I have two sets of systems, in two different availability zones each with their own security groups A and B.
In the security group for zone A, I create an inbound rule that allows all incoming traffic from VMs in the zone B security group.
This works for the private IPs: VMs in B can connect to VMs in A when using private IPs of A. However this does not work for the public IPs.
Now, I understand why it doesn't work (AWS security group that allows instances within VPC to connect doesn't work over public IP), but is there a simple way to configure the zone A security group so that all public IPs associated with security group B would also be allowed?
That is, without tracking the public IPs and manually (or via API) maintaining them in the inbound rules next to the 'security group B' rule?