-
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Confusing DNS64 behaviour with public subnets #972
Comments
This issue has been automatically marked as stale because it has been open 30 days |
Still relevant |
I'm having this issue as well. There are 2 solutions:
In my case however, I don't need a public IPv4 IP, I do need NAT64. |
This issue has been automatically marked as stale because it has been open 30 days |
Still relevant |
This issue has been automatically marked as stale because it has been open 30 days |
Still relevant |
this bug just bit me. should all named subnets have an equivalent: block? Lines 1116 to 1126 in 9ffd9c6
I dont see why private and database subnets are special for getting DNS64 routes, especially given aws api clients rely on this routing to work (since so few aws api's support ipv6) |
I'm looking to understand or open an issue regarding NAT64. I was almost convinced AWS doesn't support dualstack deployments where generated DNS64 making [64:ff9b::0:0/96] addresses, are routable for private subnet workloads. Default Behavior
What i found out yesterday is that AWS VPC NAT Gateways can be deployed in a "private" mode, and the private subnet's route table entry [64:ff9b::0:0/96] can direct to the Private NAT GW, which will enable DNS64 addresses to work in the private subnet. Adding a VPC NatGW with a private deployment option, and enrolling a route for (for example) I would strongly suggest that if DNS64 is enabled and the module user doesn't specifical request disabling private NAT GW's that a compliment of private gateway's to match the public ones are created and routed to for the private subnets. |
Description
public_subnet_enable_dns64
istrue
by default and withenable_ipv6 = true;
this enables DNS64 for created public subnets.However, if a given domain doesn't have an IPv6 record, it's resolved to
64:ff9b::/96
which in turn needs an additional route setupto work correctly.
Somewhat similar to #923, but for public subnets.
Versions
Module version [Required]:
5.1.1
Terraform version:
1.5.4
5.10.0
Reproduction Code [Required]
Steps to reproduce the behavior:
curl -6 api.github.com
from the EC2 instance within one of the public subnets above hangs.Expected behavior
DNS64 enabled along with the corresponding route for resolving
64:ff9b::/96
Actual behavior
An IP from
64:ff9b::/96
is not routed correctly:(The text was updated successfully, but these errors were encountered: