Reference
- North-South :
- West-East :
Challenge with current VPC architecture
- lots of VPC and lots of connections and lots of peering
- VPC peering : can’t transit
- Transit VPC (VPC with 10.1.0.0/16 and 10.2.0.0/16 go through transit VPC of 10.0.0.0/16)
- Transit Gateway (2018)
Transit Gateway (2018) – tgw
-
Centralize VPN and AWS Direct Connect
-
5k VPC across accounts
-
Flexible
- Control segmentation and sharing with routing
-
Compared with transit VPC
- AWS build in service
-
AWS HyperPlane
- Backbone of NLB, NAT Gateway, EFS and now Transit Gateway
- Region wide scope
Demo
- Flat : Every VPC should talk to each other.
- VPN: all traffic need go through VPN
Reference Network Architecture
New Feature: VPC Sharing and Resource Access Manager
- external account managing public subnet
- internal account managing private subnet
- by sharing vpc across different account, make the resource more flexible and avoid VPC peering in some cases
Segmentation considerations
- SG and IAM are effective and proven
- Shared VPCs vs VPC peering : shared VPC can across multi-account
- Separate VPC + Transit Gateway : simplest design without scaling issue (peering , VPC, routes)
Sharing considerations
- VPC peering (max 100 VPCs); support inter-regions
- AWS PrivateLink : Supports overlapping CIDRs (using ELB)
- AWS Transit VPC : Shared seervices as a spoke
- Transit Gateway : most advanced option
Connecting to on-premises
- Virtual Private Gateway VPN
- Direct Connect
- Customer VPN
- Transit Gateway VPN
43min : an advanced use case (???)
Reminder
- existing DMZs moving to cloud might not be a good idea