GCP Load Balancer with IAP - google-cloud-platform

Is there a way to setup the load balancer so that I can enable IAP without exposing the 443 port of my application?
I would like to accept https requests in the load balancer (just to enable IAP) but only http in my app? How can I add a forwarding rule that forwards from port 433 of the load balancer to port 80/8080 of the backend service?

Related

AWS Application Load Balancer with SSL Certificate and WAF

i created an architecture for my WebApplication. In Front of my Application which runs on ECS i use an Application Load Balancer configured with an SSL Certificate from Certificate Manager and a Route53 Domain. To secure my ALB i use a WAF associated with my ALB. In my ALB i configured a listener for https and a listener for http, which redirects the traffic to https.
Everything works fine. But i saw that the DNS Name of my Application Load Balancer in the Browser is still available over http and i reach my app over this way through http. How can i deny this connection over the ALB DNS Name or hown can i make it secure? My goal is that all inbound https connections end at the ALB. Then the ALB directs the traffic over http to the Application.
Best regards,
L.J.
You can redirect HTTP to HTTPS as explained in AWS docs:
How can I redirect HTTP requests to HTTPS using an Application Load Balancer?

GCP Http Load Balancer

I have service running in one of my VM port 8088, I want all traffic to be send to this port via my HTTP LOAD BALANCER
Load-Balancer-IP:8088 -> Redirect to my VM port 8088
Load-Balancer-IP-> Redirect to my VM port 8088
How to configure this in gcp load balancer setting currently my configuration look like this
To forward a custom port to your backend, you need to use a tcp load balancer in single region only.
Keep in mind that is not a proxy but a port forwarding and SSL certificate aren't managed on the load balancer. If you want to use one, you have to host and manage it on your VM.

AWS Classic Load Balancer End-to-End Encryption

Is it possible to configure an AWS Classic Balancer to do something like this:
Client <-- SSL (Signed Certificate) --> ELB <-- SSL (Self-Signed Certificate) --> EC2
Looking at listener configurations, it looks like there is a one to one relationship between the listener and the certificate it uses.
If anyone knows how I could achieve this, being pointed to some documentation would also be helpful.
You can create a load balancer that listens on both the HTTP (80) and
HTTPS (443) ports. If you specify that the HTTPS listener sends
requests to the instances on port 80, the load balancer terminates the
requests and communication from the load balancer to the instances is
not encrypted. If the HTTPS listener sends requests to the instances
on port 443, communication from the load balancer to the instances is
encrypted.
Create a Classic Load Balancer with an HTTPS Listener

Does each server (EC2 Node) behind a load balancer need their own SSL certificate?

I have 2 EC2 nodes behind a load balancer.
I need to setup SSL certificate for use with Amazon Web Services.
Does each server behind a load balancer need their own SSL certificate?
Or only the load balancer need the SSL certificate?
You can associate the SSL certificate with the load balancer, and then use either normal HTTP between the Load Balancer and the server, or another form of authentication that is less resource-intensive than SSL.
See:
HTTPS Listeners for Your Classic Load Balancer
HTTPS Listeners for Your Application Load Balancer

Issues with EC2 Load balancer, SNI, multiple SSL domains on the same server

i am having issues setting up an EC2 load balancer, on a instance, that has multiple domains protected by SSL.
Is it possible to make the load balancer pass the HTTPS request as is, and get it decrypted at the server level? If so, how do i set that up?
I have a standard LAMP setup on a EC2.
On your Elastic Load Balancer, configure a TCP listener that listens on port 443 and forwards to port 443 on the instances. This will allow your EC2 instances to perform the SSL termination.
Note that you won't be able to use Sticky Sessions in this configuration.