Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Route egress via API Gateway proxy #93

Closed
wants to merge 3 commits into from
Closed

Route egress via API Gateway proxy #93

wants to merge 3 commits into from

Conversation

rossjrw
Copy link
Member

@rossjrw rossjrw commented Mar 5, 2024

This circumvents costs associated with EIPs by routing external requests through an API Gateway hosting a serverless proxy.

Serverless proxy is in place already.

  • Route WD requests
  • Route Secrets Manager requests
  • Route S3 requests - I don't think this is necessary because there's the option of using a Gateway-type PrivateLink for S3 (which is free), but needs verification (I haven't put any security group on it yet, and haven't even worked out if I need to access it from a specific URL, so it probably doesn't work right now
  • Route email requests - have been approved for SES for this purpose

@rossjrw rossjrw added the optimisation Make an existing feature faster or smaller label Mar 5, 2024
@rossjrw rossjrw closed this Mar 7, 2024
@rossjrw
Copy link
Member Author

rossjrw commented Mar 7, 2024

Closed: this isn't how API Gateway works at all, despite what I read which led me to believe it was a potential solution.

API Gateway is called from the internet and can trigger a private Lambda.

It cannot be called from a private Lambda to trigger something on the internet.

(It can be called from the internet to trigger something on the internet.)

Fundamentally, communication with API Gateway requires access to the API Gateway public DNS, which needs access to the internet. Therefore it is not possible to access.

There is the concept of a 'VPC Link' between the Gateway and private stuff in a VPC, but this is only used to allow the Gateway to trigger something in the VPC, not be called from it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
optimisation Make an existing feature faster or smaller
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Find alternative to IPv4 addresses on the Lambda ENIs
1 participant