Private Link cross region cross account support

0

Hi, we are trying to implement private link with cross region and cross account solution, however we are not able to get if it is supported by aws or not.

Could you please confirm the same . Thanks

질문됨 2년 전2960회 조회
2개 답변
0

Hello,

Endpoint services are available in the AWS Region in which they are created and can be accessed in remote AWS Regions using Inter-Region VPC Peering.

The flow would look like this:

Consumer VPC (Region A) ---PrivateLink---> NLB in Provider VPC (Region A) <---Inter-Region VPC Peering---> Endpoints in Provider VPC (Region B)

See the 'Inter-Region Endpoint Services' pattern - https://d1.awsstatic.com/whitepapers/aws-privatelink.pdf

Also see this: https://aws.amazon.com/about-aws/whats-new/2018/10/aws-privatelink-now-supports-access-over-inter-region-vpc-peering/

profile pictureAWS
전문가
답변함 2년 전
  • So if I have an Account A (region -A ) and I have account B (region B) then this will not work?

    I was able to create Account A (region -A ) and I have account B (region A) and private link works fine.

  • Hi, That should work also (see this - https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/peer-with-vpc-in-another-account.html) If you found the answer useful please accept the answer. Thank you.

  • Tushar_J can you elaborate a bit more? I have a similar use-case, where I have (eu-central-1) API Gateway w/ mTLS --> NLB --> ALB --> ECS

    I want to have something like: (ap-south-1) API Gateway w/ mTLS --> NLB --> PrivateLink --> (eu-central-1)ALB -- ECS

    This is for the same account, but different regions. I am struggling with this for a while, and I tried different combinations that don't work. I tried VPC peering, tried VPC endpoints, but I am missing something. I either cannot connect to a service, or cannot create the target. Ideally it would be (ap-south-1) API Gateway w/ mTLS --> PrivateLink --> (eu-central-1) NLB --> ALB --> ECS and continue the flow there, but that's not working. Either the VPC Link cannot be created, or the target does not exist in the region..

0

Hello, it is possible via let's name it shared VPC, where VPC Endpoint (from AWS service or from PrivateLink) is deployed.

Let's presume you have a bucket to share in region A to region B and region C. All 3 VPC (region A,B,C) are connected via TGW.

In nutshell you need to create an VPC endpoint in VPC Region A , and have your VPCs in other regions be capable to resolve this endpoint with the private IP address in VPC Region A, so your TGW will route your requests to this endpoint in VPC Region A from others.

To do it:

  1. Create a VPC endpoint in VPC in region A and disable private DNS for it.
  2. Create Route 53 PHZ in same VPC in region A and create an alias record that will point to the VPC endpoint (for example s3.us-east-1.amazonaws.com -> to the vpc-endpoint.name).
  3. Associate this Route53 PHZ with VPCs in region B and region C.

Described here: https://docs.aws.amazon.com/whitepapers/latest/building-scalable-secure-multi-vpc-network-infrastructure/centralized-access-to-vpc-private-endpoints.html

https://aws.amazon.com/blogs/networking-and-content-delivery/integrating-aws-transit-gateway-with-aws-privatelink-and-amazon-route-53-resolver/

답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠