Amazon Virtual Private Cloud (Amazon VPC) lets users provision a logically isolated section of the AWS Cloud where they can launch AWS resources in a virtual network. Users have control over the virtual networking environment, including selection of one's IP address range, creation of subnets, and configuration of route tables and network gateways. Users can use both IPv4 and IPv6 in the VPC for secure and easy access to resources and applications.
$0.05
per month per NAT gateway
AWS CloudFormation
Score 8.8 out of 10
N/A
AWS CloudFormation gives developers and systems administrators a way to create and manage a collection of related AWS resources, provisioning and updating them in a predictable fashion. Use AWS CloudFormation’s sample templates or create templates to describe the AWS resources, and any associated dependencies or runtime parameters, required to run an application. Users don’t need to figure out the order for provisioning AWS services or the subtleties of making those dependencies work.…
$0
Pricing
Amazon Virtual Private Cloud (VPC)
AWS CloudFormation
Editions & Modules
IP Address Manager (IPAM)
$0.00027 per active IP address managed by IPAM
Hourly
Traffic Monitoring
$0.015 per ENI ($/hour)
Hourly
NAT Gateway
$0.045 per NAT gateway
Hourly
Standard
Free
Hourly
Free Tier - 1,000 Handler Operations per Month per Account
$0.00
Handler Operation
$0.0009
per handler operation
Offerings
Pricing Offerings
Amazon Virtual Private Cloud (VPC)
AWS CloudFormation
Free Trial
Yes
Yes
Free/Freemium Version
Yes
Yes
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
There is no additional charge for creating and using an Amazon Virtual Private Cloud (VPC) itself, you can pay for optional VPC capabilities with usage-based charges. AWS provides features and services that give you the ability to customize control, connectivity, monitoring, and security for your Amazon VPC.
There is no additional charge for using AWS CloudFormation with resource providers in the following namespaces: AWS::*, Alexa::*, and Custom::*. In this case you pay for AWS resources (such as Amazon EC2 instances, Elastic Load Balancing load balancers, etc.) created using AWS CloudFormation as if you created them manually. You only pay for what you use, as you use it; there are no minimum fees and no required upfront commitments.
When you use resource providers with AWS CloudFormation outside the namespaces mentioned above, you incur charges per handler operation. Handler operations are create, update, delete, read, or list actions on a resource.
More Pricing Information
Community Pulse
Amazon Virtual Private Cloud (VPC)
AWS CloudFormation
Considered Both Products
Amazon Virtual Private Cloud (VPC)
Verified User
Administrator
Chose Amazon Virtual Private Cloud (VPC)
We utilize both AWS and Azure resources for our cloud deployments. The deployment of resources initially was smoother through AWS VPC due to their powerful CLI and Powershell cmdlets. In the past couple of years, the differences between some of the features of AWS VPC and Azure …
If you are going to deploy within AWS, you need to know how to leverage VPCs. VPCs have several items you must configure for them to be usable and to even link one VPC to another. If you are only going to deploy a few resources or use some of the default configurations, you still need to have working knowledge of how a VPC functions. If you are used to working with VLANs and the ideology behind those, that is the best direct reference to how a VPC can be described, but with additional layers on top of that with route tables, internet gateways, etc.
AWS CloudFormation is well suited for scenarios where all of your resources need to be provisioned on AWS but it is not suited for hybrid cloud deployments. It's very easy for someone new to learn. The level of customization offered as part of the template specifically for AWS services is great. There is also a UI tool where we can drag and drop the services we want and it generates an yaml file which is very easy to use. The visibility of stacks and its resources and one place where we can track and identify the issues in deployment is great.
The biggest issue with VPC networks is knowing how you can leverage VPC endpoints to ensure your resources within the VPC are not reaching out over the Internet to get to AWS services such as S3 and others.
We didn't look into anything else as Cloudformation was "built-in" for AWS, it just kind of made sense to go with that. Terraform was something that we briefly looked into Terraform but decides to stick with Cloudformation because our task was relatively "simple". Apparently if it's a bit more complex, Terraform might be the way to go.
AWS VPCs are actively used for following various compliance and regulatory needs such as network separation for PCI DSS. The ability to keep resources and access to those resources controlled through the initial steps of creating VPCs has helped tremendously.