Network Considerations Checklist

Before deploying DR infrastructure, verify these network prerequisites:

VPC Structures

  • Both clusters (primary and secondary) have VPC configurations suitable for EKS

  • Each cluster VPC has public subnets (for ALB/NAT) and private subnets (for worker nodes)

  • VPC CIDR blocks do not overlap (if cross-VPC communication required)

  • Verify VPC endpoints for S3 (to avoid NAT charges) are configured if applicable

Cross-Region S3 Access

  • Secondary cluster's IAM role has read access to primary's S3 bucket

  • IAM policy includes specific bucket ARN (not wildcard)

  • IAM policy requires aws:SecureTransport (HTTPS only)

  • Test with: aws s3 ls s3://<primary-bucket>/ --region <secondary-region>

Health Check Connectivity

  • CloudWatch alarm Lambda can reach both cluster ALBs

  • Route53 health check endpoints can reach both ALBs on port 443

  • Security groups allow inbound HTTPS from Route53 health check IPs

  • Health check TLS certificate is valid and matches ALB hostname

DNS Propagation and TTLs

  • Route53 hosted zone is configured and contains failover records for global FQDN

  • Failover record TTL is set appropriately (suggested: 60-180 seconds for faster failover)

  • Primary and secondary health checks are in HEALTHY state initially

  • Verify DNS propagation with: dig <global-fqdn> @<route53-nameserver>

SSL/TLS Certificates

  • ACM certificate or self-signed cert covers global FQDN and cluster-specific FQDNs

  • Certificate is not expired and auto-renewal is configured (if using cert-manager)

  • Ingress TLS configuration references correct certificate

Network Policies (Optional)

  • If using Kubernetes NetworkPolicy, ingress pods are allowed from ALB security group

  • LogScale pods are allowed to reach S3 (typically via VPC endpoint)

  • Egress rules allow DNS resolution (UDP 53) for health checks