AWS re:Invent 2021 - Securing your data perimeter with VPC endpoints

Поделиться
HTML-код
  • Опубликовано: 16 окт 2024

Комментарии • 14

  • @briankepha
    @briankepha 4 месяца назад

    This was sooooo good.Thank you, getting history of why a service exists in the first place gives so much perspective

  • @srirajan1933
    @srirajan1933 2 года назад

    Absolutely loved your enthusiasm and clarity on VPC endpoints, Becky -- stellar delivery and and content! Thank you!

  • @benjaminsh8576
    @benjaminsh8576 Год назад

    one of the best explanation of VPC endpoint concept by far!

  • @shaunwang2160
    @shaunwang2160 Год назад

    So good!

  • @ambc38vsxn
    @ambc38vsxn Год назад +1

    Such a brilliant session! Thanks a lot!

    • @awssupport
      @awssupport Год назад +1

      Thanks for watching! Glad you enjoyed it. ^RS

  • @alexeyalexandrov7583
    @alexeyalexandrov7583 2 года назад +4

    Amazing talk! Really great content and awesome speaker!

  • @charlesuneze4920
    @charlesuneze4920 Год назад

    A lovely session with great storytelling.

  • @vishalgupta8986
    @vishalgupta8986 2 года назад +1

    Superb!!!
    specifically last 30 minutes.

  • @abduljabbarazam943
    @abduljabbarazam943 2 года назад +2

    That was useful and very interesting. Thanks

  • @kapilch
    @kapilch Год назад

    awesome session

  • @samjackgreen
    @samjackgreen 2 года назад

    Great talk. some personal notes...
    29:20 problem with using Gateway VPC endpoint
    "The problem here is this is done with routes. And if you've ever set up connectivity to an on-premises network... those are done with routes too. And so you can't really do that. You can route _VPC-bound_ traffic from the on-premises network. No problem. But how do you route traffic into the VPC endpoint _that doesn't seem to be bound for the VPC_?
    On Interface Endpoints:
    35:26 "What you got was not a prefix list and some routes and a gateway."
    35:35 "Rather you got Kinesis planted at *an IP address in your VPC*"
    35:54 "each of these VPC endpoints to Kinesis is actually now at an IP address IN your VPC. It's something we call an
    36:10 refering back to the above problem at 29:20 (the 'core problem)
    36:20 [Now, with Interface endpoints, traffic which is not bound for the VPC can come from on-premises. Remember, we could always deal with traffic that was VPC-bound. Now we can deal with traffic that comes into our VPC (aiming to get so, say, Kinesis) which is not VPC-bound.