1b, 1cSelect Security Group -
default-nginx-nodeListeners and routing Protocol : Port : Default action
TLS : 443 : openg2p-<envname>-external-httpTCP : 80 : openg2p-<envname>-ext-httpsredirect
Select an
ACM certificatecorresponding to the environment's domain name and create an NLB.Make sure the Load balancer created and active.
Map the Load Balancer DNS name to your environment domain name on Route 53.
Last updated

