Getting started with Amazon Web Services

Getting started with Amazon Web Services

 13.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse -  ~5 Minutes

When starting to operate in Amazon Web Services (AWS)  you have to decide whether to utilize the Default Virtual Private Cloud (VPC)  or define your own VPC. The Default VPC typically sets itself up using the CIDR block and a single tier of available subnets in all Availability Zones (AZ) with the region. This is fine for general use but to setup a proper tiered security model you’ll want to define your own VPC. Another factor is if you wish to connect your VPC with your on-premise network either by VPC VPN Connection or Direct Connect (DX)  you’ll want to control what CIDR block your VPC assigns from to avoid IP collisions.

Many VPC setups will go with a 3-tier solution, one that provides a Public tier in which to deploy Elastic Load Balancers (ELB/ALB/NLB) , a Private tier in which to deploy their application servers that the load balancers sit in front of, and finally a Data tier to place peristent data such as Relational Database Servers (RDS) , ElastiCache (EC) , ElasticSearch (ES)  or even Elastic File Systems (EFS)  that can be reached by the application servers in the Private tier but not directly from the internet or anything in the Public tier. The next decision is how many AZs you’re going to make use. Within AWS a given region has multiple AZs which are independent data centers with high-speed cross-connections. These multiple AZs in a region along with the multiple regions available give you high-availability if deployed and utilized properly. For many services you will require at least 2 AZs and any region must have at least 2 AZs to become a region.

For simplicity sake I decided to work with a 2-tier solution and forego the Data tier but have left room to expand and add that tier at a later date. I also opted to go with 3 AZs. While some most regions have at least 3 AZs and some even have as many as 6, going with 3 ensured that my CloudFormation  template would be able to function in any region I picked. I went with a /16 CIDR block under the available 10-net RFC1918 ┬áprivate IP space. For each of my 6 subnets then I decided to make use of a /20 CIDR blocks which provides for 4094 IP addresses in each which would be more than enough for my usage. You may find an online subnet calculator handy when making this decision if it’s not something you’re particularly strong at. For my uses you can see the results here  using one such calculator. In another post I’ll cover how to make use of the CloudFormation Fn::Cidr function to simplify this even further in your templates.

So for my 3-tier VPC template I kept it simple with only 2 parameters. The first to pick the Class-B second octet of the VPC /16 CIDR block and the second to decide if the VPC would be dual-stacked and support IPv6 addresses within. Below you will find the template I used so it can be referenced to as we go deeper. You can also find it on GitHub  in my aws-infra repository.

As an astute observer you may have noticed looking through the template that while there is an InternetGateway resource created on line 54 it is only used in the template as a property of the VPCGatewayAttachment on line 65 and then again as the GatewayId for the Public routetables on lines 247, 255 & 263. This leaves the Private subnets with no default route when this template is completed. This is because you have 2 options available to you. The first of which is to setup a NAT Gateway in each AZ that would be placed in the Public subnet and then serve as the default route for the AZs Private subnet. The second of which is to setup a VPC VPN Connection and route all Private subnets out it as the default route. I went with the second option as the cost of a single VPN Connection worked out to just under 38 USD/month while each NAT Gateway would work out to around 34 USD/month or in my case over 100 USD/month with 3 AZs. You could run only 1 NAT GW and route all 3 AZs out it but if you had an AZ outage you could potentially lose all external connectivity for your Private tier. I do have my VPN Connection configured via a CloudFormation template which can be found in the GitHub repo that I will discuss deeper in another post at a later date.

Finally at the end of the template starting at line 421 we start the Outputs. These are all the relevant resources that you might need to later reference in other CloudFormation stacks so they all provide an export name that can be used to import them when needed. A few other added pieces of note would be the VPC Endpoints found on lines 265 & 275 for both Simple Storage Service (S3)  and DynamoDB  which allow your Private tier to connect to both services without the need to traverse your external routing via NAT Gateway or VPN Connection.

When the stack is fully deployed you’ll have a 2-tier VPC with 3 Public subnets in separate AZs and 3 Private subnets in the same AZs. Each subnet has it’s own route table with only the Public route tables having a default route at this time. There are also 2 Network ACLs setup for the Public and Private tiers which can be modified later as needed but by default allow all traffic unhindered. As I use the CloudFormation stack name (AWS::StackName) when exporting resources I find it important to follow a naming schema so my VPC stack name is prefixed with vpc- followed by an environment identifier. So my demo environment stack might be called vpc-demo which I can use later for importing values into other stack templates that will deploy in that environment.

With this as a common base we’ll proceed in my next post on setting up the VPN Connection and then deploying an ECS cluster. I hope you find this insightful and look forward to hearing your thoughts. If you think you have a better solution then I welcome pull requests, and if you run into any problems feel free to open a bug report.