Connectivity Options for Amazon SQS in a Loosely-Coupled Web Application | Best Solution for Secure Traffic Flow

Connectivity Options for Amazon SQS

Question

You are working on a loosely-coupled web application using EC2 instance & Amazon SQS.

For further analysis, the Server in your on-prem locations needs to have connectivity with Amazon SQS.

Post POC, this will be a long-term project requirement.

Large bandwidth will be required from on-prem servers to AWS VPC.

Which of the following connectivity option will be best suited to meet this requirement with secure traffic flow?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Correct Answer: D.

Interface Endpoints can be used to connect from subnets in VPC to various AWS services like Amazon SQS directly without Internet.

With Interface Endpoint, all this traffic flows with the AWS network.

Also, with interface endpoints, servers from on-premises locations will connect to AWS resources only when the On-Prem location connects via AWS Direct Connect links.

Option A & B are incorrect as the VPC Gateway endpoint does not support connectivity to Amazon SQS.

Option C is incorrect as the VPC interface endpoint does not support connectivity via AWS Managed VPN connections.

For more information on Interface endpoints, refer to the following URL-

https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html

In this scenario, the requirement is to establish a secure and high-bandwidth connectivity from on-premises servers to Amazon SQS, which is used by a loosely-coupled web application running on Amazon EC2 instances within a VPC.

Option A: Create a gateway endpoint in your VPC private subnet. Use AWS Direct Connect link to establish connectivity from on-prem servers to Amazon SQS. This option involves creating a gateway endpoint in the VPC private subnet and using an AWS Direct Connect link to establish connectivity between the on-premises servers and Amazon SQS. AWS Direct Connect provides a dedicated network connection between the on-premises data center and AWS. This option can provide a high-bandwidth, secure, and low-latency connection. However, it can be more expensive than other options and may require additional configuration and maintenance.

Option B: Create a gateway endpoint in your VPC private subnet. Use AWS Managed VPN connection to establish connectivity from on-prem servers to Amazon SQS. This option involves creating a gateway endpoint in the VPC private subnet and using an AWS Managed VPN connection to establish connectivity between the on-premises servers and Amazon SQS. AWS Managed VPN provides an encrypted connection over the public internet between the on-premises data center and AWS. This option can provide a secure and cost-effective connection but may have higher latency and lower bandwidth than using AWS Direct Connect.

Option C: Create an interface endpoint from your VPC private subnet. Use AWS Managed VPN connection to establish connectivity from on-prem servers to Amazon SQS. This option involves creating an interface endpoint from the VPC private subnet and using an AWS Managed VPN connection to establish connectivity between the on-premises servers and Amazon SQS. Interface endpoints allow private connectivity between the VPC and AWS services over the AWS network. This option can provide a secure and cost-effective connection but may have higher latency and lower bandwidth than using AWS Direct Connect.

Option D: Create an interface endpoint from your VPC private subnet. Use AWS Direct Connect link to establish connectivity from on-prem servers to Amazon SQS. This option involves creating an interface endpoint from the VPC private subnet and using an AWS Direct Connect link to establish connectivity between the on-premises servers and Amazon SQS. This option can provide a high-bandwidth, secure, and low-latency connection but may be more expensive than using other options.

Overall, Option A or Option D would be the best-suited options for this requirement as they can provide high-bandwidth, secure, and low-latency connections. However, the final decision will depend on factors such as cost, maintenance, and network requirements.