configuring-vpc-endpoints-for-private-aws-service-access

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Configuring VPC Endpoints for Private AWS Service Access

为私有AWS服务访问配置VPC端点

Overview

概述

Domain expertise for configuring VPC endpoints to enable private access to AWS services without routing traffic through the internet. Covers both gateway endpoints (S3, DynamoDB) and interface endpoints (EC2, SSM, Secrets Manager, etc.) powered by AWS PrivateLink.
本内容专注于配置VPC端点以实现无需通过互联网路由流量即可私有访问AWS服务的相关专业知识。涵盖由AWS PrivateLink提供支持的网关型端点(S3、DynamoDB)和接口型端点(EC2、SSM、Secrets Manager等)。

Configure VPC endpoints

配置VPC端点

To create and configure VPC endpoints for private AWS service access, follow the procedure exactly. See VPC endpoints configuration procedure.
要创建并配置用于私有AWS服务访问的VPC端点,请严格遵循以下步骤。详见VPC端点配置步骤

Troubleshooting

故障排查

Endpoint not available

端点不可用

Check security group rules, subnet configurations, and service availability in the region.
检查安全组规则、子网配置以及该区域内的服务可用性。

DNS resolution issues

DNS解析问题

Verify DNS hostnames and DNS resolution are enabled on the VPC and that the DHCP options set has correct domain name servers.
确认VPC上已启用DNS主机名和DNS解析,且DHCP选项集配置了正确的域名服务器。

Connection timeouts

连接超时

Verify security group rules allow HTTPS traffic (port 443) and route tables are properly configured for gateway endpoints.
确认安全组规则允许HTTPS流量(443端口),且网关型端点的路由表已正确配置。

Policy restrictions

策略限制

Review endpoint policies — default policies allow all access, but custom policies may be restrictive.
检查端点策略——默认策略允许所有访问,但自定义策略可能存在限制。