A VPC Endpoint lets your VPC privately access AWS services without using the Internet, NAT Gateway, or IGW.
There are two types:
- 🧩 Interface Endpoint
- 🚪 Gateway Endpoint
👉 AWS PrivateLink is the technology behind Interface Endpoints.
🔹 What it is
- Creates Elastic Network Interfaces (ENIs) in your subnet
- You access services using private IPs
- Uses AWS PrivateLink
🔹 Supported services
- Most AWS services: SSM, EC2 API, CloudWatch, ECR, Secrets Manager
- Your own services (via NLB)
- SaaS / third-party services
🔹 Key points
- Works across VPCs and accounts
- Uses Security Groups
- Charged per hour + per GB
🎨 Diagram
🧠 When to use
✅ Private access to AWS services
✅ Expose your service to other VPCs safely
✅ No CIDR overlap issues
🔹 What it is
- Adds routes in your route table
- No ENIs, no Security Groups
Only supports:
- 🪣 S3
- 📦 DynamoDB
- Free
- Scales automatically
- Traffic stays inside AWS network
🎨 Diagram
🧠 When to use
✅ Access S3/DynamoDB privately
✅ Cheapest & simplest option
🔹 What it really is
PrivateLink = Secure service exposure using Interface Endpoints
Think of it as:
“I want to expose my service privately without opening my VPC.”
🎨 Diagram
🧠 When to use
✅ SaaS-like architecture
✅ Cross-account secure access
✅ No VPC peering / no CIDR worries
🔹 What it is
- 1-to-1 private connection between two VPCs
- Uses private IPs
- No transitive routing
🔹 Key points
- Simple, but doesn’t scale well
- CIDR must not overlap
- No Security Group referencing across VPCs
🎨 Diagram
🧠 When to use
✅ Small number of VPCs
✅ Full network-level access
🔹 What it is
- Dedicated physical connection
- From on-premises → AWS
- Bypasses public internet
🔹 Key points
- Very low latency
- High bandwidth (1–100 Gbps)
- Costly but stable
🎨 Diagram
🧠 When to use
✅ Hybrid cloud
✅ Predictable latency & bandwidth
✅ Enterprise workloads
| Feature | Interface Endpoint | Gateway Endpoint | PrivateLink | VPC Peering | Direct Connect |
|---|---|---|---|---|---|
| Internet needed | ❌ | ❌ | ❌ | ❌ | ❌ |
| ENI used | ✅ | ❌ | ✅ | ❌ | ❌ |
| Route table change | ❌ | ✅ | ❌ | ✅ | ❌ |
| Security Groups | ✅ | ❌ | ✅ | ❌ | ❌ |
| Cross-account | ✅ | ❌ | ✅ | ⚠️ | ✅ |
| CIDR overlap OK | ✅ | ✅ | ✅ | ❌ | ✅ |
| Typical use | AWS services | S3/DDB | SaaS / APIs | VPC-to-VPC | On-prem |
- 🧩 Interface Endpoint → “ENI + Private IP”
- 🚪 Gateway Endpoint → “Route table only”
- 🔒 PrivateLink → “Secure service publishing”
- 🔗 VPC Peering → “Flat VPC connection”
- ⚡ Direct Connect → “Private fiber to AWS”
No comments:
Post a Comment