{"id":9619,"date":"2018-01-31T12:00:11","date_gmt":"2018-01-31T08:00:11","guid":{"rendered":"http:\/\/www.msp360.com\/blog\/?p=9619"},"modified":"2023-12-13T17:25:28","modified_gmt":"2023-12-13T13:25:28","slug":"creating-and-accessing-amazon-s3-vpc-endpoint","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/creating-and-accessing-amazon-s3-vpc-endpoint\/","title":{"rendered":"Creating and Accessing Amazon S3 VPC Endpoint"},"content":{"rendered":"<p>We are always trying to stay on top of the new functionality introduced by Amazon. In this guide, we will describe how to create and access Amazon S3 endpoint in your VPC.<!--more--><\/p>\n<p>Amazon Virtual Private Cloud (Amazon VPC) is the Amazon service that allows you to create and manage virtual private networks. By default, all AWS resources are accessed via the public Internet. You may need to restrict access to your cloud network due to security requirements of your project. Before now, you had to allow internet communications between your VPC and AWS resources that you need. The recently introduced feature called <a href=\"http:\/\/docs.aws.amazon.com\/AmazonVPC\/latest\/UserGuide\/vpc-endpoints.html\" target=\"_blank\" rel=\"noopener noreferrer\">VPC Endpoints<\/a> allows you to keep your VPC truly private and grant access only to the resources that you need directly from the network itself.<\/p>\n<p><span style=\"color: #e38934;\"><strong>Everything about backing up to Amazon S3:<\/strong><\/span> <!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-42c87c0e-f902-4164-8c10-fbf20dd99fdb\" data-portal=\"5442029\" data-id=\"42c87c0e-f902-4164-8c10-fbf20dd99fdb\"><span class=\"hs-cta-node hs-cta-42c87c0e-f902-4164-8c10-fbf20dd99fdb\" id=\"hs-cta-42c87c0e-f902-4164-8c10-fbf20dd99fdb\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/42c87c0e-f902-4164-8c10-fbf20dd99fdb\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-42c87c0e-f902-4164-8c10-fbf20dd99fdb\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/42c87c0e-f902-4164-8c10-fbf20dd99fdb.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>Creating Amazon S3 Endpoint\u00a0in Virtual Private Cloud<\/h2>\n<p id=\"last\">To create an S3 endpoint, please follow the steps described below:<\/p>\n<div id=\"slidebox\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-c825537e-9998-44be-92aa-7a0a97b055c1\" data-portal=\"5442029\" data-id=\"c825537e-9998-44be-92aa-7a0a97b055c1\"><span class=\"hs-cta-node hs-cta-c825537e-9998-44be-92aa-7a0a97b055c1\" id=\"hs-cta-c825537e-9998-44be-92aa-7a0a97b055c1\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/c825537e-9998-44be-92aa-7a0a97b055c1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-c825537e-9998-44be-92aa-7a0a97b055c1\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/c825537e-9998-44be-92aa-7a0a97b055c1.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>1. Open the <a href=\"https:\/\/console.aws.amazon.com\/vpc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon VPC console<\/a>. In the navigation pane, choose Endpoints.<\/p>\n<p>2. The opened page will ask you to create your first S3 endpoint. Click the \u201cCreate Endpoint\u201d button.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9608\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/endpoints.button.1.png\" alt=\"AWS Console. Creating S3 Endpoint\" width=\"500\" height=\"482\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/endpoints.button.1.png 690w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/endpoints.button.1-300x290.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/endpoints.button.1-624x602.png 624w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>3. Choose your VPC and specify a policy that controls access to the AWS service. You can allow full access, or create a custom policy. Let\u2019s go with full access.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20452\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-policy-configuration.png\" alt=\"S3 Endpoint Policy Configuration\" width=\"1008\" height=\"876\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-policy-configuration.png 1008w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-policy-configuration-300x261.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-policy-configuration-768x667.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-policy-configuration-624x542.png 624w\" sizes=\"auto, (max-width: 1008px) 100vw, 1008px\" \/><br \/>\nAlso, you will need to select the route tables that will be used by the endpoint. All subnets associated with selected route tables will be able to access this S3 endpoint.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20453\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-route-tables-configuration.png\" alt=\"S3 Endpoint Route Tables Configuration\" width=\"1005\" height=\"870\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-route-tables-configuration.png 1005w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-route-tables-configuration-300x260.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-route-tables-configuration-768x665.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/s3-endpoint-route-tables-configuration-624x540.png 624w\" sizes=\"auto, (max-width: 1005px) 100vw, 1005px\" \/><\/p>\n<p>4. After you created your AWS S3 endpoint, you need to allow HTTP and HTTPS connections to this S3 VPC endpoint. Get back to the <a href=\"https:\/\/console.aws.amazon.com\/vpc\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon VPC console<\/a>, click \u201cSecurity Groups\u201d, choose a security group associated with your Amazon S3 VPC, go to \u201cOutbound Rules\u201d, press \u201cEdit\u201d. You need to allow connections via ports 443 and 80 and specify your endpoint as a destination.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9613\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/security_group.png\" alt=\"S3 Endpoint Configuring Security Groups\" width=\"502\" height=\"313\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/security_group.png 887w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/security_group-300x187.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/security_group-624x390.png 624w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/p>\n<p>5. Ensure that your bucket is located in the exact same region as the <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ec2-instance-types\/\">EC2 instance<\/a>. You can do that in the MSP360 Backup's settings. Select your S3 account on the main toolbar.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18538 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc1.png\" alt=\"Bringing CloudBerry Backup and Amazon S3 VPC together step 1\" width=\"869\" height=\"674\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc1.png 869w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc1-300x233.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc1-768x596.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc1-624x484.png 624w\" sizes=\"auto, (max-width: 869px) 100vw, 869px\" \/><br \/>\nClick <strong>Advanced settings<\/strong>.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18541 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc2-1.png\" alt=\"\" width=\"435\" height=\"565\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc2-1.png 435w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/vpc2-1-231x300.png 231w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><br \/>\nExpand the <strong>Primary region<\/strong> drop-down menu and select the region that matches the EC2 instance's region.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20455\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/amazon-s3-vpc-and-cloudberry-backup-final-setup.png\" alt=\"Amazon S3 VPC and CloudBerry Backup: Final Setup\" width=\"525\" height=\"643\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/amazon-s3-vpc-and-cloudberry-backup-final-setup.png 525w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2015\/08\/amazon-s3-vpc-and-cloudberry-backup-final-setup-245x300.png 245w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>When you use an AWS S3 endpoint, the source IP addresses from your instances in your affected <a href=\"https:\/\/www.msp360.com\/resources\/blog\/guide-to-subnets-and-ip-addressing\/\">subnets<\/a> for accessing the AWS service in the same region will be private IP addresses, not public IP addresses. Existing connections from your affected subnets to the AWS service that use public IP addresses may be dropped. Ensure that you don\u2019t have critical tasks running when you create or modify an endpoint. To reiterate once again, ensure that your EC2 instance and S3 bucket are located within the same region, otherwise, VPC will not work.<\/p>\n<blockquote><p>When using single VPC, you will be able to access only the bucket of the region where this VPC is located. If you want to access buckets in multiple regions, you need to configure endpoints in every VPC for each region and connect this networks between each other by using <a href=\"http:\/\/docs.aws.amazon.com\/AmazonVPC\/latest\/UserGuide\/vpc-peering.html\" target=\"_blank\" rel=\"noopener noreferrer\">VPC peering<\/a>.<\/p><\/blockquote>\n<h2>Summary<\/h2>\n<p>Our team provides maximum effort in order to suggest best cloud management tools and support all latest functionality released by major cloud storage providers. If you are interested in support for any feature provided by your storage provider, please let us know and we will be glad to consider your use case or suggestion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are always trying to stay on top of the new functionality introduced by Amazon. In this guide, we will describe how to create and access Amazon S3 endpoint in your VPC.<\/p>\n","protected":false},"author":2,"featured_media":26964,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-9619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/9619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=9619"}],"version-history":[{"count":2,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/9619\/revisions"}],"predecessor-version":[{"id":56979,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/9619\/revisions\/56979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/26964"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=9619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=9619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=9619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}