-
Notifications
You must be signed in to change notification settings - Fork 6
Open
Description
While working on #114 I have experimented with different networking arrangements and have been reminded that it is easy to create a configuration that does not work! It could be helpful for users to see a few example configurations while they consider their own deployment.
Here are a few that do work:
Scenario 1: Higher security, higher cost
- RDS Instance in a
PRIVATE_ISOLATEDsubnet- [optional]
pgbouncerinstance in aPRIVATE_WITH_EGRESSsubnet pgstac_secrethost value is the private IP address for pgbouncer or the RDS hostname
- [optional]
- Lambdas added to the
vpcin aPRIVATE_WITH_EGRESSsubnet (adds a NAT Gateway which costs $)- granted connect access to either the RDS instance or the pgbouncer instance
- important: add an S3 Endpoint to the
vpcto make it possible to read data from S3 buckets in the same region as the VPC for free even within the vpc instead of paying the NAT Gateway tax
Scenario 2: Lower security, lower cost
- RDS Instance in a
PUBLICsubnet- [optional]
pgbouncerinstance in aPUBLICsubnet with a public IP address assigned pgstac_secrethost value is the public IP address for thepgbouncerinstance or the RDS hostname- important: RDS Instance (or pgbouncer instance) allow all traffic (any Ipv4) on port 5432
- [optional]
- Lambdas in
PUBLICsubnet - Makes it possible to connect to the database from any client with the credentials
- convenient for loading STAC items without the ingestor infrastructure
vincentsaragovincentsarago
Metadata
Metadata
Assignees
Labels
No labels