Skip to content

Commit

Permalink
added .amazonaws.com to allowed domain list to enable access to IAM s…
Browse files Browse the repository at this point in the history
…ervice
  • Loading branch information
Ilyin committed Aug 7, 2021
1 parent 2f89166 commit ec161ed
Showing 1 changed file with 6 additions and 5 deletions.
11 changes: 6 additions & 5 deletions cfn_templates/vpc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ Resources:
- Key: Name
Value: !Sub sg-sagemaker-${ProjectName}

# Self-referencing the security group to enable communication between intances within the same SG
# Self-referencing the security group to enable communication between instances within the same SG
SageMakerSecurityGroupIngress:
Type: AWS::EC2::SecurityGroupIngress
Properties:
Expand Down Expand Up @@ -116,6 +116,7 @@ Resources:
- TLS_SNI
Targets:
- ".kaggle.com"
- ".amazonaws.com"
GeneratedRulesType: "ALLOWLIST"
Tags:
- Key: Name
Expand All @@ -124,7 +125,7 @@ Resources:
FirewallPolicy:
Type: AWS::NetworkFirewall::FirewallPolicy
Properties:
Description: Network firewall policy to control SageMaker Studio internet ergress and ingress
Description: Network firewall policy to control SageMaker Studio internet egress and ingress
FirewallPolicyName: !Sub "network-firewall-policy-${ProjectName}"
FirewallPolicy:
StatelessDefaultActions:
Expand Down Expand Up @@ -154,7 +155,7 @@ Resources:
Type: AWS::NetworkFirewall::Firewall
Properties:
DeleteProtection: false
Description: AWS Network Firewall to control internet ergress and ingress
Description: AWS Network Firewall to control internet egress and ingress
FirewallName: !Sub "network-firewall-${ProjectName}"
FirewallPolicyArn: !Ref FirewallPolicy
FirewallPolicyChangeProtection: false
Expand Down Expand Up @@ -228,7 +229,7 @@ Resources:
SubnetId: !Ref SageMakerStudioSubnet

# Routes
# Since we have only one-AZ Firewall setup, we take the first Network Firewall VPC eindpoint from the EndpointsIds list
# Since we have only one-AZ Firewall setup, we take the first Network Firewall VPC endpoint from the EndpointsIds list
# This will not work in multi-AZ setup!
IGWIngressRoute:
Type: AWS::EC2::Route
Expand All @@ -244,7 +245,7 @@ Resources:
DestinationCidrBlock: 0.0.0.0/0
GatewayId: !Ref IGW

# Since we have only one-AZ Firewall setup, we take the first Network Firewall VPC eindpoint from the EndpointsIds list
# Since we have only one-AZ Firewall setup, we take the first Network Firewall VPC endpoint from the EndpointsIds list
# This will not work in multi-AZ setup!
NATGatewayEgressRoute:
Type: AWS::EC2::Route
Expand Down

0 comments on commit ec161ed

Please sign in to comment.