Thanks for the clarification. Let me restate my use case more accurately.
The endpoints
- https://hospital1.xxx.example.com
- https://hospital2.xxx.example.com
are not external/public services.
These are services hosted on IoT devices, where each device is running a Ziti tunneler and binding a Ziti service.
Those services are already reachable over Ziti today.
My goal is simply:
An application running in an AWS Fargate task should dial those existing Ziti services hosted by the IoT devices.
Today, to make this work without changing the application URLs, I point
hospital*.xxx.example.com in Route 53 to an IP that forwards traffic to a Ziti router running on EC2.
This allows my app to continue using the same URLs, but it introduces an EC2-based entry point that I would like to eliminate for scalability and operational reasons.
What I would ideally like is:
From inside the Fargate task, my application continues to call:
- https://hospital1.xxx.example.com
- https://hospital2.xxx.example.com
and those calls are routed to the corresponding Ziti services (bound on the IoT devices) via a Ziti tunnel running in the Fargate task (sidecar or separate task), without relying on an external IP or router front-end.
Given the Fargate constraints (no privileged containers / no tproxy), can you confirm whether it is possible to:
hospital1.xxx.example.com → Ziti tunnel/proxy inside the Fargate task → Ziti service bound on the IoT device
hospital2.xxx.example.com → Ziti tunnel/proxy inside the Fargate task → Ziti service bound on the IoT device
while keeping the same hostnames and URLs in the application?
From your earlier explanation, it sounds like the answer is no, and that the only supported pattern on Fargate is:
application → local TCP port(s) exposed by "ziti tunnel proxy" → Ziti service
I would appreciate confirmation specifically for this “existing DNS names for IoT-bound Ziti services” scenario.
Thank you.