Create and configure AWS resources in your VPC to connect to the serverless runtime
environment in Informatica's VPC.
Create and configure the following AWS resources:
VPC
A VPC is a virtual network that contains other AWS resources. You can use an existing
VPC or create a VPC.
Enable DNS hostnames and DNS resolution for the VPC. Also, ensure that at least one of
the following scenarios applies to you:
Your VPC's DHCP option is set with
AmazonProvidedDNS.
If you have custom DNS servers in your DHCP
option set, ensure that AmazonProvidedDNs is part of the option set or that the DNS
servers can resolve EC2 internal hostnames. To ensure that the DNS servers can resolve
EC2 internal hostnames, internally redirect the DNS query to AmazonProvidedDNS.
Public subnet for internet access
A public subnet provides internet access through a NAT gateway. To create the public
subnet, use the following guidelines:
Use any availability zone in the
region where you created the VPC.
The CIDR range must be within the VPC
CIDR range. Choose a range based on the number of IP addresses that you want to have
within the subnet.
Private subnet to host the ENI
A private subnet hosts the ENI that the serverless runtime environment uses to connect
to your VPC.
Create a private subnet and configure a CIDR range to determine the
maximum number of IP addresses and therefore, the scalability, of the serverless runtime
environment. Configure the CIDR range to have at least 25 IP addresses per serverless
runtime environment so that the serverless runtime environment can scale effectively
when developers run concurrent workloads.
After your organization administrator
creates a serverless runtime environment in
Administrator
, the serverless runtime environment creates an ENI in your private
subnet.
Security group
A security group controls the traffic flow from the serverless runtime environment. Create a
security group in the VPC. The security group is associated with all ENIs that the
serverless runtime environment creates.
To create the security group, use the following guidelines:
Leave the inbound rules empty to
restrict all incoming traffic.
The outbound rules can either allow
all traffic or limit traffic to all Amazon S3 resources and all source and target
systems that the serverless runtime environment accesses.
You specify this security group in the serverless runtime environment properties in
Administrator
.
NAT gateway for internet access from the private subnet
A NAT gateway allows outbound traffic to the internet from private instances. All
compute instances in the serverless runtime environment that are associated with the ENI
are private.
Create a NAT gateway to route outbound traffic from the private subnet to
the internet. AWS provides several ways to configure subnet routing rules, such as route
tables and NACL. For more information, see the AWS documentation.