DEV Community

Josh Burgess
Josh Burgess

Posted on • Originally published at awstip.com on

AWS PrivateLink in a Straightforward Setup


Photo by Mehmet Ali Peker on Unsplash

Tips and Thought-Tricks from personal experience with PrivateLink and VPC Endpoints/Endpoint Services

One of the most useful services, and yet seemingly complex, is AWS PrivateLink. The service itself is more of a design pattern in which you make a PrivateLink via VPC (Virtual Private Cloud) endpoints and endpoint services. With this combination, you can provide a connection between VPCs without peering or a Transit Gateway over AWS Backbone (their internet, not the public), this includes a connection between two VPCs in separate AWS accounts.

Why Would You Need This?

The advantage of using AWS PrivateLink is greater security, between AWS Partners, AWS Marketplace, your on-prem servers, and between VPCs both within the same account or between accounts. This can apply the other way too, where you can provide services from your VPC to customers while staying compliant with HIPAA, PCI, and other regulations.


Diagram of a PrivateLink from an EC2 instance to an RDS Proxy

There are a couple of ways to go about creating your own SaaS and providing it to customers in AWS, one is with API Gatways, and the other is through PrivateLink. A common scenario faced is with ETL/ELT (Extract Load Transform) tools like Glue or Airbyte that live in an AWS Organization’s dedicated Data Engineering account and need to extract data from an RDS instance in a different account that may be affiliated with an application that the company has. PrivateLink can have multiple consumers while it has a single producer and eliminates the worry of CIDR overlap in your networks.

What about VPC Peering and Transit Gateways?

These two other AWS services may seem to provide a similar solution to what PrivateLink does at a glance, however, the biggest difference is the communication direction. PrivateLink is a unidirectional communication between services, a consumer in one VPC is consuming the service in a producer VPC, but the producer cannot consume anything from the consumer’s VPC. Both VPC Peering and Transit Gateway services provide Layer 3 bidirectional communication, meaning, that services in each VPC can talk to one another. VPC Peering and Transit Gateways can talk across regions, unlike PrivateLink.

VPC Peering is a full-mesh architecture that allows your VPCs to act as if they are inside each other. When scaling these VPCs you may want to peer another, or maybe 3 others. Each VPC would have to peer each other to fully talk with each other.


VPC Peering Connection

Something that solves this scenario and reduces overhead is the Transit Gateway. A Transit Gateway provides a hub-and-spoke model of allowing VPCs to connect. This solution is more scalable, although could introduce a small amount of latency with the network hops. Combining these services with other networking services like Direct Connect for your main office and a VPN for your branches can open up hybrid cloud opportunities and create a global network for your business.


Global Network for a corporation can be established with these services

Let’s Establish some PrivateLinks


The solution we will implement allowing Glue to connect to the RDS instance

Requirements

As a preface, the RDS and IAM configuration does not follow the best practices guidelines around the least-privileged since this is for demonstration purposes, if you would like to use this for production use, I encourage modifying the IAM policy for the secret and modifying the RDS instance to suit your needs. This includes upgrading the encryption for the proxy and RDS instance.

Producer Account

First, we will start with the producer account. Run these commands to get to the example code:

cd medium-tutorials/privatelink/producer
# The Profile of your AWS cli refer to this for sso or use iam access keys 
# https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html
pulumi config set aws:profile account1-profile-producer
pulumi up
# If it fails, rerun, there may have been a race condition 😬
Enter fullscreen mode Exit fullscreen mode

You should have the following created in your account:

  • RDS with a Postgres Engine and MD5 password encryption with a custom parameter group
  • RDS Proxy and Subnet Group
  • Secrets Manager Secret for DB password and username
  • A VPC
  • Two Subnets
  • Security Groups for the DB and proxy

Once you have confirmed this we can start setting up our PrivateLink! We first need to identify the IP addresses assigned to the RDS Proxy endpoint, and for this, you will need a CLI network tool such as dig .

  1. On the Amazon RDS console, choose Proxies in the navigation pane.
  2. Choose the proxy and locate the endpoint , copy this for later
  3. Next you will want to modify the proxy to use MD5 as the authentication encryption method, this is a work around for the tutorial
  4. Use a networking CLI tool, such as dig, to find the proxy IP addresses: dig db-proxy.proxy-cfic8466upy8.us-east-1.rds.amazonaws.com

Note these IPs, you will need them later

Target Group

These next 3 services combined create the PrivateLink endpoint for a producer account, the one that is providing a service.

  1. In EC2, go to the Target Groups section
  2. Create a Target Group with IP Addresses
  3. Change the protocol to TCP and change the port to 5432 (the default Postgres port)
  4. Select the producer-vpc, click Next
  5. Use the IP’s noted from the previous step


The Health Checks will pass as soon as the NLB is set

Network Load Balancer

Next, let’s create a Network Load Balancer and its Security Group to route the traffic coming into our VPC to the correct service / Target Group.

To create the Security Group :

  1. In the EC2 Console, choose Security Groups and click Create Security Group
  2. Give it a name and description and choose the producer-vpc
  3. Add an inbound rule to receive 5432 traffic from the VPC CIDR range
  4. For the outbound rule , change the port to 5432 and the destination to the proxy security group
  5. Create descriptions as needed
  6. Go to the proxy security group , and click Edit inbound rules
  7. Delete the current Inbound Rule and Add a new one allowing port 5432 from the new Security Group we created for the Load Balancer


This is the Outbound rule for the Network Load Balancer Security Group

To create the Load Balancer :

  1. In EC2 Console, choose Load Balancers and Create Load Balancer
  2. Choose Network Load Balancer , give it a name, and select Internal for the scheme
  3. Select the producer-vpc and both AZs that show up (make sure the subnets are private)
  4. For the Security Group , make sure to click the one we just created in the previous step
  5. In the Listeners section, change the protocol to TCP and port 5432 and select the Target Group from the previous step for the default action.
  6. Click Create Load Balancer at the bottom, it may take a minute to provision


Active NLB, check the target group, which should also be healthy now!

Endpoint Service

This is the next piece where our previous work all comes together, creating the Endpoint Service

  1. On the Amazon VPC console, choose Endpoint Services and click Create Endpoint Service
  2. Give it a name, select Network for Load Balancer Type, and select the NLB we created in the previous step, all else can stay default, and click Create
  3. In the Allow Principals tab, select Allow Principals, and enter your consumer account arn arn:aws:iam:::root . This can be more restrictive against a given role or user too.
  4. Copy the Service Name for the next step

Consumer Account

Now let’s log into the consumer account as well as run these commands to spin up our network:

cd medium-tutorials/privatelink/consumer
pulumi config set aws:profile account2-profile-consumer
pulumi up
Enter fullscreen mode Exit fullscreen mode

The following should have been created in this new consumer account:

  • A VPC
  • A Subnet
  • A Security Group for Glue

VPC Endpoint and Accepting Connection

In your consumer AWS account, we will use Glue as an ETL tool and connect with a jdbc connector string to the Postgres db in our other AWS account! Let’s begin by creating a Security Group for the soon-to-come VPC Endpoint. Note that the Glue Security Group needs all ports inbound and outbound but uses the source for both as the same security groups.

Go to the Amazon VPC Console, navigate to the Endpoints screen, and click Create Endpoint

  1. Provide a name, and select Other endpoint services under the Service category
  2. For the Service name under Service settings , provide the Service Endpoint Name you copied from the previous section and click Verify Service
  3. Select the consumer-vpc and one subnet will be grey while the other can be selected, select the one available , the other is to demonstrate how the Endpoint and Service Endpoint need the same AZs for connectivity.
  4. Select the Security Group for the endpoint (endpoint is in the name) and click Create endpoint

In the other account, we will have to accept/approve the connection of this endpoint and add inbound 5432 from the consumer CIDR to the NLB Security Group.

  1. Log back into the producer account
  2. Navigate to the VPC Console and Endpoint Services
  3. Go to the Endpoint Connections tab, click the Actions tab, and Accept the endpoint connection request
  4. After a few minutes, you should see Pending change to Available

Test the connection

Now we can go test out our connection from Glue! You will want to note down the RDS Database Identifier before we log back into the consumer account. The other info we need is the endpoint DNS name , which is the first in the list, and head over to the AWS Glue Console.

  1. Click Data Connections , and select the Create Connection button in the bottom pane
  2. In the grid, select JDBC and ** Next**
  3. Add the jdbc url: jdbc:postgresql://:5432/ and the username and password for the database, which can be found in the producer code in my git repo (since this is a non-secure tutorial) or in the secrets manager the “dbpassword” is created
  4. You will need to add Network options at the bottom
  5. Select the consumer-vpc in the drop-down, select the private subnet and Glue Security Group, and click ** Next**
  6. Name the connector, you cannot change this later, and Create
  7. Last but not least, select the connection at the bottom of the window, click the Actions drop-down, select Test Connection, then select th e Glue Service Role (If this does not exist you can create a new role with the AWSGlueServiceRole policy attached and AmazonS3FullAccess policy ) If you get an error about the NAT Gateway or s3 endpoint, check that the subnet has the route table associated with it.


Successful connection, go Glue some data!

Success, you can now use a Glue Crawler or Glue ETL Job to extract data from the remote database securely!

Clean Up

To clean up this solution, you will just need to delete the resources we created in this example (endpoint, endpoint service, nlb, security groups, and target group, the rds database may need manually destroyed as well). The networking and instances can be deleted via pulumi destroy in the consumer and producer directories.

I tried this solution out with MySQL, and an issue arose with the “user@host” pattern. The host would need to change to the CIDR of the consumer VPC or a wildcard. To change this, we would need a Bastion Host to connect a MySQL client to the database. Since this is a tutorial, I wanted to keep as minimal resources as possible, but feel free to experiment!

Conclusion

PrivateLink lets you securely connect to separate VPCs keeping your traffic within AWS Backbone. This can be beneficial for exposing SaaS applications to developers using AWS, or even ensuring security between your own AWS accounts when using ELT/ETL tools. The PrivateLink connection is not limited to AWS Services, for you can set it up so that an EC2 instance running a service you created can be consumed, or you will commonly find PrivateLink as an option to consume your AWS Marketplace offerings. I hope this will help you in your journey to create the next big SaaS product!

References


Top comments (0)