Skip to content

Latest commit

 

History

History
124 lines (82 loc) · 7.88 KB

README.md

File metadata and controls

124 lines (82 loc) · 7.88 KB

1Strategy AWS VPC template

This VPC template is a complete CloudFormation template to build out a VPC network with public and private subnets in three AWS Availability Zones.

"Public" means subnets can receive traffic directly from the Internet. Traffic outbound from a public subnet usually goes through an Internet Gateway. "Private" means that a subnet cannot receive traffic directly from the Internet. Traffic outbound from a private subnet usually goes through a NAT Gateway.

Most of the subnetting ideas come from this excellent AWS blog post on Practical VPC Design.

IP Address Layout

You'll first need to determine your IP Address CIDR block for your VPC. In this example, we are using the 10.0.0.0/8 private address space.

We have carved the example 10.0.0.0/8 address space into four /10 address spaces. A /10 address space is assigned to a given AWS Region. This means we could be in four different AWS Regions. In practice we will use only two Regions, US-West-2 and US-East-1. This will support up to 64 /16 VPCs in each Region.

Location AWS Region IP CIDR Address Range
Oregon us-west-2 10.0.0.0/10 10.0.0.1 - 10.63.255.255
Virginia us-east-1 10.64.0.0/10 10.64.0.1 - 10.127.255.255
reserved 10.128.0.0/10 10.128.0.0 - 10.191.255.255
reserved 10.192.0.0/10 10.192.0.1 - 10.255.255.255

Example VPC CIDR blocks

Here are the example VPC CIDR blocks we'll be using:

Oregon (us-west-2):   10.0.0.0/16
Virginia (us-east-1): 10.64.0.0/16

See the AWS VPC sizing docs for more info.

You are free to use any /16 to /28 CIDR block in the RFC 1918 private address range, but the VPC CIDR range you pick for this template should not overlap with any existing IP CIDR address ranges, either on-prem or in another AWS VPC.


VPC Template Parameters

To deploy this VPC template, you'll need to know the VPC CIDR block, the three public, and three private subnet CIDR blocks. You will need to choose whether the VPC will support highly available NAT Gateways, or, by default, a more cost effective single NAT Gateway. You will also need to choose whether VPC Flow Logs will be enabled, or disabled (default behavior is disabled to reduce costs).

Parameter Description Example
VpcCidrParam IPv4 CIDR block (/16 to /28) 10.0.0.0/16
PublicAZASubnetBlock AZ A public subnet block 10.0.32.0/20
PublicAZBSubnetBlock AZ B public subnet block 10.0.96.0/20
PublicAZCSubnetBlock AZ C public subnet block 10.0.160.0/20
PrivateAZASubnetBlock AZ A private subnet block 10.0.0.0/19
PrivateAZBSubnetBlock AZ B private subnet block 10.0.64.0/19
PrivateAZCSubnetBlock AZ C private subnet block 10.0.128.0/19
HighlyAvailable Highly Available NAT config true
EnableVpcFlowLogs VPC Flow Logs true

To make it easier to specify these parameters on the command line, you can use the example Parameters files included in the parameters/ directory.

VPC Flow Logs

VPC Flow Logs is a feature that allows you to capture information about IP traffic going to and from network interfaces in your VPC. This template is configured to deliver this data to a CloudWatch Logs Group called FlowLogs/<CloudFormation Stack Name>. Enabling VPC Flow Logs will increase your monthly usage costs (see VPC Flow Logs Pricing and CloudWatch Pricing pages).

Per the AWS Docs, Flow logs can help you with a number of tasks, such as:

  • Diagnosing overly restrictive security group rules
  • Monitoring the traffic that is reaching your instance
  • Determining the direction of the traffic to and from the network interfaces

VPC Flow Logs require an IAM role to give the VPC Flow Logs service permission to delivery flow logs to CloudWatch Logs. This IAM role only has permission to create and read CloudWatch log groups, log streams, and put log events.

How to Deploy

Prerequisites

If you'd like to deploy this stack via the command line, you'll need the AWS CLI.

Validate/Lint Stack

aws cloudformation validate-template --template-body file://network.yaml

Deploy Stack

You will need to verify you have the appropriate parameters file for the AWS Region and account/environment you want to deploy to. See ./parameters/<region>/<acct>.json. For example parameters/us-west-2/dev.json.

Change directories to the parent of this repository (vpc-starter-template/)

Run this command in the AWS CLI:

aws cloudformation deploy --template-file network.yaml --stack-name main-vpc --parameter-overrides file://parameters/us-west-2/dev.json

If you have the EnableVpcFlowLogs parameter set to true, you will need to add --capabilities CAPABILITY_IAM to the CLI command since enabling VPC Flow Logs requires creation of an IAM role to give the VPC Flow Logs service permission to write to CloudWatch Logs.

aws cloudformation deploy --template-file network.yaml --stack-name main-vpc --parameter-overrides file://parameters/us-west-2/dev.json --capabilities CAPABILITY_IAM

Update Stack

Updates to the stack can also be done using the deploy command above.

Template Outputs/Exports

AWS CloudFormation supports exporting Resource names and properties. You can import these Cross-Stack References in other templates.

This VPC template exports the following values for use in other CloudFormation templates. Each export is prefixed with the Stack Name. For example, if you name the stack "main-vpc" when you launch it, the VPC's public route table will be exported as "main-vpc-public-rtb"

Export Description Example
main-vpc-VpcId VPC Id vpc-1234abcd
main-vpc-public-rtb Public Route table Id (shared by all public subnets) rtb-1234abcd
main-vpc-public-AZ-A-subnet AZ A public subnet Id subnet-1234abcd
main-vpc-public-AZ-B-subnet AZ B public subnet Id ""
main-vpc-public-AZ-C-subnet AZ C public subnet Id ""
main-vpc-private-AZ-A-subnet AZ A private subnet Id subnet-abcd1234
main-vpc-private-AZ-B-subnet AZ A private subnet Id ""
main-vpc-private-AZ-C-subnet AZ A private subnet Id ""
main-vpc-private-AZ-A-rtb Route table for private subnets in AZ A rtb-abcd1234
main-vpc-private-AZ-B-rtb Route table for private subnets in AZ B ""
main-vpc-private-AZ-C-rtb Route table for private subnets in AZ C ""

License

Licensed under the Apache License, Version 2.0.