VPC Multi Region Architecture

Goal

Deploy a Modular, Highly Available AWS VPC Architecture with Transit Gateway

Pre-Requisites

  1. You must be having an AWS account to create infrastructure resources on AWS cloud.
  2. Source Code

VPC Deployment

Note that You can use any subnet CIDR that you can plan based on the VPC CIDR to meet the requirements with optional tags and possible resource sizes to all AWS resources.

us-east-1

  1. Build VPC network ( 192.168.0.0/16 ) for Bastion Host deployment as per the architecture shown above in us-east-1.
  2. Build VPC network ( 172.32.0.0/16 ) for deploying Highly Available application servers as per the architecture shown above in us-east-1.
  3. Create NAT Gateway in Public Subnet and update Route Table  associated to Private Subnet accordingly to route the default traffic to NAT for outbound internet connection.
  4. Create Internet Gateway for both VPC in us-east-1 and  update Route Table associate to Public Subnet accordingly to route the default traffic to IGW for inbound/outbound internet connection.
  5. Create Security Group for bastion host allowing port 22 from public.
  6. Deploy Bastion Host EC2 instance in the Public Subnet with EIP associated.
  7. Create Security Group for app servers allowing port 22 from only Bastion Host and allowing port 80 from Public.
  8. Login to both app servers and Install Apache web server application and ensure the app is listening on port 80.
  9. Deploy HTML source code to apache web servers [Optional step]
  10. Create Target Group and associate both App servers as Targets.
  11. Create Application Load balancer in Public Subnet and configure  Listener rules to listen on port 80 and forward the traffic to Target Group.

us-west-1

  1. Build VPC network ( 172.35.0.0/16 ) for deploying application servers as per the architecture shown above in us-west-1.

Transit Gateway

  1. Create Transit Gateway and associate three VPCs to the Transit Gateway  for private communication.

Explore

  1. VPN is the Virtual Private Tunneling that can be created between Corporate Physical Datacenter network to AWS network to access the AWS Private IPs directly from your Corporate network.
  2. VPN can be setup using CGW [Customer Gateway] and VPG [Virtual Private gateway]. But its not feasible to implement this without a CGW, Hence just explore the concepts how it can be established to access private IPs directly from local corporate datacenter.  Follow the LINK for more details.

NOTE: Private Tunneling can also be configured using AWS Direct Connect. Follow the LINK to know more about this setup.

Validation

  1. As DevOps Engineer login to Private Instances of both regions via Bastion Host.
  2. Browse web application from public internet browser using ALB  name and verify that page loaded.[You can not access the website using www.EDUeki.com as shown in the architecture for reference, So, use ALB name for accessing the site.]

Solution:

Will be updated Soon…..

© Edwiki Trainings – Click HERE If you are interested to learn more on Cloud & DevOps stack.

3 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like