fck-nat
aws-transit-gateway-connect-s
fck-nat | aws-transit-gateway-connect-s | |
---|---|---|
19 | 1 | |
967 | - | |
- | - | |
6.9 | - | |
26 days ago | - | |
HCL | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
fck-nat
-
Fck-nat: The (f)easible (C)ost (k)onfigurable NAT
https://github.com/AndrewGuenther/fck-nat/blob/main/service/... this is the bit you need to understand.
You've got the gist of it, but you probably want to read about NAT and iptables.
The source destination check is important - but implementation specific here. Google Cloud does it like this - https://cloud.google.com/vpc/docs/using-routes#canipforward
-
AWS to start charging for IPv4 usage, but critical services don't support IPv6
This entire thread is about the additional costs imposed on a publicly accessible IP[1].
Granted, there are other (but similarly expensive) workarounds such as NAT gateways[2] for outbound connectivity or the cheaper NAT instance method which AWS doesn't support any more, but there are alternatives[3]. However, for use cases requiring inbound connectivity such as setting up websites on EC2 instances, or using an ELB which need internet access, these charges definitely rack up.
[1] https://aws.amazon.com/blogs/aws/new-aws-public-ipv4-address...
[2] https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gat...
[3] https://fck-nat.dev
-
AWS to Begin Charging for Public IPv4 Addresses
Weird, I was just looking into this yesterday and found https://fck-nat.dev/
-
Can I use API Gateway to avoid the need for a NAT/Internet Gateway
If you find yourself needing NAT Gateway after all, I recommend https://fck-nat.dev/ - the name speaks for itself. If you use CDK, using it in place of managed NAT Gateway is dead simple.
- Anything can be a message queue if you use it wrongly enough
- Get rid of NAT-Gateway charge?
-
Painful bill for image pulls from ECR ?
There are tradeoffs for using a managed NAT Gateway that are usually not considered. It's sort of a roller coaster, but the introduction for the fck-nat project goes in to the most obvious tradeoffs
-
Important Information about NAT Gateway in your Account emails
May I suggest https://fck-nat.dev/ ?
-
Just released: alterNAT, a high availability AWS NAT implementation that reduces NAT Gateway costs while limiting the increased risk of operating NAT instances. I’d love to know what you think!
For those unaware: https://fck-nat.dev/
-
Should I use vpc interface endpoints instead of nat gateways to save costs?
I maintain a NAT instance AMI that works on both ARM and x86: https://fck-nat.dev/
aws-transit-gateway-connect-s
-
Switch to VPC Endpoints from Nat Gateways to Reduce Bandwidth Charges
If you need a generic replacement for NAT Gateway you can build one using Transit Gateway and a pair of router VMs running GRE+BGP.
Amazon has most of an example here using quagga (but CloudFormation, ick): https://github.com/aws-samples/aws-transit-gateway-connect-s...
What are some alternatives?
terraform-aws-nat-instance - Terraform module to provision a NAT Instance using an Auto Scaling Group and Spot Instance from $1/month
alternat - High availability implementation of AWS NAT instances.
torrentfs - A p2p file system for https://github.com/CortexFoundation/CortexTheseus with pure Golang
terraform-aws-nat - Terraform module for creating NAT Gateways or Instances and attaching them to a VPC
pingfs - Stores your data in ICMP ping packets
aws-transit-gateway-connect-sample - moved - https://github.com/f7o/aws-transit-gateway-connect-sample
somleng-project - Entrypoint for the Somleng Project
tiny-snitch - an interactive firewall for inbound and outbound connections
session-manager-plugin - This plugin helps you to use the AWS Command Line Interface (AWS CLI) to start and end sessions to your managed instances
iodine - Official git repo for iodine dns tunnel
netplan - Declarative network configuration for various backends