- Newest
- Most votes
- Most comments
1 Security groups do not apply to the VPC, they apply to EC2 or Amazon RDS instances, in this case it would be to the EMR instances
2 NACLs apply to the VPC
3 Make sure you are adding the ingress rules correctly, and then associate it with the security group https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-securitygroupingress.html
Hello,
The issue seems to be a misunderstanding of how security groups work. Security groups are not directly applied to a VPC; instead, they are associated with resources within the VPC, such as EC2 instances, RDS instances, or in your case, EMR instances.
Here's what you need to check:
-
Security Group Application: Ensure that the security group created in your CloudFormation template is associated with the specific resources EC2 instances within the VPC where you want the inbound SSH access to apply.
-
Correct Ingress Rules: Your CloudFormation template looks correct in terms of defining the ingress rules. Make sure that these rules are associated with the correct instances.
-
NACL vs. Security Groups: Remember that Network Access Control Lists NACLs apply to the VPC as a whole, while security groups apply to individual resources.
check this for clear syntaxes https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-securitygroupingress.html
Relevant content
- asked a year ago
- Accepted Answerasked 5 years ago
- asked a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 months ago
- AWS OFFICIALUpdated 3 years ago
Thanx, Its Working