Skip to content

Conversation

evermbr
Copy link

@evermbr evermbr commented Sep 12, 2025

Description

This change is to disable DNS64 on the private subnets. DNS64 is only needed on the subnets if you are running IPv6 only workloads in the subnet that need to communicate to IPv4 endpoints. Since the CNI plugin is installed (and recommended) on the EKS cluster, the pods have both an IPv4 and IPv6 address. Thus, when DNS64 is enabled on the subnet and a pod is looking to communicate with an only IPv4 endpoint (like a DynamoDB Gateway endpoint) a synthesized IPv6 address is returning thus causing the pod to use the IPv6 address (since it prefers it) which then causes the traffic to go to the NAT Gateway to do the NAT64 translation. This flow through the NAT Gateway, while it works, will unnecessarily drive up NAT Gateway usage.

Motivation and Context

This issue was encountered by a customer and worked with EKS and Networking SMEs to resolve. The customer had noticed their NAT Gateway usage spiking unexpectedly and after reviewing their setup and many tests, we identified the above as the issue.

How was this change tested?

  • Yes, I have tested the PR using my local account setup (Provide any test evidence report under Additional Notes)
  • [N/A] Yes, I have updated the docs for this feature
  • [?] Yes, I ran pre-commit run -a with this PR

Additional Notes

Ran the TF plan and apply and validated that only the private subnets now have DNS64 disabled after the change.

@evermbr evermbr requested a review from a team as a code owner September 12, 2025 15:55
@evermbr evermbr changed the title Updated VPC configuration to disable DNS64 on the private subnets feat: Updated VPC configuration to disable DNS64 on the private subnets Sep 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant