{"id":48927,"date":"2025-04-01T06:06:39","date_gmt":"2025-04-01T06:06:39","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=48927"},"modified":"2026-02-21T07:27:15","modified_gmt":"2026-02-21T07:27:15","slug":"aws-tutorials-vpc-privatelink-and-lattice-complete-guide","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/aws-tutorials-vpc-privatelink-and-lattice-complete-guide\/","title":{"rendered":"AWS Tutorials: VPC &#8211; PrivateLink and Lattice Complete Guide"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.rajeshkumar.xyz\/blog\/wp-content\/uploads\/2025\/04\/ChatGPT-Image-Apr-1-2025-03_37_56-PM-683x1024.png\" alt=\"\" class=\"wp-image-857\"><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"1024\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2025\/04\/image-468x1024.png\" alt=\"\" class=\"wp-image-48928\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2025\/04\/image-468x1024.png 468w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2025\/04\/image-137x300.png 137w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2025\/04\/image.png 596w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p>Let\u2019s start from the basics and build up a <strong>clear understanding<\/strong> step-by-step.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 Step 1: Understanding the Core Networking Concepts<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>VPC Network (Virtual Private Cloud)<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <strong>VPC<\/strong> is a logically isolated network in AWS where you can launch and manage AWS resources (EC2, RDS, etc.).<\/li>\n\n\n\n<li>Think of it like your own private data center in the cloud.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\ud83d\udd39 <em>Example:<\/em> You create a VPC with two subnets (one public and one private) to host a web app and a database.<\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>AWS Network<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This refers to <strong>AWS\u2019s global cloud infrastructure<\/strong>, which includes services like S3, DynamoDB, Lambda, etc., hosted and maintained by AWS.<\/li>\n\n\n\n<li>AWS services are available across <strong>Regions<\/strong> and <strong>Availability Zones<\/strong>.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\ud83d\udd39 <em>Example:<\/em> S3 is an AWS-managed service hosted outside your VPC, but you can access it via the internet or a VPC Endpoint.<\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Public Internet Network<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>Internet<\/strong> connects devices globally, including cloud services.<\/li>\n\n\n\n<li>Accessing AWS services like S3 without a VPC endpoint requires routing traffic over the <strong>public internet<\/strong>.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\ud83d\udd39 <em>Example:<\/em> Without a VPC endpoint, your EC2 in a private subnet will require a <strong>NAT gateway<\/strong> to access S3 over the internet.<\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 Now, Let\u2019s Simplify Each VPC-related AWS Networking Service<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>1. AWS VPC Endpoints<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>Privately connects your VPC to AWS services like S3 or DynamoDB without using the public internet.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>Your EC2 in a private subnet accesses an S3 bucket using a VPC endpoint instead of the internet.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>2. AWS VPC Endpoint Services (PrivateLink)<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>Expose your <strong>own application<\/strong> as a <strong>service<\/strong> that other VPCs can privately access.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>Your team builds a billing API and exposes it as a PrivateLink service to customer VPCs.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>3. AWS VPC Service Networks (Lattice Feature)<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>Logical grouping of services exposed via VPC Lattice; allows centralized control and access.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>You manage all your microservices and access policies across VPCs using a single service network.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>4. AWS VPC Lattice Services<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>Managed service mesh for service-to-service communication across VPCs\/accounts.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>A frontend service in VPC-A communicates securely with an order service in VPC-B using Lattice.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>5. AWS VPC Target Groups<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>A group of compute targets (like EC2, Lambda) used by a load balancer to route traffic.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>A load balancer distributes traffic to EC2 instances in a target group running your app.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>6. AWS VPC Resource Configurations<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>A resource or group of resources in a VPC that you want to expose\/share securely.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>You define a resource configuration for a database cluster that can be shared with another account.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 <strong>7. AWS VPC Resource Gateways<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Definition<\/strong><\/th><th>Entry points into your VPC that route traffic to the resources defined in resource configurations.<\/th><\/tr><\/thead><tbody><tr><td><strong>Example<\/strong><\/td><td>You create a gateway for partners to access only the analytics dashboard inside your VPC.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 Use Case Table (Minimum 5 per service)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Service<\/strong><\/th><th><strong>Use Cases<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>VPC Endpoints<\/strong><\/td><td>1. EC2 accessing S3 privately 2. Lambda accessing DynamoDB without internet 3. Secure data sync between services 4. Accessing AWS API Gateway privately 5. Cost-effective internal service access<\/td><\/tr><tr><td><strong>Endpoint Services<\/strong><\/td><td>1. Expose internal database as service 2. Share microservices across VPCs 3. Build SaaS with customer-specific access 4. ISV exposing ML inference APIs 5. Analytics team providing a private BI tool<\/td><\/tr><tr><td><strong>Service Networks<\/strong><\/td><td>1. Group all services in a dev environment 2. Group backend services in prod 3. Apply access policy to multiple services 4. Control audit and access at group level 5. Multi-VPC observability via Lattice<\/td><\/tr><tr><td><strong>Lattice Services<\/strong><\/td><td>1. Service mesh across multiple accounts 2. Secure microservice calls with auth 3. Fine-grained service-to-service policies 4. Route requests from UI \u2192 API \u2192 DB 5. Simplified network for container apps<\/td><\/tr><tr><td><strong>Target Groups<\/strong><\/td><td>1. Load balance between EC2 instances 2. Route based on path (e.g., \/api vs \/web) 3. Blue\/Green deployments 4. Fargate service traffic routing 5. Auto scaling backend services<\/td><\/tr><tr><td><strong>Resource Configurations<\/strong><\/td><td>1. Share one RDS database only 2. Expose app to internal departments 3. Grant partner VPC access to dashboard 4. Share reporting tools without full VPC access 5. Central resource config management<\/td><\/tr><tr><td><strong>Resource Gateways<\/strong><\/td><td>1. Controlled access for partner accounts 2. Entry point for federated services 3. Centralized ingress for a region 4. Apply fine-grained policies per gateway 5. Reduce blast radius of access<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd04 Interdependencies &amp; Connections Between Services<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Service<\/strong><\/th><th><strong>Connected\/Dependent On<\/strong><\/th><\/tr><\/thead><tbody><tr><td>VPC Endpoints<\/td><td>AWS-managed services like S3, DynamoDB<\/td><\/tr><tr><td>VPC Endpoint Services<\/td><td>PrivateLink, used by clients with Interface Endpoints<\/td><\/tr><tr><td>VPC Service Networks<\/td><td>Used with VPC Lattice Services<\/td><\/tr><tr><td>VPC Lattice Services<\/td><td>Uses Service Networks, integrates with IAM, Route tables<\/td><\/tr><tr><td>VPC Target Groups<\/td><td>Used by Load Balancers, sometimes with Lattice<\/td><\/tr><tr><td>Resource Configurations<\/td><td>Requires Resource Gateways to expose resources<\/td><\/tr><tr><td>Resource Gateways<\/td><td>Depends on Resource Configurations<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>\u2705 <strong>Key Relationships:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>VPC Endpoint Services<\/strong> \u21c4 <strong>VPC Endpoints<\/strong><\/li>\n\n\n\n<li><strong>VPC Lattice Services<\/strong> \u21c4 <strong>Service Networks<\/strong><\/li>\n\n\n\n<li><strong>Resource Gateways<\/strong> \u21c4 <strong>Resource Configurations<\/strong><\/li>\n\n\n\n<li><strong>Target Groups<\/strong> are used by Load Balancers or Lattice Services<\/li>\n\n\n\n<li><strong>Lattice<\/strong> is a superset involving Service Networks, Target Groups, and Resource Routing<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 TL;DR Summary<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <strong>VPC Endpoints<\/strong> to access AWS services privately.<\/li>\n\n\n\n<li>Use <strong>Endpoint Services<\/strong> to share <em>your<\/em> services with others securely.<\/li>\n\n\n\n<li>Use <strong>Lattice Services<\/strong> + <strong>Service Networks<\/strong> to build secure, scalable service-to-service comms.<\/li>\n\n\n\n<li>Use <strong>Target Groups<\/strong> for load balancing traffic.<\/li>\n\n\n\n<li>Use <strong>Resource Configurations + Gateways<\/strong> to expose selected VPC resources securely across accounts.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<p>Here\u2019s a detailed comparison of <strong>AWS VPC networking components<\/strong>, covering <strong>definitions<\/strong>, <strong>use cases<\/strong>, <strong>benefits<\/strong>, and <strong>practical scenarios<\/strong> to help you clearly understand when and why to use each.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 1. <strong>AWS VPC Endpoints<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Allows private connectivity between your VPC and supported AWS services (like S3, DynamoDB) without internet.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Secure communication with AWS services from private subnets.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>No need for NAT Gateway\/Internet Gateway.<\/li>\n\n\n\n<li>Reduces data transfer costs.<\/li>\n\n\n\n<li>Improves security by keeping traffic inside AWS.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Your EC2 instance in a private subnet needs to access S3 to read\/write files without going over the internet.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 2. <strong>AWS VPC Endpoint Services (PrivateLink)<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Allows you to expose your VPC-hosted services (e.g., APIs, applications) to other VPCs securely via PrivateLink.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Share internal services (like a custom database) securely with customers or partners.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>No need to expose services publicly.<\/li>\n\n\n\n<li>Controls access using IAM and Security Groups.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>A SaaS provider exposes a service (e.g., managed DB) privately to multiple clients using VPC Endpoint Services.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 3. <strong>AWS VPC Service Networks (Lattice)<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Logical grouping of services across accounts or VPCs managed centrally through AWS VPC Lattice.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Service discovery and access control across environments.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Unified policy and observability for microservices.<\/li>\n\n\n\n<li>Easier management at scale.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Your dev, staging, and prod VPCs each have microservices that should talk only to specific services across environments.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 4. <strong>AWS VPC Lattice Services<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Application-layer networking that enables secure, scalable service-to-service communication across VPCs and accounts.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Microservices mesh without managing your own service discovery, networking, or traffic routing.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Integrated authentication\/authorization.<\/li>\n\n\n\n<li>Built-in observability.<\/li>\n\n\n\n<li>No need for custom networking or service mesh.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Your backend API in VPC-A securely communicates with payment and inventory services in VPC-B and C across accounts using VPC Lattice.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 5. <strong>AWS VPC Target Groups<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Groups of resources (like EC2 instances or IPs) that receive traffic routed from Load Balancers.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Load balancing based on path, host, or port across services or containers.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Flexible routing logic.<\/li>\n\n\n\n<li>Supports weighted load balancing.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>You use an Application Load Balancer to direct traffic to multiple EC2 instances running your web app based on the URL path.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 6. <strong>AWS VPC Resource Configurations<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Defines a resource (or group of resources) in your VPC that you want to expose or share with others.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Granular sharing of VPC-hosted services (like specific IPs, endpoints, or DNS names).<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Fine-grained control.<\/li>\n\n\n\n<li>Enables multi-tenant architectures with access boundaries.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>You want to share a specific internal app (on a private IP) with another team in a different AWS account.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 7. <strong>AWS VPC Resource Gateways<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition<\/strong>: Gateways that act as the access point into a VPC for clients accessing resource configurations.<\/li>\n\n\n\n<li><strong>Use Case<\/strong>: Controlled entry into the VPC for accessing shared or exposed resources.<\/li>\n\n\n\n<li><strong>Benefits<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Centralized ingress control.<\/li>\n\n\n\n<li>Decouples service exposure from infrastructure.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Practical Scenario<\/strong>:\n<ul class=\"wp-block-list\">\n<li>You set up a Resource Gateway that allows only specific accounts to access your internal analytics service.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udded Summary Table<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Component<\/th><th>Primary Use<\/th><th>Key Benefit<\/th><th>Typical User<\/th><\/tr><\/thead><tbody><tr><td>VPC Endpoints<\/td><td>Access AWS services privately<\/td><td>Secure, no internet<\/td><td>Internal consumers<\/td><\/tr><tr><td>VPC Endpoint Services<\/td><td>Share custom services<\/td><td>Private SaaS model<\/td><td>Service providers<\/td><\/tr><tr><td>VPC Service Networks<\/td><td>Group multiple services<\/td><td>Policy and traffic management<\/td><td>Large-scale environments<\/td><\/tr><tr><td>VPC Lattice Services<\/td><td>Microservices communication<\/td><td>Mesh-like, secure, observable<\/td><td>Microservices teams<\/td><\/tr><tr><td>VPC Target Groups<\/td><td>Route traffic<\/td><td>Load balancing<\/td><td>App deployments<\/td><\/tr><tr><td>Resource Configurations<\/td><td>Define shared resources<\/td><td>Fine-grained sharing<\/td><td>Admins sharing services<\/td><\/tr><tr><td>Resource Gateways<\/td><td>Control access to resources<\/td><td>Central entry point<\/td><td>Secure multi-account\/VPC users<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s start from the basics and build up a clear understanding step-by-step. \ud83d\udd39 Step 1: Understanding the Core Networking Concepts 1. VPC Network (Virtual Private Cloud) \ud83d\udd39 Example: You create&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-48927","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/48927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=48927"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/48927\/revisions"}],"predecessor-version":[{"id":58936,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/48927\/revisions\/58936"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=48927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=48927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=48927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}