PitiaA AWS Private API - VPN to EKS Architecture

AWSNetworkadvanced
PitiaA AWS Private API - VPN to EKS Architecture — AWS network diagram

About This Architecture

Hybrid VPN architecture connecting on-premises Gobierno de Canarias infrastructure to a private EKS cluster via AWS Site-to-Site VPN and VPC Interface Endpoints. Traffic flows from the on-prem router through a Virtual Private Gateway into a DMZ Ingress VPC, then via VPC Link to a private API Gateway endpoint that routes requests to Internal ALBs fronting EKS node groups across two availability zones. The design enforces zero-trust principles with WAF protection, resource-based policies limiting API Gateway access to the Ingress VPC, and comprehensive observability through CloudWatch, CloudTrail, and GuardDuty. Fork this diagram to customize CIDR blocks, add additional VPCs, or integrate with your own hybrid network topology. The three-layer architecture (Access, Distribution, Core) provides clear blast radius isolation and simplifies troubleshooting across on-prem and AWS boundaries.

People also ask

How do I securely connect on-premises infrastructure to a private EKS cluster using AWS VPN and API Gateway?

This diagram shows a three-layer hybrid architecture: on-premises traffic enters via Site-to-Site VPN through a Virtual Private Gateway into a DMZ Ingress VPC, then routes through VPC Interface Endpoints to a private API Gateway protected by WAF and resource policies. The API Gateway uses VPC Link to reach Internal ALBs fronting EKS node groups across multiple availability zones, with CloudWatch,

AWSEKSVPNAPI Gatewayhybrid-cloudsecurity
Domain:
Cloud Aws
Audience:
AWS solutions architects designing secure hybrid connectivity to EKS clusters

Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.

Generate your own network diagram →

About This Architecture

Hybrid VPN architecture connecting on-premises Gobierno de Canarias infrastructure to a private EKS cluster via AWS Site-to-Site VPN and VPC Interface Endpoints. Traffic flows from the on-prem router through a Virtual Private Gateway into a DMZ Ingress VPC, then via VPC Link to a private API Gateway endpoint that routes requests to Internal ALBs fronting EKS node groups across two availability zones. The design enforces zero-trust principles with WAF protection, resource-based policies limiting API Gateway access to the Ingress VPC, and comprehensive observability through CloudWatch, CloudTrail, and GuardDuty. Fork this diagram to customize CIDR blocks, add additional VPCs, or integrate with your own hybrid network topology. The three-layer architecture (Access, Distribution, Core) provides clear blast radius isolation and simplifies troubleshooting across on-prem and AWS boundaries.

People also ask

How do I securely connect on-premises infrastructure to a private EKS cluster using AWS VPN and API Gateway?

This diagram shows a three-layer hybrid architecture: on-premises traffic enters via Site-to-Site VPN through a Virtual Private Gateway into a DMZ Ingress VPC, then routes through VPC Interface Endpoints to a private API Gateway protected by WAF and resource policies. The API Gateway uses VPC Link to reach Internal ALBs fronting EKS node groups across multiple availability zones, with CloudWatch,

PitiaA AWS Private API - VPN to EKS Architecture

AWSadvancedEKSVPNAPI Gatewayhybrid-cloudsecurity
Domain: Cloud AwsAudience: AWS solutions architects designing secure hybrid connectivity to EKS clusters
0 views0 favoritesPublic

Created by

April 22, 2026

Updated

April 22, 2026 at 8:38 AM

Type

network

Need a custom architecture diagram?

Describe your architecture in plain English and get a production-ready Draw.io diagram in seconds. Works for AWS, Azure, GCP, Kubernetes, and more.

Generate with AI