When ‘worker’ instances are using public IP, NAT, or IGW within a VPC to access S3 buckets within the same region/account, it results in network transfer fees:
If the bucket is in another region or in another account, the transport charges will be incurred anyway.
Using VPC endpoint enables instances to use their private IP to communicate with resources in other services, such as S3, within the AWS network without incurring network transfer fees.
To create a subnet associated with a route table that will direct connections to S3 in the same region as the VPC endpoint:
- In AWS, create a subnet within VPC of the region.
After successful creation, the successful creation message appears.
The subnet is automatically associated with the default route table.
Create a new route table.
Change the subnet association by associating the previously created subnet with this route table.
Create a VPC endpoint for S3 in the region and associate it with the previously created route table.
Choose a region.
Then choose the previously defined route table.
The permissions to access the bucket will be defined by the IAM policies attached to the roles of the N2WS. Grant Full Access.
The route table of the subnet now looks like the following:
If N2WS is in a different account/region/VPC, add to the route table an Internet Gateway so the ‘worker’ can communicate with N2WS. Add the following rule:
The route table will look like:
In this configuration, the connection to S3 will be routed to the VPC endpoint. See Note at the end of this section.
In N2WS, open the Configure workers for S3 operations screen and set this subnet to be used in the specific region and the VPC where it is defined.
For additional information about setting up VPC Gateway Endpoints, see https://docs.aws.amazon.com/vpc/latest/userguide/vpce-gateway.html]]>