Launching workloads without internet access #2378
Replies: 2 comments 2 replies
-
Thanks for posting this. it looks like exactly what we need to satisfy some security requirements we have which stipulate that we shouldn't have overly permissive ingress or egress rules on our service environment. However, I'm not sure how to apply the above. We have load-balanced web service, do we need to add the above templates to the Alternatively, is it possible to add the VPC endpoints to our existing VPC using overrides? |
Beta Was this translation helpful? Give feedback.
-
Hello @misaka.
I think for existing environment with services already deployed in, it makes more sense to add VPC endpoints through addons instead of sub. the VPC by importing an existing one, since otherwise you would have to remove all the deployment before replacing the VPC. |
Beta Was this translation helpful? Give feedback.
-
Copilot enables you to launch tasks in private subnets (whether your workload is a scheduled job, load-balanced web service, or backend service), automatically creating NAT gateways for internet connectivity.
However, isolated tasks that are not internet-facing do not need NAT gateways; instead they require VPC Endpoints to communicate with other AWS services. You can import an existing VPC with the necessary endpoints, and specify
private
subnet placement in your service or job manifest.Not sure what resources you'll need? Use this template:
Add more VPC endpoints depending on which services you need access to.
For Systems Manager (to enable exec functionality and more):
For Secrets Manager:
For Key Management Service:
For Auto Scaling:
To connect to an Elastic File System volume:
For DynamoDB, you’ll need another gateway endpoint (like S3, above):
For RDS/Aurora:
Beta Was this translation helpful? Give feedback.
All reactions