- Newest
- Most votes
- Most comments
EC2 Instance Endpoint Connect is developed for purpose of connecting EC2 instances in Private Subnet Securely, without a need of Bastion Host/ VPN. It supports only SSH and RDP as of now. It doesn't support any database connectivity as the tools to connect database uses different protocols and handshakes. EC2 Instance Endpoint Connect is designed only to serve purpose to connect to EC2.
For you use case to eliminate the need of EC2 to connect Database, you may optionally set the AWS Client Endpoint VPN.
If someone visiting this post wanted to take a look at how to setup EC2 Endpoint Connect - here is a blog - https://talktechnical.medium.com/aws-ec2-instance-endpoint-connect-no-more-need-of-bastion-host-dd1432e0adcb
Looks like with EC2 Instance Connect Endpoint (EIC Endpoint), customers have SSH and RDP connectivity to their EC2 instances without using public IP addresses currently.
Here, a tunnel connection is not necessary. The primary objective of this feature is to disable the public IP and private key. You can achieve this by simply creating an IAM policy and configuring the security group. For additional details, please refer to this GitHub repository: https://github.com/Joy-karthik/Secure-EIC
Relevant content
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated 7 months ago