Open HTTPS Port For Elastic Beanstalk Environments: Difference between revisions
Jump to navigation
Jump to search
(Created page with "== Overview == It is necessary to allow public access to the HTTPS port of an Elastic Beanstalk environment in order to process secure requests to a website. This port is not...") |
No edit summary |
||
| Line 1: | Line 1: | ||
== Overview == | == Overview == | ||
It is necessary to allow public access to the HTTPS port of an Elastic Beanstalk environment in order to process secure requests to a website. This port is not open by default. | It is necessary to allow public access to the HTTPS port of an Elastic Beanstalk environment in order to [[Elastic Beanstalk Security Certificates|process secure requests]] to a website. This port is not open by default. | ||
It can be opened manually through the AWS Management Console, or this directive can be added to an '.ebextensions` config file so the configuration will happen a part of the `eb deploy` command. <ref>[https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/https-singleinstance-python.html Terminating HTTPS on EC2 instances running Python] - AWS Documentation</ref> | It can be opened manually through the AWS Management Console, or this directive can be added to an '.ebextensions` config file so the configuration will happen a part of the `eb deploy` command. <ref>[https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/https-singleinstance-python.html Terminating HTTPS on EC2 instances running Python] - AWS Documentation</ref> | ||
Latest revision as of 01:26, 7 June 2020
Overview[edit]
It is necessary to allow public access to the HTTPS port of an Elastic Beanstalk environment in order to process secure requests to a website. This port is not open by default.
It can be opened manually through the AWS Management Console, or this directive can be added to an '.ebextensions config file so the configuration will happen a part of the eb deploy` command. [1]
AWS Management Console[edit]
- AWS Management Console > EC2 > EC2 instance corresponding to the EBS environment > click for details > Security Group > click for details
- Inbound Rules tab > Edit button
- Add Rule button
- Type: HTTPS
- Protocol: TCP
- Port Range: 443
- Source: 0.0.0.0/0, ::/0
.ebextensions[edit]
Resources:
sslSecurityGroupIngress:
Type: AWS::EC2::SecurityGroupIngress
Properties:
GroupId: {"Fn::GetAtt" : ["AWSEBSecurityGroup", "GroupId"]}
IpProtocol: tcp
ToPort: 443
FromPort: 443
CidrIp: 0.0.0.0/0
Reference[edit]
- ↑ Terminating HTTPS on EC2 instances running Python - AWS Documentation