I noticed and accidentally clicked the link to “see all regions” in the AWS console on the VPC page. This new feature is interesting.
The only problem is that it tries to connect to every AWS region in the world, creating unnecessary log traffic to unwanted destinations. Traffic should be consolidated and visible only from the current region.
This is going to be problematic for people who monitor DNS and other security logs.
Please resolve this issue so that it consolidates traffic into a state visible from the current region used only by the console visitor.
As you can see, there is now a lot of unnecessary and unwanted traffic in my firewall logs and rules:
I consider this a bug.
Update: Regarding this, I see something I’ve never seen before. When I switch accounts in the AWS console, a connection to a region I’m not operating in appears. Switching accounts also didn’t work properly. I don’t know if it’s related.
Here is the error in the developer tools:
And that:
Follow for updates.
Teri Radichel | © 2nd Sight Laboratory 2023
The best way to support this blog is to sign up for the mailing list and clap for the stories you love. It also helps me figure out what stories people like and what to write about most often. Other ways to track and support are listed below. THANKS!
About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
Author: Cybersecurity for Executives in the Age of Cloud
Presentations…