AWS::EC2::VPCEndpoint
Specifies a VPC endpoint. A VPC endpoint provides a private connection between your VPC and an endpoint service. You can use an endpoint service provided by AWS, an AWS Marketplace Partner, or another AWS accounts in your organization. For more information, see the AWS PrivateLink User Guide.
An endpoint of type Interface
establishes connections between
the subnets in your VPC and an AWS service, your own service,
or a service hosted by another AWS account. With an interface
VPC endpoint, you specify the subnets in which to create the endpoint and the
security groups to associate with the endpoint network interfaces.
An endpoint of type gateway
serves as a target for a route in your
route table for traffic destined for Amazon S3 or DynamoDB.
You can specify an endpoint policy for the endpoint, which controls access to the
service from your VPC. You can also specify the VPC route tables that use the endpoint.
For more information about connectivity to Amazon S3, see Why can't I connect
to an S3 bucket using a gateway VPC endpoint?
An endpoint of type GatewayLoadBalancer
provides private connectivity
between your VPC and virtual appliances from a service provider.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "Type" : "AWS::EC2::VPCEndpoint", "Properties" : { "PolicyDocument" :
Json
, "PrivateDnsEnabled" :Boolean
, "RouteTableIds" :[ String, ... ]
, "SecurityGroupIds" :[ String, ... ]
, "ServiceName" :String
, "SubnetIds" :[ String, ... ]
, "VpcEndpointType" :String
, "VpcId" :String
} }
YAML
Type: AWS::EC2::VPCEndpoint Properties: PolicyDocument:
Json
PrivateDnsEnabled:Boolean
RouteTableIds:- String
SecurityGroupIds:- String
ServiceName:String
SubnetIds:- String
VpcEndpointType:String
VpcId:String
Properties
PolicyDocument
-
An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints.
For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink. Alternatively, you can include the JSON directly in the YAML, as shown in the following
Properties
section:Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'
Required: No
Type: Json
Update requires: No interruption
PrivateDnsEnabled
-
Indicate whether to associate a private hosted zone with the specified VPC. The private hosted zone contains a record set for the default public DNS name for the service for the Region (for example,
kinesis.us-east-1.amazonaws.com
), which resolves to the private IP addresses of the endpoint network interfaces in the VPC. This enables you to make requests to the default public DNS name for the service instead of the public DNS names that are automatically generated by the VPC endpoint service.To use a private hosted zone, you must set the following VPC attributes to
true
:enableDnsHostnames
andenableDnsSupport
.This property is supported only for interface endpoints.
Default:
false
Required: No
Type: Boolean
Update requires: No interruption
RouteTableIds
-
The IDs of the route tables. Routing is supported only for gateway endpoints.
Required: No
Type: Array of String
Update requires: No interruption
SecurityGroupIds
-
The IDs of the security groups to associate with the endpoint network interfaces. If this parameter is not specified, we use the default security group for the VPC. Security groups are supported only for interface endpoints.
Required: No
Type: Array of String
Update requires: No interruption
ServiceName
-
The name of the endpoint service.
Required: Yes
Type: String
Update requires: Replacement
SubnetIds
-
The IDs of the subnets in which to create endpoint network interfaces. You must specify this property for an interface endpoint or a Gateway Load Balancer endpoint. You can't specify this property for a gateway endpoint. For a Gateway Load Balancer endpoint, you can specify only one subnet.
Required: Conditional
Type: Array of String
Update requires: No interruption
VpcEndpointType
-
The type of endpoint.
Default: Gateway
Required: No
Type: String
Allowed values:
Interface | Gateway | GatewayLoadBalancer
Update requires: Replacement
VpcId
-
The ID of the VPC.
Required: Yes
Type: String
Update requires: Replacement
Return values
Ref
When you pass the logical ID of this resource to the intrinsic Ref
function, Ref
returns the ID of the VPC endpoint.
For more information about using the Ref
function, see Ref
.
Fn::GetAtt
The Fn::GetAtt
intrinsic function returns a value for a specified attribute of this type. The following are the available attributes and sample return values.
For more information about using the Fn::GetAtt
intrinsic function, see Fn::GetAtt
.
CreationTimestamp
-
The date and time the VPC endpoint was created. For example:
Fri Sep 28 23:34:36 UTC 2018.
DnsEntries
-
(Interface endpoints) The DNS entries for the endpoint. Each entry is a combination of the hosted zone ID and the DNS name. The entries are ordered as follows: regional public DNS, zonal public DNS, private DNS, and wildcard DNS. This order is not enforced for AWS Marketplace services.
The following is an example. In the first entry, the hosted zone ID is Z1HUB23UULQXV and the DNS name is vpce-01abc23456de78f9g-12abccd3.ec2.us-east-1.vpce.amazonaws.com.
["Z1HUB23UULQXV:vpce-01abc23456de78f9g-12abccd3.ec2.us-east-1.vpce.amazonaws.com", "Z1HUB23UULQXV:vpce-01abc23456de78f9g-12abccd3-us-east-1a.ec2.us-east-1.vpce.amazonaws.com", "Z1C12344VYDITB0:ec2.us-east-1.amazonaws.com"]
If you update the
PrivateDnsEnabled
orSubnetIds
properties, the DNS entries in the list will change. Id
-
The ID of the VPC endpoint.
NetworkInterfaceIds
-
(Interface endpoints) The network interface IDs. If you update the
PrivateDnsEnabled
orSubnetIds
properties, the items in this list might change.
Examples
Create an interface endpoint
The following example creates an interface endpoint for Amazon CloudWatch Logs in the
current Region. Traffic to CloudWatch Logs from any subnet in the Availability Zones
that contain subnetA
and subnetB
automatically traverses the
interface endpoint.
You can customize the properties of myVPC
, subnetA
,
subnetB
, and mySecurityGroup
as needed. Alternatively,
specify the IDs of existing resources in VpcId
, SubnetIds
,
and SecurityGroupIds
.
YAML
Resources: CWLInterfaceEndpoint: Type: 'AWS::EC2::VPCEndpoint' Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' VpcId: !Ref myVPC PrivateDnsEnabled: true SubnetIds: - !Ref subnetA - !Ref subnetB SecurityGroupIds: - !Ref mySecurityGroup myVPC: Type: 'AWS::EC2::VPC' Properties: CidrBlock: 10.0.0.0/16 EnableDnsSupport: true EnableDnsHostnames: true Tags: - Key: 'Name' Value: 'myVPC' subnetA: Type: 'AWS::EC2::Subnet' Properties: VpcId: !Ref myVPC CidrBlock: '10.0.1.0/24' AvailabilityZone: !Select [ 0, !GetAZs ] subnetB: Type: 'AWS::EC2::Subnet' Properties: VpcId: !Ref myVPC CidrBlock: '10.0.2.0/24' AvailabilityZone: !Select [ 1, !GetAZs ] mySecurityGroup: Type: 'AWS::EC2::SecurityGroup' Properties: GroupDescription: 'Allow HTTPS traffic from the VPC' VpcId: !Ref myVPC SecurityGroupIngress: - IpProtocol: tcp FromPort: 443 ToPort: 443 CidrIp: !GetAtt myVPC.CidrBlock
JSON
{ "Resources": { "CWLInterfaceEndpoint": { "Type": "AWS::EC2::VPCEndpoint", "Properties": { "VpcEndpointType": "Interface", "ServiceName": { "Fn::Sub": "com.amazonaws.${AWS::Region}.logs" }, "VpcId": { "Ref": "myVPC" }, "PrivateDnsEnabled": true, "SubnetIds": [ { "Ref": "subnetA" }, { "Ref": "subnetB" } ], "SecurityGroupIds": [ { "Ref": "mySecurityGroup" } ] } }, "myVPC": { "Type": "AWS::EC2::VPC", "Properties": { "CidrBlock": "10.0.0.0/16", "EnableDnsSupport": true, "EnableDnsHostnames": true, "Tags": [ { "Key": "Name", "Value": "myVPC" } ] } }, "subnetA": { "Type": "AWS::EC2::Subnet", "Properties": { "VpcId": { "Ref": "myVPC" }, "CidrBlock": "10.0.1.0/24", "AvailabilityZone": { "Fn::Select": [ 0, { "Fn::GetAZs": "" } ] } } }, "subnetB": { "Type": "AWS::EC2::Subnet", "Properties": { "VpcId": { "Ref": "myVPC" }, "CidrBlock": "10.0.2.0/24", "AvailabilityZone": { "Fn::Select": [ 1, { "Fn::GetAZs": "" } ] } } }, "mySecurityGroup": { "Type": "AWS::EC2::SecurityGroup", "Properties": { "GroupDescription": "Allow HTTPS traffic from the VPC", "VpcId": { "Ref": "myVPC" }, "SecurityGroupIngress": [ { "IpProtocol": "tcp", "FromPort": 443, "ToPort": 443, "CidrIp": { "Fn::GetAtt": [ "myVPC", "CidrBlock" ] } } ] } } } }
Create a gateway endpoint
The following example creates a gateway endpoint that connects the VPC defined by
myVPC
with Amazon S3 in the current Region. The endpoint
policy allows only the s3:GetObject
action on the specified bucket.
Traffic to Amazon S3 from the subnets that are associated with the route
table specified in RouteTableIds
is automatically routed through the
gateway endpoint.
You can customize the properties of myVPC
, mySubnet
,
myRouteTable
, and mySubnetRouteTableAssociation
as
needed. Alternatively, specify the IDs of existing resources in VpcId
and RouteTableIds
.
YAML
Resources: S3GatewayEndpoint: Type: 'AWS::EC2::VPCEndpoint' Properties: VpcEndpointType: 'Gateway' VpcId: !Ref myVPC ServiceName: !Sub 'com.amazonaws.${AWS::Region}.s3' PolicyDocument: Version: 2012-10-17 Statement: - Effect: Allow Principal: '*' Action: - 's3:GetObject' Resource: - 'arn:aws:s3:::amzn-s3-demo-bucket/*' RouteTableIds: - !Ref myRouteTable myVPC: Type: 'AWS::EC2::VPC' Properties: CidrBlock: '10.0.0.0/16' EnableDnsSupport: true EnableDnsHostnames: true Tags: - Key: 'Name' Value: 'myVPC' mySubnet: Type: 'AWS::EC2::Subnet' Properties: VpcId: !Ref myVPC CidrBlock: 10.0.0.0/24 AvailabilityZone: !Select [ 0, !GetAZs ] myRouteTable: Type: 'AWS::EC2::RouteTable' Properties: VpcId: !Ref myVPC mySubnetRouteTableAssociation: Type: 'AWS::EC2::SubnetRouteTableAssociation' Properties: SubnetId: !Ref mySubnet RouteTableId: !Ref myRouteTable
JSON
{ "Resources": { "S3GatewayEndpoint": { "Type": "AWS::EC2::VPCEndpoint", "Properties": { "VpcEndpointType": "Gateway", "VpcId": { "Ref": "myVPC" }, "ServiceName": { "Fn::Sub": "com.amazonaws.${AWS::Region}.s3" }, "PolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": "*", "Action": [ "s3:GetObject" ], "Resource": [ "arn:aws:s3:::amzn-s3-demo-bucket/*" ] } ] }, "RouteTableIds": [ { "Ref": "myRouteTable" } ] } }, "myVPC": { "Type": "AWS::EC2::VPC", "Properties": { "CidrBlock": "10.0.0.0/16", "EnableDnsSupport": true, "EnableDnsHostnames": true, "Tags": [ { "Key": "Name", "Value": "myVPC" } ] } }, "mySubnet": { "Type": "AWS::EC2::Subnet", "Properties": { "VpcId": { "Ref": "myVPC" }, "CidrBlock": "10.0.0.0/24", "AvailabilityZone": { "Fn::Select": [ 1, { "Fn::GetAZs": null } ] } } }, "myRouteTable": { "Type": "AWS::EC2::RouteTable", "Properties": { "VpcId": { "Ref": "myVPC" } } }, "mySubnetRouteTableAssociation": { "Type": "AWS::EC2::SubnetRouteTableAssociation", "Properties": { "SubnetId": { "Ref": "mySubnet" }, "RouteTableId": { "Ref": "myRouteTable" } } } } }
Create a Gateway Load Balancer endpoint
The following example creates a Gateway Load Balancer endpoint that connects myVPC
with the specified endpoint service in the current Region.
You can customize the properties of myVPC
and mySubnet
as needed.
Alternatively, specify the IDs of existing resources in VpcId
and
SubnetIds
.
YAML
Resources: GWLBEndpoint: Type: 'AWS::EC2::VPCEndpoint' Properties: VpcEndpointType: 'GatewayLoadBalancer' ServiceName: 'com.amazonaws.vpce.${AWS::Region}.vpce-svc-123123a1c43abc123' VpcId: !Ref myVPC SubnetIds: - !Ref mySubnet myVPC: Type: 'AWS::EC2::VPC' Properties: CidrBlock: '10.0.0.0/16' EnableDnsSupport: true EnableDnsHostnames: true Tags: - Key: 'Name' Value: 'myVPC' mySubnet: Type: 'AWS::EC2::Subnet' Properties: VpcId: !Ref myVPC CidrBlock: '10.0.0.0/24' AvailabilityZone: !Select [ 1, !GetAZs ]
JSON
{ "Resources": { "GWLBEndpoint": { "Type": "AWS::EC2::VPCEndpoint", "Properties": { "VpcEndpointType": "GatewayLoadBalancer", "ServiceName": "com.amazonaws.vpce.${AWS::Region}.vpce-svc-123123a1c43abc123", "VpcId": { "Ref": "myVPC" }, "SubnetIds": [ { "Ref": "mySubnet" } ] } }, "myVPC": { "Type": "AWS::EC2::VPC", "Properties": { "CidrBlock": "10.0.0.0/16", "EnableDnsSupport": true, "EnableDnsHostnames": true, "Tags": [ { "Key": "Name", "Value": "myVPC" } ] } }, "mySubnet": { "Type": "AWS::EC2::Subnet", "Properties": { "VpcId": { "Ref": "myVPC" }, "CidrBlock": "10.0.0.0/24", "AvailabilityZone": { "Fn::Select": [ 1, { "Fn::GetAZs": "" } ] } } } } }