Skip to content

demo of setting up custom multi AZ vpc architecture using AWS

Notifications You must be signed in to change notification settings

Jareechang/aws-vpc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AWS VPC

Creating a multi AZ custom vpc (isolated network) which has both public and private access (via subnets).

Table Of Contents:

Introduction

Design a multi AZ custom vpc with public and private access via subnets.

As a quick brief, "custom vpc" is a slightly different than the "default vpc" provided by AWS. See explanation in Notes.

Public will be used for resources to be used by clients (ex. application to serve requests) and private will be for resources that are not to be accessible outside of vpc (ex. database / database server).

In addition, support a public bastion host which allows for indirect and secure access to private resources. Mainly, this is for adminstration and operation purposes.

Core Concepts:

  • Public / private subnets
  • Allow internet access (IGW)
  • Bastion host and jumpbox

Quick Start

Technologies:

  • AWS VPC
  • AWS Network ACL
  • AWS Subnets
  • AWS Security groups
  • AWS Internet gateway (IGW)
  • AWS EC2
  • Terraform (>= v0.12.24)

Setting up resources:

  1. Add AWS secret and key to your environment (or use template below and fill in envs)
# setup-env.sh
export AWS_ACCESS_KEY_ID=<xxxx>
export AWS_SECRET_ACCESS_KEY=<xxxx>
export AWS_DEFAULT_REGION=us-east-1

. ./setup-env.sh
  1. Export your ip address
export TF_VAR_local_ip_address=<your-ip-address>
  1. Run terraform

# Run the plan, and if it looks good then proceed
terraform plan


# Run the execution of setting up resources
terrfaorm apply

Done.

Accessing Bastion (public secure instance)

  1. Create a ssh-key.pem file and copy ssh-key output into the file

  2. Update permission of the ssh-key.pem file

chmod 400 ssh-key.pem
  1. copy the public ip of instance and ssh into it
ssh -i ./ssh-key.pem ec2-user@<bastion_instance_ip>
  1. Verify internet access (via internet gateway)
# Get current ip address
curl ifconfig.me.


# Try pinging and receiving packets, It should work fine 
ping 1.1.1.1

# Example
#PING 1.1.1.1 (1.1.1.1) 56(84) bytes of data.
#64 bytes from 1.1.1.1: icmp_seq=1 ttl=54 time=0.728 ms
#64 bytes from 1.1.1.1: icmp_seq=2 ttl=54 time=0.709 ms
#64 bytes from 1.1.1.1: icmp_seq=3 ttl=54 time=0.782 ms

Accessing Private instance (private)

  1. Add key to key-chain
ssh-add -k ssh-key.pem (your pem file)
  1. Verify the key is added
ssh-add -L
  1. ssh into the basion instance
ssh -A ec2-user@<bastion_instance_ip>
  1. ssh into the private instance within the vpc
# For example
ssh ec2-user@<private_instance_ip>
  1. Verify no internet access
# It should be stuck
ping 1.1.1.1

Finishing (Important)

  1. Destroy resources (to not incur charges)
terraform destroy -auto-approve

Notes

What is the difference between custom and default vpc ?

Main difference is the default vpc works out of the box by providing access to most things which is suitable for development. Whereas custom VPC is suitable for granular access control by customizing the types of request that can access resources within the network (restrict by ip, request, network type etc)

Default VPC:

  • A /20 public subnet in each AZ with public IP by default
  • Attached Internet gateway (with configuration on route table sending traffic to IGW using 0.0.0.0/0 route)
  • Default Security Group with allow all access
  • Default Network ACL with allow all access

Custom VPC:

  • You need to create your own netowrk resources (allocate IP ranges, create subnets and provision gateways and networking etc)
  • You need to handle security (who and/or what can access what)

Network ACL vs Security Groups

Network ACLs:

  • Network ACLs are stateless (meaning change applied to in-going traffic does not apply to out-going)
  • Network ACLs supports "allow" and "deny" rules
  • Network ACLs rules are evaluated by order
  • Can explicitly deny a certain IP address (ie Block 123.222.222.222 with EC2)
  • Automatically applies to all instances in subnets that it is associated in

Security Groups:

  • Security Groups are stateful (meaning changes applied to in-going traffic applies to out-going)
  • Security Groups support only "allow"
  • You cannot explicitly deny a certain IP address (ie Block 123.222.222.222 with EC2)
  • No order (all of them do apply)
  • Operates at the instance level
  • Applies only if instance is assigned the specific security group

In summary, prefer network ACL over security groups for overall defense for subnets within a VPC. However, do leverage security groups for granular access control of the launched ec2 instance. As a tip, in addition to network ACLs and security groups, use AWS IAM to further manage and control the access between the resources within the network, see IAM - Access Management.

Resources:

Releases

No releases published

Packages

No packages published

Languages