Linux | Cloud | DevOps | Scripting

Breaking

Sunday, 19 May 2019

How to Create Amazon Virtual Private Cloud (VPC)



We can create Amazon VPC by using the following steps:

  1. Create a VPC
  2. Create an Internet Gateway (IGW)
  3. Attach IGW to VPC
  4. Create Two Subnets:
    Public Subnet (Subnet-1) and Private Subnet (Subnet-2)
  5. Enable Auto-assign IP settings for Public Subnet
  6. Create a Route Table and associate to subnet-1
  7. Create Tow Instances:
    Web Server (First instance for public subnet) and DB Server (Second instance for private subnet)
  8. Verify internet access on web server
  9. Create a NAT Gateway
  10. Create a Route table for NAT Gateway and associate to Subnet-2
  11. Verify internet access on DB server. 


How to Create AWS VPC?
AWS VPC Struct

Step 1: Create a VPC:

As VPC is a region-specific service, first we need to make sure in which region we are creating VPC. In this practical, we are creating a VPC in North Virginia Region for a web solution company, named 'websol'. One default VPC is also running there. So, I suggest, do not delete or change inside default VPC. Create your own VPC named 'websol-vpc'.

AWS âž” Servicesâž” VPC âž” Your VPCs âž” Create VPC âž” Name tag: websol-vpc âž” IPv4 CIDR block: 10.0.0.0/16 âž” [*] No IPv6 CIDR Block âž” Tenancy: default âž” Create âž” Close.

This will create a new VPC named 'websol-vpc' in North Virginia region.

Step 2: Create an Internet Gateway (IGW):

AWS âž” Services âž” VPC âž” Internet Gateways âž” Create Internet Gateway âž” Name tag: websol-igw âž” Create âž” Close.

Step 3: Attach IGW to VPC:

AWS âž” Services âž” VPC âž” Internet Gateways âž” Select 'websol-igw' gateway âž” Actions âž” Attach to VPC âž” VPC: Select 'websol-vpc' âž” Attach.

In the state section, we can verify that Internet Gateway 'websol-igw' is attached to 'websol-vpc' VPC.

Step 4: Create Two Subnets:


  • Create the first Subnet for Web Server:

AWS âž” Services âž” VPC âž” Subnets âž” Create subnet âž” Name tag: websol-sub1-pub âž” VPC: websol-vpc âž” Availability Zone: us-east-1a âž” IPv4 CIDR block: 10.0.1.0/24 âž” Create âž” Close.

  • Create the second Subnet for Database Server:

AWS âž” Services âž” VPC âž” Subnets âž” Create subnet âž” Name tag: websol-sub2-pvt âž” VPC: websol-vpc âž” Availability Zone: us-east-1b âž” IPv4 CIDR block: 10.0.2.0/24 âž” Create âž” Close.

Step 5: Enable Auto-Assign IP settings for public subnet:

AWS âž” Services âž” VPC âž” Subnets âž” Select Subnet 'websol-sub1-pub' âž” Actions âž” Modify auto-assign IP settings âž” [*] Enable auto-assign public IPv4 address âž” Save.

Step 6: Create a Route Table and associate to subnet-1:


  • Create a route table to get attached IGW to subnet1, which belongs to Web Server:

AWS âž” Services âž” VPC âž” Route Tables âž” Create Route Table âž” Name tag: websol-rt-pub âž” VPC: websol-vpc âž” Create âž” Close.

  • Make Route Entries:

AWS âž” Services âž” VPC âž” Route Tables âž” Select 'websol-rt-pub' Route Table âž” Routes âž” Edit routes âž” Destination: 0.0.0.0/0 âž” Target: 'websol-igw' âž” Save routes âž” Close.

  • Associate Route Table to Subnet-1:

AWS âž” Services âž” VPC âž” Route Tables âž” Select 'websol-rt-pub' Route Table âž” Subnet Associations âž” Edit Subnet Associations âž” Select 'websol-sub1-pub' subnet âž” Save.

Step 7: Create Instances:

Create two instances; one for Web Server in Subnet-1 and another instance for Database Server in Subnet-2.
  • Create first instance in Subnet-1 named 'win-web-srv':
AWS âž” Services âž” EC2 âž” Instances âž” Launch Instance âž” [*] Free Tier only âž” Select 'windows Server 2008' AMI âž” Instance Type: t2.micro âž” Next âž” Number of instances: 1 âž” Network: select own created 'websol-vpc' VPC âž” Subnet: As we are creating this instance for subnet-1, which we are using for a web server, select us-east-1a âž” Auto-assign Public IP: We have already enable auto-assign in subnet, so there is no need to change this âž” Next âž” Next: tags âž” Name: win-web-srv âž” Next: SG âž” [*] Create a new Security Group âž” Security group name: win-sg âž” Description: win-sg is created to access windows instances âž” Rule âž” RDP: TCP: 3389: Anywhere âž” Add Rule âž” HTTP: TCP: 80: Anywhere âž” Add Rule âž” HTTPS: TCP: 443: Anywhere âž” Review and Launch âž” Launch âž” Create a new key-pair OR select any existing key pair âž” Launch Instances âž” View Instances.
  • Create second instance in Subnet-2 named 'win-db-srv':
AWS âž” Services âž” EC2 âž” Instances âž” Launch Instance âž” [*] Free Tier only âž” Select 'windows Server 2008' AMI âž” Instance Type: t2.micro âž” Next âž” Number of instances: 1 âž” Network: select own created 'websol-vpc' VPC âž” Subnet: As we are creating this instance for subnet-2, which we are using for a Database Server, select us-east-1b âž” no need for enabling Auto-assign Public IP as we are creating this instance for private subnet âž” Next âž” Next: tags âž” Name: win-db-srv âž” Next: SG âž” [*] Create a new Security Group âž” Security group name: win-db-sg âž” Description: win-db-sg is created to access windows DB instances âž” Rule âž” RDP: TCP: 3389: Custom: 10.0.0.0/16 (here, we gave CIDR for security purposes) âž” Review and Launch âž” Launch âž” Create a new key-pair OR select any existing key pair âž” Launch Instances âž” View Instances.
  • Generate passwords of both instances and copy them in notepad:
For Web Server:
AWS âž” Services âž” Instances âž” Select Instance 'win-web-srv' âž” Actions âž” Get Windows Password âž” Browse âž” (Provide Private IP) âž” Decrypt Password âž” Copy this password in notepad.

For DB Server:
AWS âž” Services âž” Instances âž” Select Instance 'win-db-srv' âž” Actions âž” Get Windows Password âž” Browse âž” (Provide Private IP) âž” Decrypt Password âž” Copy this password in notepad.

Step 8: Verify internet access on Web Server:

Run âž” type 'mstsc' âž” Computer: paste public IP from EC2 Dashboard âž” Connect âž” Username: Administrator âž” Password: Paste from notepad, where we saved it âž” Connect âž” (this will login us to our web-server instance) âž” Run âž” cmd âž” type 'ping www.google.com' âž” If we get a reply, means we got the connection.

Step 9: Create a NAT Gateway:

AWS âž” Services âž” VPC âž” NAT Gateways âž” Create NAT Gateway âž” Subnet: Select public subnet 'websol-sub1-pub' âž” Elastic IP Allocation ID: Click on Create New EIP (this will assign and allocate a Public Elastic IP to NAT Gateway) âž” Create a NAT Gateway âž” Close.

Allow some moments to get the status from pending to available, because NAT Gateway takes some time to create.

Step 10: Create Route Table for NAT Gateway and Associate to Subnet-2:

  • Create a route table to get attached with NAT Gateway:
AWS âž” Services âž” VPC âž” Route Tables âž” Create Route Table âž” Name tag: websol-rt-nat âž” VPC: websol-vpc âž” Create âž” Close.
  • Make Route Entries:
AWS âž” Services âž” VPC âž” Route Tables âž” Select 'websol-rt-nat' Route Table âž” Routes âž” Edit routes âž” Destination: 0.0.0.0/0 âž” Target: Select NAT Gateway âž” Save routes âž” Close.
  • Associate Route Table to Subnet-2:
AWS âž” Services âž” VPC âž” Route Tables âž” Select 'websol-rt-nat' Route Table âž” Subnet Associations âž” Edit Subnet Associations âž” Select 'websol-sub2-pvt' subnet âž” Save.

Step 11: Verify internet access on DB server:

  • First login to the web-server:
Run âž” type 'mstsc' âž” Computer: paste public IP of web-server from EC2 Dashboard âž” Connect âž” Username: Administrator âž” Password: Paste from notepad, where we saved it âž” Connect âž” this will login us to our web-server instance.
  • Open RDP from the web server and login to the DB-Server using private IP:
In Web-Server âž” Run âž” type 'mstsc' âž” Computer: paste private IP of DB-server from EC2 Dashboard âž” Connect âž” Username: Administrator âž” Password: Paste from notepad, where we saved it âž” Connect âž” this will login us to our DB-Server âž” Open Run âž” type command 'cmd' âž” ping www.google.com.


ACCESS GRANTED…ENJOY!!!

CLEANUP:

  1. Terminate both instances
  2. Delete NAT Gateway
  3. Release Elastic IP which we used in NAT gateway
  4. Delete VPC

Step 1: Terminate both instances:

AWS âž” Services âž” EC2 âž” Instances âž” Select both instances âž” Action âž” Instance State âž” Terminate.

Step 2: Delete NAT Gateway:

AWS âž” Services âž” VPC âž” NAT Gateways âž” Select NAT Gateway âž” Actions âž” Delete NAT Gateway âž” Delete NAT Gateway.

Again this will take some time to be deleted as it took at the time of creation.

Step 3: Release Elastic IP which we used in NAT Gateway:

AWS âž” Services âž” VPC âž” Elastic IPs âž” Select Elastic IP âž” Actions âž” Release addresses âž” Release.

Step 4: Delete VPC:

AWS âž” Services âž” VPC âž” Your VPCs âž” Select your own created VPC (not default) âž” Actions âž” Delete VPC âž” Delete VPC âž” Close.





18 comments:

  1. Thanks Divakar.. I got first Lab working..

    ReplyDelete
    Replies
    1. Ok buddy!
      Soon I am going to upload docs about VPC-Endpoints. Be in touch.
      Thanks.

      Delete
  2. Great initiative from you side
    I am amar and i am working as devops/cloud admin (aws/gcp) with kubernetes clustering setup cloud as well as om premise solutions , so please let me know if i can also contribute some thing on you initiative so others may get help.

    ReplyDelete
    Replies
    1. Thanks Amar!
      It's really grateful. Kindly provide me any of your contact information. My email ID is divakar.rastogi@gmail.com.

      Delete
  3. Thanks for sharing this information to us.from this topic i got some knowledge.
    Best aws training in ameerpet| aws training in hyderabad

    ReplyDelete
  4. have you included practical on VM migration on AWS?

    ReplyDelete
  5. Thanks For sharing this Superb article.I use this Article to show my assignment in college.it is useful For me Great Work. https://www.sorrisieservizi.it/internet/vpn-sicura-e-gratuita/

    ReplyDelete

Pages