AWS Assignment
Table of contents
- 1] Provide peering connection between 3 VPC, check transitive connection.
- 2] Create transit gateway and connect 3 VPC, check transitive connection here
- 3] Create a single Nat-instance and access internet from 2 private ec2 instances launched in two 2 different AZ's.
- 4] Create NAT-gateway and access internet from 2 private ec2 instances present in different AZ's
- 5] Setup 2 Flow-logs for VPC, and store each in Cloudwatch-logs and S3.
- 6] Setup private connection between ec2 and S3. Use both Gateway and Interface endpoints.
- 7] Block any 2 to 3 ips. Pick these ips from flow-logs entries.
1] Provide peering connection between 3 VPC, check transitive connection.
Create 3 VPC's
Create 2public & 2private subnets in different availability zones for all VPC's
Add those subnets to respective route tables
Create internet gateways for each VPC's & attach it to VPC
-
Route the IG to public RT
-
Create peering connection
-
Add it in the Route table
Now ping to private instance of other VPC & it will ping
-
2] Create transit gateway and connect 3 VPC, check transitive connection here
Create Transit gateways
-
Create Transit gateway attachments
-
you can see the changes in the Transit gateway route tables
-
Editing the main route tables of the instances and attaching tgw attachments
Now try to ping instances of different VPC, it will ping
3] Create a single Nat-instance and access internet from 2 private ec2 instances launched in two 2 different AZ's.
Creating NAT Instance
Attach elastic IP
-
Edit the Rout table
-
Now try to ping, it will ping
4] Create NAT-gateway and access internet from 2 private ec2 instances present in different AZ's
Create a NAT gateway
-
Edit routs
-
Now ping
5] Setup 2 Flow-logs for VPC, and store each in Cloudwatch-logs and S3.
Through S3
VPC -> Select public VPC (my-vpc-01) -> Flow logs -> Create flow log -> Name -> Filter -> Maximum Aggregation interval -> Destination -> create flow logs
Go to S3 bucket, there you can find aws logs
Through Cloud Watch
Create an IAM role & provide CloudWatchFullAccess
Create Cloud watch Log Group
now select VPC & create a flow log
go to cloud watch log group & see Log streams
6] Setup private connection between ec2 and S3. Use both Gateway and Interface endpoints.
Gateway Endpoint
Attach IAM S3 full access to private EC2 instance
Go to End point in VPC & create one
Route table will be automatically updated
Interface Endpoint
Network interface will be created after doing all this
7] Block any 2 to 3 ips. Pick these ips from flow-logs entries.
Create the Network ACL