It sat there, deep inside a VPC private subnet, invisible to the internet and stubborn against any outsider. I needed to run ncurses-based tools on it, in real-time, fast, and secure. No public IP. No SSH from outside. Just pure isolation. And yet, I had to reach it — without breaking the network’s guardrails.
Deploying a proxy inside a private subnet in AWS, GCP, or Azure is a precise dance. First, you spin up a small instance within the same subnet as your target. That proxy becomes the only tunnel point in or out. You keep strict inbound rules, allowing only the minimal ports you need. Outbound? Restricted to your control. Security groups and NACLs reinforce the boundary, so nothing leaks.
Next, layer in your ncurses environment. Your application can run on the target system exactly as if you were sitting inside its terminal. Traffic flows through the proxy over an encrypted channel. Your control is direct, command-line native, without punching holes in your firewall or promoting the instance to the public internet.