How to Connect to Private RDS Databases from Outside Your AWS VPC
February 10, 2025
TLDR
There are two solutions to access an AWS RDS database in private subnets from outside of its VPC:
- Secure network extension through VPN / Tailscale.
- Reverse proxy with public-facing Network Load Balancer (NLB) with IP allowlists.
I provide implementation details for the NLB Reverse Proxy + IP Allowlists solution in both AWS CloudFormation and Terraform below.
The Problem
As a DevOps consultant and contractor, I have had to help at least two clients access an AWS RDS database running in private subnets from outside of its VPC.
One reason is that the database was originally public (oops!) and legacy applications and services still assume they can reach the database as if it were public. Once the database has been moved to private subnets, these legacy applications and services need a temporary window of time to also be moved into the same VPC or adjust how they are going to connect to the database.
Another reason is that the RDS database might be created by a vendor in your account, and you have a new requirement to allow your applications to connect to that database, but your applications may be running in a different cloud provider (ie. multi-cloud).
So, what solutions are there to access an RDS database in private subnets from outside of its VPC?
Solutions
- VPN / Tailscale (some form of secure network extension)
- Network Load Balancer (NLB) Reverse Proxy + IP Allowlists
Certainly, you could get creative and come up with more ideas, but I believe these two are the best balance between developer ease, infrastructure complexity, costs and security.
Comparison Table
Aspect | VPN / Tailscale | NLB Reverse Proxy + IP Allowlists |
---|---|---|
Developer Ease | If devs already use Tailscale/VPN, they just connect to the private RDS endpoint. Otherwise, they must install and configure a VPN client. | Devs use a public DNS with Postgres; no extra VPN client needed. Their IP must be in the allowlists. |
Infrastructure | More initial work: configure Tailscale subnet router, Site-to-Site VPN. Can be more complex to set up. | Minimal setup: create NLB in a public subnet, register RDS as target, configure IP allowlists. |
Maintenance | After initial setup, day-to-day is typically minimal. Tailscale often updates automatically; AWS manages the VPN gateway if using Site-to-Site. | AWS manages the load balancer. You only maintain IP allowlists. No OS patching or multi-AZ concerns. |
Costs | Tailscale can be free or low cost if usage is small; Larger solution costs vary and can be more expensive. | Around $16 per month for NLB in us-east-1 plus data egress fees. No extra EC2 needed. |
Security | No public endpoint at all; fully private tunnel or overlay with encryption. Most secure if you want zero public exposure. | RDS is private; only the NLB endpoint is exposed, restricted by IP allowlists. |
Bottom Line
-
VPN / Tailscale
- Pros: Zero external exposure. All traffic is over a private or encrypted tunnel. Very “best practice” if your organization already uses such a solution.
- Cons: Higher up‐front complexity. Devs and external services must be on that private network or have a VPN/Tailscale client.
-
NLB Reverse Proxy + IP Allowlists
- Pros: Quick to set up, completely managed in AWS.
- Cons: You do have a public LB, although restricted by IP allowlists.
!! Note !!: If you go with the NLB Reverse Proxy solution, it is strongly recommend that you require SSL connections to your RDS database. You can require this by setting the rds.force_ssl
parameter to 1
in the RDS instance’s parameter group. This will ensure that all connections to the RDS instance are encrypted. For more details, see Requiring an SSL connection to a PostgreSQL DB instance.
Implementation - VPN / Tailscale
I am going to skip this solution for the following reasons:
- It varies a lot based on your existing secure network setup.
- If you are not already using Tailscale or a VPN, then there is added effort to get developers to install clients and configure them.
- It might not be possible to use this solution if your external environment (ie. other cloud) cannot connect via VPN or Tailscale.
- It could be blocked on management approval or security concerns.
By contrast, the NLB Reverse Proxy + IP Allowlists solution can be completely implemented within AWS and does not require changes to your external environment.
Implementation - NLB Reverse Proxy + IP Allowlists
Diagram
Infrastructure as Code
If you use Infrastructure as Code (IAC) tools like AWS CloudFormation or Terraform, I have written a template file and/or Terraform module you can use.
AWS CloudFormation Template:
Terraform Module:
terraform-aws-rds-reverse-proxy
Conclusion
Accessing an AWS RDS database in private subnets from outside its VPC can be accomplished through a secure network extension or a public-facing Network Load Balancer (NLB) that proxies connections to your private RDS instance.
The best solution depends on your organization’s existing tools, security requirements and development workflows:
- If privacy and isolation are your top priorities and you already have a VPN or Tailscale set up, extending that network into your AWS environment is the most secure option.
- If you want an AWS-only approach, the NLB reverse proxy setup may be simpler.