EC2 Image Builder and interface VPC endpoints (AWS PrivateLink)
You can establish a private connection between your VPC and EC2 Image Builder by creating
an interface VPC endpoint. Interface endpoints are powered by AWS PrivateLink
Each interface endpoint is represented by one or more Elastic Network Interfaces in your subnets.
For more information, see Interface VPC endpoints (AWS PrivateLink) in the Amazon VPC User Guide.
Considerations for Image Builder VPC endpoints
Before you set up an interface VPC endpoint for Image Builder, ensure that you review Interface endpoint properties and limitations in the Amazon VPC User Guide.
Image Builder supports making calls to all of its API actions from your VPC.
Create an interface VPC endpoint for Image Builder
To create a VPC endpoint for the Image Builder service, you can use either the Amazon VPC console or the AWS Command Line Interface (AWS CLI). For more information, see Creating an interface endpoint in the Amazon VPC User Guide.
Create a VPC endpoint for Image Builder using the following service name:
-
com.amazonaws.
region
.imagebuilder
If you enable private DNS for the endpoint, you can make API requests to Image Builder
using its default DNS name for the Region, for example:
imagebuilder.us-east-1.amazonaws.com
. To look up the
endpoint that applies to your target Region, see
EC2 Image Builder endpoints
and quotas in the Amazon Web Services General Reference.
For more information, see Accessing a service through an interface endpoint in the Amazon VPC User Guide.
Create a VPC endpoint policy for Image Builder
You can attach an endpoint policy to your VPC endpoint that controls access to Image Builder. The policy specifies the following information:
-
The principal that can perform actions.
-
The actions that can be performed.
-
The resources on which actions can be performed.
When a non-default policy is applied to an interface VPC endpoint for EC2 Image Builder,
certain failed API requests, such as those failing from RequestLimitExceeded
,
might not be logged to AWS CloudTrail or Amazon CloudWatch.
For more information, see Controlling access to services with VPC endpoints in the Amazon VPC User Guide.
Custom policies for S3 bucket access
Image Builder uses a publicly available S3 bucket to access managed resources, such as components. It
also accesses the S3 bucket for AWSTOE, where downloads are stored. If you use a VPC endpoint
for Image Builder, you'll need a custom policy that includes access to the following S3 buckets. The bucket
names are unique per AWS Region (region
) and the pipeline environment
it's running in (environment
) variables.
-
The AWSTOE component manager bucket:
s3://ec2imagebuilder-toe-
region
-environment
Example: s3://ec2imagebuilder-toe-us-west-2-prod/*
-
The Image Builder managed resources bucket:
s3://ec2imagebuilder-managed-resources-
region
-environment
/componentsExample: s3://ec2imagebuilder-managed-resources-us-west-2-prod/components/*
VPC endpoint policy examples
This section includes examples of custom VPC endpoint policies.
VPC endpoint policy for Image Builder actions
The following example endpoint policy for Image Builder denies permission to delete Image Builder images and components. The example policy also grants permission to perform all other EC2 Image Builder actions.
{ "Version": "2012-10-17", "Statement": [ { "Action": "imagebuilder:*", "Effect": "Allow", "Resource": "*" }, { "Action": [ "imagebuilder: DeleteImage" ], "Effect": "Deny", "Resource": "*", }, { "Action": [ "imagebuilder: DeleteComponent" ], "Effect": "Deny", "Resource": "*", }] }