Setting up your Virtual Private Cloud

Setting up your Virtual Private Cloud

 21.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

If you’ve already followed along from my earlier posts on getting started with AWS and my update to getting started, then by now you should have a multi-tiered VPC across multiple Availability Zones which is setup along the lines that the diagram below displays. Your VPC will have a single Internet Gateway and 2 Gateway Endpoints going to S3 and DynamoDB. Each of the subnets will also have their own Route Table which establishes the routes available from within the subnet.

Read more… ( ~7 Min.)
Getting started with Amazon Web Services

Getting started with Amazon Web Services

 13.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

When starting to operate in Amazon Web Services (AWS)  you have to decide whether to utilize the Default Virtual Private Cloud (VPC)  or define your own VPC. The Default VPC typically sets itself up using the 172.31.0.0/16 CIDR block and a single tier of available subnets in all Availability Zones (AZ) with the region. This is fine for general use but to setup a proper tiered security model you’ll want to define your own VPC.

Read more… ( ~5 Min.)
Backup, wait a minute...

Backup, wait a minute…

 13.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

So in my earlier Getting started with Amazon Web Services post, I had laid out my 2-tier VPC solution that setup a Public and Private tier of subnets across three Availability Zones. I’d also mentioned that the subnets could make use of the Fn::Cidr  function to simplify the CIDR block assignments within your CloudFormation template and that I’d discuss that in another post. Well, welcome to that post and a whole lot more!

Read more… ( ~7 Min.)