AWS Amazon EC2 Endpoint Route Table Association
This page shows how to write Terraform and CloudFormation for Amazon EC2 Endpoint Route Table Association and write them securely.
aws_vpc_endpoint_route_table_association (Terraform)
The Endpoint Route Table Association in Amazon EC2 can be configured in Terraform with the resource name aws_vpc_endpoint_route_table_association
. The following sections describe 4 examples of how to use the resource and its parameters.
Example Usage from GitHub
resource "aws_vpc_endpoint_route_table_association" "s3_public" {
count = var.default_network && var.enable_s3_endpoint ? 1 : 0
vpc_endpoint_id = aws_vpc_endpoint.s3[0].id
route_table_id = aws_route_table.public[0].id
}
resource "aws_vpc_endpoint_route_table_association" "private_s3" {
count = var.create_vpc && var.enable_s3_endpoint ? local.nat_gateway_count : 0
vpc_endpoint_id = aws_vpc_endpoint.s3[0].id
route_table_id = element(aws_route_table.private.*.id, count.index)
}
resource "aws_vpc_endpoint_route_table_association" "private_rtb_a" {
route_table_id = aws_route_table.private_rtb_a.id
vpc_endpoint_id = aws_vpc_endpoint.s3.id
}
resource "aws_vpc_endpoint_route_table_association" "private_rtb_b" {
resource "aws_vpc_endpoint_route_table_association" "private_s3_route" {
count = length(module.vpc.private_route_table_ids)
// count = "2"
vpc_endpoint_id = aws_vpc_endpoint.s3_endpoint.id
route_table_id = module.vpc.private_route_table_ids[count.index]
}
Parameters
-
id
optional computed - string -
route_table_id
required - string -
vpc_endpoint_id
required - string
Explanation in Terraform Registry
Manages a VPC Endpoint Route Table Association
Tips: Best Practices for The Other AWS Amazon EC2 Resources
In addition to the aws_default_vpc, AWS Amazon EC2 has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
aws_default_vpc
Ensure to avoid using default VPC
It is better to define the own VPC and use it.
aws_network_acl_rule
Ensure your network ACL rule blocks unwanted inbound traffic
It is better to block unwanted inbound traffic.
aws_ebs_volume
Ensure to use a customer-managed key for EBS volume encryption
It is better to use a customer-managed key for EBS volume encryption. It can be gain more control over the encryption by using customer-managed keys (CMK).
aws_instance
Ensure to avoid storing AWS access keys in user data
It is better to avoid storing AWS access keys in user data. `aws_iam_instance_profile` could be used instead.
aws_security_group
Ensure your security group blocks unwanted inbound traffic
It is better to block unwanted inbound traffic.
AWS::EC2::VPCEndpoint (CloudFormation)
The VPCEndpoint in EC2 can be configured in CloudFormation with the resource name AWS::EC2::VPCEndpoint
. The following sections describe 10 examples of how to use the resource and its parameters.
Example Usage from GitHub
Type: "AWS::EC2::VPCEndpoint"
Properties:
ServiceName: !Join
- ""
- - "com.amazonaws."
- !Ref "AWS::Region"
Type: "AWS::EC2::VPCEndpoint"
Properties:
RouteTableIds:
- { "Fn::ImportValue": !Sub "${PJPrefix}-private-route-a" }
- { "Fn::ImportValue": !Sub "${PJPrefix}-private-route-c" }
ServiceName: !Sub "com.amazonaws.${AWS::Region}.s3"
Type: AWS::EC2::VPCEndpoint
Properties:
ServiceName: !Sub com.amazonaws.${AWS::Region}.s3
VpcEndpointType: Gateway
VpcId: !Ref VPC
RouteTableIds:
Type: AWS::EC2::VPCEndpoint
Properties:
SecurityGroupIds:
- Fn::ImportValue:
!Sub ${SecurityStack}-SgEndpoint
ServiceName: !Join
Type: AWS::EC2::VPCEndpoint
Properties:
ServiceName: !Sub com.amazonaws.${AWS::Region}.ssm
VpcEndpointType: Interface
PrivateDnsEnabled: true
VpcId: !Ref VPC
"Type": "AWS::EC2::VPCEndpoint",
"Properties": {
"PrivateDnsEnabled": true,
"SecurityGroupIds": [
"sg-test"
],
"Type": "AWS::EC2::VPCEndpoint",
"Properties": {
"RouteTableIds": [
{
"Fn::ImportValue": {
"Fn::Sub": "ControlledARouteTable${VPCIdentifier}"
"Type": "AWS::EC2::VPCEndpoint",
"Properties": {
"RouteTableIds": [
{
"Fn::ImportValue": {
"Fn::Sub": "ControlledARouteTable${VPCIdentifier}"
"Type": "AWS::EC2::VPCEndpoint",
"Properties": {
"PolicyDocument": {
"Version": "2012-10-17",
"Statement": [
{
"Type": "AWS::EC2::VPCEndpoint",
"Properties": {
"RouteTableIds": [
{
"Fn::ImportValue": {
"Fn::Sub": "ControlledARouteTable${VPCIdentifier}"
Parameters
-
PolicyDocument
optional - Json -
PrivateDnsEnabled
optional - Boolean -
RouteTableIds
optional - List -
SecurityGroupIds
optional - List -
ServiceName
required - String -
SubnetIds
optional - List -
VpcEndpointType
optional - String -
VpcId
required - String
Explanation in CloudFormation Registry
Specifies a VPC endpoint for a service. An endpoint enables you to create a private connection between your VPC and the service. The service may be provided by AWS, an AWS Marketplace Partner, or another AWS account. For more information, see VPC Endpoints in the AWS PrivateLink User Guide.
A
gateway
endpoint serves as a target for a route in your route table for traffic destined for the AWS service. You can specify an endpoint policy to attach to the endpoint, which controls access to the service from your VPC. You can also specify the VPC route tables that use the endpoint.For information about connectivity when you use a gateway endpoint to connect to an Amazon S3 bucket from an EC2 instance, see Why can’t I connect to an S3 bucket using a gateway VPC endpoint.
An
interface
endpoint is a network interface in your subnet that serves as an endpoint for communicating with the specified service. You can specify the subnets in which to create an endpoint, and the security groups to associate with the endpoint network interface.A
GatewayLoadBalancer
endpoint is a network interface in your subnet that serves an endpoint for communicating with a Gateway Load Balancer that you've configured as a VPC endpoint service.
Frequently asked questions
What is AWS Amazon EC2 Endpoint Route Table Association?
AWS Amazon EC2 Endpoint Route Table Association is a resource for Amazon EC2 of Amazon Web Service. Settings can be wrote in Terraform and CloudFormation.
Where can I find the example code for the AWS Amazon EC2 Endpoint Route Table Association?
For Terraform, the ardikabs/terraform-aws-vpc, ArtiTenable/test123 and kaysal/cloud-networking source code examples are useful. See the Terraform Example section for further details.
For CloudFormation, the lightbitbird/simple-web-vpc-cloudformation, fujisawatk/merpochi_server and nkhine/ec2-spot-cicd source code examples are useful. See the CloudFormation Example section for further details.