Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Public endpoints or VPC peering? #13

Open
JoeAlamo opened this issue Aug 28, 2018 · 8 comments
Open

Public endpoints or VPC peering? #13

JoeAlamo opened this issue Aug 28, 2018 · 8 comments
Labels

Comments

@JoeAlamo
Copy link

Are the latency tests performed using DynamoDB public endpoints? So the packets are going across public internet? Or do you have VPC peering set up between regions?

@kennykjam
Copy link

kennykjam commented Dec 7, 2018

+1 one this question.
Are these stats based on VPC or Public Internet?
Are the stats RTT or one way(assume RTT)?
On the whole the RTT seems quite slow compared to what is possible!

@mdeora
Copy link

mdeora commented Feb 15, 2019

+1 one this question about vpc peered latency or public igw?

@mda590
Copy link
Owner

mda590 commented Feb 15, 2019

Great question! These stats are based on RTT between IGW in source region and public DynamoDB endpoint in destination region.

VPC peering is coming in the near future via one of the updates I am currently working on.

@JoeAlamo
Copy link
Author

That's nice to hear! Out of interest, how would you do that? With DynamoDB having public endpoints they'd usually go across public internet as far as I know, can you use VPC endpoints and access these cross region?

@swestcott
Copy link

swestcott commented Feb 28, 2019

That's nice to hear! Out of interest, how would you do that? With DynamoDB having public endpoints they'd usually go across public internet as far as I know, can you use VPC endpoints and access these cross region?

Cross-region VPC peering + VPC endpoints should enable this.

I'm really curious to see the difference between public/private routing 👍

@argo516
Copy link

argo516 commented Jun 1, 2019

Hitting gateway style VPC Endpoints (Dynamo DB or S3) will not work across VPC peering. Your best bet would be using any of the interface style VPC Endpoints from this list: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-endpoints.html

@DarwinJS
Copy link

DarwinJS commented Feb 4, 2022

I was wondering what networking this was using as well.

It could be super helpful to clarify that the current page is using internet latencies in both the website and the read me!

Also I hope that you plan is to retain the internet latency and add the VPC peering (AWS Backbone) numbers rather than replace the internet latency. Having both helps with smaller budget implementations that can't step up to an AWS backbone implementation due to cost or complexity.

@chriselsen
Copy link

Have a look at the AWS VPC FAQ:

Q. Does traffic go over the internet when two instances communicate using public IP addresses, or when instances communicate with a public AWS service endpoint?
No. When using public IP addresses, all communication between instances and services hosted in AWS use AWS's private network. Packets that originate from the AWS network with a destination on the AWS network stay on the AWS global network, except traffic to or from AWS China Regions.
In addition, all data flowing across the AWS global network that interconnects our data centers and Regions is automatically encrypted at the physical layer before it leaves our secured facilities. Additional encryption layers exist as well; for example, all VPC cross-region peering traffic, and customer or service-to-service Transport Layer Security (TLS) connections.

Therefore from a network path perspective traffic from a Lambda function in region A to the public endpoint of DynamoDB in region B will take the same AWS backbone path as if you would create VPC peering or TGW peering between the regions and use a different private endpoint instead of DynamoDB. In neither of these two cases would traffic traverse the public Internet.
But in the second case you would be adding latency due to processing of packets by the peering connection encryption and potentially the PrivateLink-based endpoint in the target region.
With that switching the traffic path away from what it currently is, you would actually get less reliable data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

8 participants