-
The WebUI works fine. However, when I add the account and the default region I use, It stays stuck in "Not discovered". Uppon checking the logs for the ECS scheduled task that runs every 15 minutes, I get the following error: ` then { i.e. its giving a DNS resolving error on the neptune endpoints. My dev machine is in the same VPC via VPN, and I've setup the security groups permissively for neptune. I resolve just fine when I do a "telnet endpoint 6174". The route table of the subnets where everything was setup has a NAT gateway. This is driving me nuts and I'm almost giving up on this solution. Can someone assist? |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 4 replies
-
@svozza can you lend a hand? |
Beta Was this translation helpful? Give feedback.
-
Ah sorry, I missed this! Is the solution running it a pre-existing VPC? |
Beta Was this translation helpful? Give feedback.
-
Yes, on an existing VPC
…On Fri, 4 Oct 2024 at 10:32 Stefano Vozza ***@***.***> wrote:
Ah sorry, I missed this! Is the solution running it a pre-existing VPC?
—
Reply to this email directly, view it on GitHub
<#553 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AVNXFHY7X772TB6EXKHGUXDZZ2KG5AVCNFSM6AAAAABPKVLQIGVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTAOBUGQ2DQMI>
.
You are receiving this because you authored the thread.Message ID:
<aws-solutions/workload-discovery-on-aws/repo-discussions/553/comments/10844481
@github.com>
|
Beta Was this translation helpful? Give feedback.
-
Hi @svozza just to give you feedback. I managed to resolve the issue, and this might be worth modifying the gremlin lambda cloudformation template. I added an outbound rule to the lambda's security group for UDP port 53 on 0.0.0.0/0 CIDR. This is to allow for outbound DNS lookups. It worked. You may want to revise the CloudFormation template for this. Thanks for all your assistance btw! |
Beta Was this translation helpful? Give feedback.
Hi @svozza just to give you feedback. I managed to resolve the issue, and this might be worth modifying the gremlin lambda cloudformation template.
I added an outbound rule to the lambda's security group for UDP port 53 on 0.0.0.0/0 CIDR. This is to allow for outbound DNS lookups. It worked. You may want to revise the CloudFormation template for this.
Thanks for all your assistance btw!