Networking Practical By Samson Tanimawo, PhD Published Sep 14, 2025 4 min read

PrivateLink Patterns

Service-to-service.

What PrivateLink solves

PrivateLink removes the public internet from service-to-service traffic. Lower latency, no egress fees, cleaner audit story for compliance-sensitive workloads. The provider exposes a service endpoint, consumers create endpoint connections in their VPC; traffic stays on the AWS backbone.

Interface endpoints (PrivateLink)

Interface endpoints are the most common form. ENIs per AZ in your VPC, DNS resolves the AWS service name to the local ENI; the application sees a normal AWS API call without realising it never crosses the public internet.

Gateway endpoints (S3, DynamoDB)

Gateway endpoints are the cheap special case. Free, route-table-based, S3 and DynamoDB only. Always deploy them; the cost is zero and they remove NAT egress for the heaviest AWS services.

Custom services via PrivateLink

Custom services via PrivateLink are how SaaS vendors increasingly ship. Provider runs an NLB exposed as a service; consumer creates an endpoint in their VPC; the consumer experience is identical regardless of which SaaS vendor.

Operating PrivateLink at scale

Operating PrivateLink at scale is a discipline. Track endpoint usage to retire idle ones, attach IAM policies for defence in depth, monitor endpoint health, audit the inventory quarterly.