You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: Add NAT gateway IPs to Keycloak ALB security group
When ECS tasks in private subnets call Keycloak's public DNS name,
traffic goes through the NAT gateway and the source IP becomes the
NAT gateway's public IP instead of the ECS task's security group.
This was causing OAuth2 callback failures.
Added dynamic security group rule that allows HTTPS traffic from
all NAT gateway public IPs to the Keycloak load balancer.
0 commit comments