SlideShare a Scribd company logo
1 of 52
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
From One to Many: Evolving VPC Design
Chalk Talk
Androski Spicer
Solutions Architect
Amazon Web Services
A R C 3 1 0
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A m a z o n V P C D e s i g n
Rethinking Connectivity
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC IP SPACE DESIGN
Don’toverlapIPspace
Considerconnectivitytocorporatenetworks
PlanforexpansiontoadditionalAvailabilityZonesorregions
Subnet
Availability Zone A
IPv4 IPv6
OptionallyenableIPv6onVPC
/56ofAmazon’sGlobalUnicastAddress(GUA)perVPC
/64CIDRblockpersubnet
IPv6completelyindependentfromIPv4
Enabledpersubnetorperinstance(perENI)
Supportedbysecuritygroups,routetables,NACLs,VPCPeering
internetgateway,DX,flowlogs,andDNSResolution
ChooseACIDR
/16
/28
(65,536 IPs)
(16IPs)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC ID : abc-de-fg-7
Secondary CIDR : 10.2.0.0/16
Secondary CIDR : 10.3.0.0/16
Secondary CIDR : 10.4.0.0/16 Secondary CIDR : 10.5.0.0/16
Primary CIDR :
10.1.0.0/28
Main Route Table
Destination Target
10.1.0.0/28 Local
10.2.0.0/16 Local
10.3.0.0/16 Local
10.4.0.0/16 Local
10.5.0.0/16 Local
US-WEST-2
VPC RESIZING
Primary CIDR
10.3.0.0/16
• CIDR Block/s cannot overlap
• Existing CIDR Blocks cannot change
• CIDR block must not be the same or larger than the CIDR range of a
route in any of the VPC route tables
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IPv4 VPC SUBNET DESIGN
/16
Availability Zone A
Hybrid Subnet
Public subnet
Private subnet
Availability Zone B
Public subnet
Private subnet
Availability Zone C
Public subnet
Private subnet
/22 /22 /22
/20
/20
/20
/20
/20
/20
4091 IPs
1019 IPs
4091 IPs
Hybrid Subnet Hybrid Subnet
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
WHAT ABOUT IPV6 DESIGN
Availability Zone A
Public subnet
Private subnet
Availability Zone B
Public subnet
Private subnet
Availability Zone C
Public subnet
Private subnet
/64
/56
/64 /64
/64 /64 /64
18 QUINTILLION
18 QUINTILLION
18 SEXTILLION
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
INTERNET
ACCESS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
DEPLOY A NAT GATEWAY
Availability Zone A
Public subnet
Private Route Table
Destination Target
10.1.0.0/16 Local
0.0.0.0/0 NAT-GW-1
Corp CIDR VGW
Private subnet
CORPORATE
DATA CENTER
Availability Zone A
Public subnet
Private subnet
INTERNET
GATEWAY
INTERNET
NAT GATEWAY
• Still need internet gateway
• Separate subnets
• Requires Elastic IP address
• AZ specific
• Burst to 10 Gbps
Hybrid subnet Hybrid subnet
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Hybrid subnet
ROUTING IN THE PRIVATE SUBNET
Availability Zone A
Hybrid subnet
Public subnet
Private Route Table
Destination Target
10.1.0.0/16 Local
0.0.0.0/0 NAT-GW-2
Corp CIDR VGW
Private subnet
CORPORATE DATA CENTER
Availability Zone A
Public subnet
Private subnet
INTERNET
GATEWAY
INTERNET
NAT GATEWAY
NAT GATEWAY
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
ROUTING IN THE PRIVATE SUBNET
Availability Zone A
Public subnet
Private Route Table
Destination Target
10.1.0.0/16 Local
0.0.0.0/0 NAT-GW-2
Corp CIDR VGW
Private subnet
CORPORTAE DATA CENTER
Availability Zone A
Public subnet
Private subnet
INTERNET
GATEWAY
INTERNET
NAT GATEWAY
NAT GATEWAY
Hybrid subnet Hybrid subnet
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Availability Zone A
AWS Oregon (us-west-2) Region
ROUTE TABLE
0.0.0.0/0 – > NAT GW
Public Subnet
Public Infrastructure
Availability Zone A
Private Route Table
Destination Target
10.1.0.0/16 Local
0.0.0.0/0 NAT-GW
NAT GATEWAY (NAT-GW)
ROUTE TABLE
Private Route Table
Destination Target
10.1.0.0/16 Local
0.0.0.0/0 IGW
PRIVATE
PUBLIC
IGW
18.219.170.117
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Amazon S3Amazon DynamoDB
Availability Zone A
GATEWAY VPC ENDPOINTS
VPC ENDPOINT
AWS Oregon (us-west-2) Region
GATEWAY
ROUTE TABLE
GET REQUEST TO AMAZON S3
PUT REQUEST TO DYNAMODB
Route Table
Destination Target
10.1.0.0/16 Local
Corp CIDR VGW
Prefix List for S3 us-west-2 VPC-Endpoint
Prefix List for DynamoDB- us-west-2 VPC-Endpoint
aws ec2 create-vpc-endpoint
--vpc-id vpc-40f18d25
--service-name com.amazonaws.us-west-2.s3
--route-table-ids rtb-2ae6a24f rtb-61c78704
aws ec2 create-vpc-endpoint
--vpc-id vpc-40f18d25
--service-name com.amazonaws.us-west-
2.dynamodb
aws ec2 describe-vpc-endpoint-services
{ "ServiceNames": [
"com.amazonaws.us-east-1.s3",
"com.amazonaws.us-east-1.dynamodb"
] }
Amazon S3
Amazon DynamoDB
Add Endpoint Hostnames to Security Group Outgoing Rules
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
{
"Statement": [
{
"Sid": "vpce-restrict-to-backup-bucket",
"Principal": "*",
"Action": [ "s3:GetObject", "s3:PutObject” ],
"Effect": "Allow",
"Resource": ["arn:aws:s3:::reinvent-docs", "arn:aws:s3::: reinvent-docs /*"]
} ] }
{
"Statement": [
{
"Sid": "bucket-restrict-to-specific-vpce",
"Principal": "*",
"Action": "s3:*",
"Effect": "Deny",
"Resource": ["arn:aws:s3:::backups-reinvent", "arn:aws:s3:::backups-reinvent/*"],
"Condition": {"StringNotEquals": {"aws:sourceVpce": "vpce-bc42a4e5” } }
} ] }
S3 Bucket Policy
VPC Endpoint IAM Access Policy
Private subnet
Internal app
Availability Zone A
VPC ENDPOINTGATEWAY
ROIUTE TABLE
GET REQUEST
TO S3
VPC Endpoint
IAM Access Policy
S3
Bucket Policy
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
INTERFACE
VPC ENDPOINTS
S E R V I C E O W N E D B Y Y O U , O T H E R A C C O U N T S O R
A M A Z O N P A R T N E R S
E n a b l e s p r i v a t e c o m m u n i c a t i o n b e t w e e n
A W S s e r v i c e s u s i n g a n e l a s t i c n e t w o r k
i n t e r f a c e w i t h p r i v a t e I P s i n y o u r A m a z o n
V P C
1 0 . 1 . 1 0 . 5 0
S U B N E T - 1 0 . 1 . 1 0 . 0 / 2 4
Availability Zone A
O N E E N I P E R A Z F O R A S P E C I F I C S E R V I C E
1 0 . 1 . 2 0 . 5 0
S U B N E T - 1 0 . 1 . 2 0 . 0 / 2 4
Availability Zone B
R e q u e s t e r - m a n a g e d
n e t w o r k i n t e r f a c e
1 0 G B P S E A C H I N T E R F A C E E N D P O I N T
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
S U B N E T - 1 0 . 1 . 1 . 0 / 2 4
Availability Zone A
aws ec2 create-vpc-endpoint
--vpc-id vpc-ec43eb89
--vpc-endpoint-type Interface
--service-name com.amazonaws.us-east-1.kinesis
--subnet-id subnet-abababab subnet-catbatratsat
--security-group-id sg-1a2b3c4d
S E C U R I T Y G R O U P
S U B N E T - 1 0 . 1 . 2 . 0 / 2 4
Availability Zone B
S E C U R I T Y G R O U P
Amazon Kinesis
1 0 . 1 . 2 . 1 0
1 0 . 1 . 1 . 1 0
v p c - i d v p c - e c 4 3 e b 8 9
k i n e s i s . u s - e a s t -
1 . a m a z o n a w s . c o m
Enable Private DNS Name
o AWS Services
o AWS Market Place Services
Kinesis.putRecord
DNS Resolution
Virtual Private Gateway
Customer
network
IPSec VPN
NO ROUTES IN YOUR ROUTE TABLE
SUPPORTS TCP ONLY
aws ec2 describe-vpc-endpoints
DX Gateway
vpce-0fe5b17a0707d6abc-29p5708s.kinesis.us-west-
2.vpce.amazonaws.com
ENDPOINT-SPECIFIC REGIONAL DNS HOSTNAME
vpce-0fe5b17a0707d6abc-29p5708s-us-west-
2a.kinesis.us-west-2.vpce.amazonaws.com
vpce-0fe5b17a0707d6abc-29p5708s-us-west-
2b.kinesis.us-west-2.vpce.amazonaws.com
ENDPOINT-SPECIFIC ZONAL DNS HOSTNAME
kinesis.us-west-2.amazonaws.com
PRIVATE DNS ENABLED
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
//Lambda Handler Function aka Main
exports.handler = (event, context, callback) => {
event.Records.forEach(function(record) {
var esDoc = new Buffer(record.kinesis.data, 'base64');
esDoc = esDoc.toString();
client.index({
index: process.env.esIndex,
id: record.kinesis.sequenceNumber,
type: process.env.esType,
body: {
"Kinesis-Shard-Event-ID": record.eventID,
"Time-Written-To-Kinesis-Shard": record.kinesis.approximateArrivalTimestamp,
"Message-Data": esDoc.toString(),
}
},function(err,resp,status) {
console.log(resp);
});
});
};
W r i t e s d a t a f r o m
K i n e s i s S t r e a m t o
E l a s t i c s e a r c h C l u s t e r
P r i v a t e D N S N a m e E n a b l e d
S U B N E T - 1 0 . 1 . 1 . 0 / 2 4
Availability Zone A
S E C U R I T Y G R O U P
1 0 . 1 . 1 . 1 0
v p c - i d v p c - e c 4 3 e b 8 9
k i n e s i s . u s - e a s t -
1 . a m a z o n a w s . c o m
Kinesis.putRecord
Application Log
Data
Application
Server
Elasticsearch
Cluster
Amazon Kinesis
M a k e s L a m b d a S e r v i c e
A w a r e o f t h e P U T
e v e n t
Writes to ES
Endpoint
VPC Endpoint
IAM Access Policy
S3
Bucket Policy
Writes logs
S3
DNS Resolution
IP add :
10.1.1.10
returned
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC ENDPOINT SERVICES
VIA
AMAZONPRIVATELINKS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
S U B N E T - 1 0 . 1 . 1 . 0 / 2 4
Availability Zone A
v p c - i d v p c - e c 4 3 e b 8 9
Application
Servers
CREATES VPC ENDPOINT SERVICE
WHITELIST ACCOUNTS FOR ACCESS
ASSOCIATE VPC ENDPOINT SERVICE WITH NLB
aws ec2 create-vpc-endpoint-service​​​​
--whitelist-account-ids 123456789012,210987654321
--network-load-balancer-ids nlb-aaaaaaaa​​
Network Load Balancer
SERVICE ARN : aws::us-east-1::service-12345678
SERVICE DNS NAME : service-12345678.vpc-Endpoints.aws
u s - w e s t - 2
1 0 . 1 . 1 . 0 / 2 4
Availability Zone A
S E C U R I T Y
G R O U P
1 0 . 1 . 1 . 1 0
v p c - i d v p c - b e s v p c e v r
d b A P I . e x e c u t e -
a p i . . u s - e a s t -
1 . a m a z o n a w s . c o m
HTTPS GET
DNS Resolution
IP add : 10.1.1.10
returned
HTTPS PUT
Intranet App- A
u s - w e s t - 2
LISTING AVAILABLE SERVICE OVER VPC ENDPOINTS
aws ec2 describe-vpc-endpoint-services​
P R O D U C E R C O N S U M E R
aws ec2 create-vpc-endpoint
--vpc-id vpc-ec43eb89
--vpc-endpoint-type Interface
--service-name com.amazonaws.us-east-1.elasticloadbalancing
--subnet-id subnet-abababab subnet-catbatratsat
--security-group-id sg-1a2b3c4d
DNS Names
elasticloadbalancing.us-west-2.amazonaws.com (Z35DVM6FZNQKU5)
General DNS Names
vpce-030344adc43a00bdb-45ltt7jj.elasticloadbalancing.us-west-2.vpce.amazonaws.com (Z1YSA3EXCYUU9Z)
Zonal DNS Names
vpce-030344adc43a00bdb-45ltt7jj-us-west-2b.elasticloadbalancing.us-west-2.vpce.amazonaws.com
vpce-030344adc43a00bdb-45ltt7jj-us-west-2a.elasticloadbalancing.us-west-2.vpce.amazonaws.com
vpce-030344adc43a00bdb-45ltt7jj-us-west-2c.elasticloadbalancing.us-west-2.vpce.amazonaws.com
A c c o u n t
– A
A c c o u n t
– B
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
S U B N E T - 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A
v p c - i d v p c - e c 4 3 e b 8 9
AMAZON RELATIONAL
DATABASE SERVICE
Network Load Balancer
u s - w e s t - 2
1 0 . 1 . 1 . 0 / 2 4
Availability Zone A
S E C U R I T Y
G R O U P
1 0 . 1 . 1 . 1 0
v p c - i d v p c - b e s v p c e v r
d b A P I . e x e c u t e -
a p i . . u s - e a s t -
1 . a m a z o n a w s . c o m
HTTPS GET
DNS Resolution
IP add : 10.1.1.10
returned
HTTPS PUT
Intranet App- A
u s - w e s t - 2
LISTING AVAILABLE SERVICE OVER VPC ENDPOINTS
aws ec2 describe-vpc-endpoint-services​
A c c o u n t
– A
A c c o u n t
– B
RDS-FAILURE-EVENT
AMAZON SNS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralize network connectivity to and from cloud
Centralize management, security, and common
services
Account owners in control of own VPC resources
Many AWS accounts
Many VPCs
One region
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Region
Customer
network
Internal apps
DNS
Directory
Logging
Monitoring
Security
Public apps
14 VPCs
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
HA VPN
TO
VPC
VPC
HA VPN Pair
Availability Zone A
iBGP
eBGP
Customer CIDRs or Default Route
eBGP
AWS ASN 7224
Re-advertise VPC CIDR via IGP
VGW
VPC CIDR
Customer ASN (Public or Private)
CGW1 CGW2
VPN1
Tun1
VPN1
Tun2
Availability Zone A
VPN2
Tun1
VPN2
Tun2
Reuse your customer gateway public IP
to connect to more VPCs
Customer
network
MED
MED
REGION
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
HUB & SPOKE
VPC PEERING
VPC
Shared services
VPC
Shared
services
VPC
VPC
Customer
network
Spoke VPC
Spoke VPC
Spoke VPCSpoke VPC
Spoke VPC
Spoke VPC
REGION
VPC
VPC
VPC
VPC
VPC
VPC
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
HQ
OREGON
VPC
Shared services
VPC
VPC
Customer
network
OREGON REGION
VPC
VPC
VPC
VPC
IRELAND REGION
VPC
Shared services
VPC
VPC
VPC
VPC
VPC
NOOVERLAPPINGIP
ADDRESSSPACE
SHARED SERVICES
A M A Z O N B A C K B O N E
I N T E R - R E G I O N
V P C P E E R
C R O S S - R E G I O N P E E R E D
C O N N E C T I O N E N C R Y P T E D
SINGAPORE REGION
VPC
VPC
VPC
Shared services
VPC
VPC
I N T E R - R E G I O N
V P C P E E R
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
us-east-2
VPC
VPC
VPC
VPC
Transit VPC
VPC
us-west-2
VPC
VPC
VPC
eu-west-1
VPC
VPC
VPC
VPC
Transit VPC
VPC
AWS Network
Backbone
Provider
MPLS
Network
Branch Branch
NA
HQ
VPC
VPC
VPC
VPC
VPC
VPC
Chicago DX
AP
HQ
London DX
ap-northeast-1
VPC
VPC
VPC
VPC
Transit VPC
VPC
EU
HQ
Tokyo DX
DO NOT DO THIS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Oregon DX Location
US-EAST-1
Customer Router
Ireland DX Location
Customer Router
Singapore DX Location
Customer Router
US-EAST-2
US-WEST-1
US-WEST-2
US-EAST-2
US-WEST-1
ACCOUNT-A
ACCOUNT-B
PRIVATE VIF
HOSTED
PRIVATE VIF
US-WEST-1 US-WEST-2
Reference Architecture
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Transit Gateway
SIMPLICITY
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
TransitGatewayIsARegional,NativeAWSService
AllowsYoutoInterconnectThousandsofVPCsThatExistWithinTheSameAccountOrDifferentAccounts
Today,ATransitGatewayconnectstoYourDatacentersviaanIPSecTunnelOnly
Supportsupto 10,000Routes
NetworkSegmentationIsAchieved ByCreatingMultipleRouteTablesinaTransitGatewayandAssociateVPCs&
VPN
On-DemandBandwidthtoMoveLargeAmountsofData
AWS Transit Gateway
InterconnectingVPCsatscale:TransitGatewayisbestsuitedforcustomerswho
havemultipleVPCsandwanttoconnectthem.
Edgeconsolidation:TransitGatewayallowscustomerstoshareacommonVPN
acrossalltheirVPCs.
GlobalConnectivity:TransitGatewayscanbepeeredacrossregionsusingthe
secureAWSbackboneallowingcustomerstobuildaglobalnetworkthat
connectstheirVPCsandon-premisesnetworksworldwide.
Whatitis Usecases
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private Subnet -A
TGW- ENI
Availability Zone A
ROUTE TABLE
ROUTE TABLE
aws ec2 create-transit-gateway
Whitelist other account(s) using the Cross-account resource sharing API:
create-resource-share --name "Network Ops resource share"
-–principals [‘account-2’, ‘account-3’] //same OU
--resource-arns ["arn:aws:ec2:us-east-1:12345678901:tgw/ tgw-
0ea7775074e8d0683"]
Account-2
Account-3
aws ec2 describe-transit-gateways
tgw-0ea7775074e8d0683
Discover the TGWs being shared aws ec2 create-transit-gateway-vpc-attachment
--transit-gateway-id tgw-
14324bbc412a43243
--vpc-id vpc-2321314314
--subnet-ids subnet-12312312,subnet-
41343432
Associate VPC with the TGWs being shared
aws ec2 describe-transit-gateway-vpc-
attachments
--transit-gateway-id tgw-14324bbc412a43243
--filters “Name=transit-gateway-attachment-
state, Values= pendingAcceptance”
Discover & Accept Associations
How it works
Private Subnet -A
TGW- ENI
Availability Zone A
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Routing & The Transit Gateway
TGWsupportsdynamicandstaticroutingbetweenattachedVPCs&VPN
Bydefault,VPCsandVPNsareassociatedwiththedefaultroutetable
RouteSegmentationcanbeachievedbycreatingadditionalroutetablesandassociateVPCsandVPNwithit.
RoutescanpointtoaVPCoraVPNconnection.
Thereare2wayswhereroutesgetpropagatedintheTransitGateway:
o Routespropagatedto/fromon-premises-networks/ Site-to-siteVPN
o Routeswillbepropagated/advertisedbetweentheTGWandyouron-premisesrouterusingBorderGateway
Protocol(BGP)
o RoutesPropagatedto/fromVPCs.
o WhenyouattachaVPCtoaTransitGatewayorresizesanattachedVPC,theVPCCIDRswillbepropagated
intotheTransitGatewayroutetableusinginternalAPIs(notBGP).
o RoutesintheTransitGatewayroutetablewillnotbepropagatedtotheVPC’sroutetable.
o VPCownerneedtocreatestaticroutetosendTraffictotheTransitGateway.
aws ec2 create-transit-gateway-route
--transit-gateway-route-table-ids
tgw-rtb-abc3232
--destination-cidr-block 10.1.0.0/16
--target-vpc-id vpc-34234322
CreatingRoutesStaticallyintheTGW
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Let’s look at a routing scenario
Customerhas:
ThreeAccounts: [Account–A,Account–B,Account–C]
Three(3)VPCs: [ vpc-aa-00 | vpc-bb-00 | vpc-cc-00 ]
One(1)Datacenter: [ DC–1 ]
Customerneedsto:
InterconnectallthreeVPCs
vpc-aa-00 & vpc-bb-00 Shouldroute ALLInternetRequestthroughaNATGatewayin VPCvpc-cc-00
Establish multipleIPSectunnels toacentralpointandpropagateitsroutestoitsAmazonVPCs
vpc-aa-00, vpc-bb-00 & vpc-cc-00shouldbeabletocommunicatewithusersandresourcesinDC-1aws ec2 create-transit-gateway
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
Oregon (us-west-2) Region
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
TRANSITGATEWAY
TGW-XYZ-123
ACCOUNT - A
ACCOUNT - B
Customer network
Private Route Table
Destination Target
10.1.0.0/16 Local
10.2.0.0/16 TGW-XYZ-123
10.3.0.0/16 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
Transit Gateway Default Route Table
Destination Target Route Description
10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A
10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B
10.3.0.0/24 Vpc-cc-00 Route to reach VPC - C
172.16.0.0/16 IPSEC-VPN-CONN-XXXXXX Route to on-premises DC
Private Route Table
Destination Target
10.2.0.0/16 Local
10.1.0.0/16 TGW-XYZ-123
10.3.0.0/16 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
Availability
Zone A
ROUTE TABLE
ACCOUNT - EPrivate Route Table
Destination Target
10.3.0.0/16 Local
10.2.0.0/16 TGW-XYZ-123
10.1.0.0/16 TGW-XYZ-123
10.1.0.0/16
10.2.0.0/16
10.3.0.0/16
vpc-aa-000
vpc-bb-000
vpc-cc-000
DC -1
172.16.0.0/16
Bandwidth per tunnel 1250Mbps
Maximum Tunnels : 30
IPSEC VPN
ECMP
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
Oregon (us-west-2) Region
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
TRANSITGATEWAY
TGW-XYZ-123
ACCOUNT - A
ACCOUNT - B
Customer network
Private Route Table
Destination Target
10.1.0.0/16 Local
10.30.0.0/16 TGW-XYZ-123
Transit Gateway Default Route Table
Destination Target Route Description
0.0.0.0/0 IPSEC-VPN-CONN-XXXXXX Route to on-premises DC
Private Route Table
Destination Target
10.2.0.0/16 Local
10.30.0.0/16 TGW-XYZ-123
AZ-A
ROUTE TABLE
ACCOUNT - EPrivate Route Table
Destination Target
10.30.0.0/16 Local
10.1.0.0/16 TGW-XYZ-123
10.1.0.0/16
10.2.0.0/16
10.30.0.0/16
vpc-aa-000
vpc-bb-000
SHARED SERVICES -vpc-cc-000
DC -1
172.16.0.0/16
Bandwidth per tunnel 1250Mbps
Maximum Tunnels : 30
IPSEC VPN
ECMP
VPC-A to VPC –B Route Table
Destination Target Route Description
10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A
10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B
DNS
Directory
Logging
Monitoring
Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
Oregon (us-west-2) Region
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
TRANSITGATEWAY
TGW-XYZ-123
ACCOUNT - A
ACCOUNT - B
Customer network
Private Route Table
Destination Target
10.1.0.0/16 Local
10.2.0.0/16 TGW-XYZ-123
10.3.0.0/16 TGW-XYZ-123
0.0.0.0/0 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
Transit Gateway Default Route Table
Destination Target Route Description
10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A
10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B
10.3.0.0/24 Vpc-cc-00 Route to reach VPC - C
172.16.0.0/16 IPSEC-VPN-CON Route to on-premises DC
0.0.0.0/0 Vpc-cc-00 Routed to Palo-Alto ENI
Private Route Table
Destination Target
10.2.0.0/16 Local
10.1.0.0/16 TGW-XYZ-123
10.3.0.0/16 TGW-XYZ-123
0.0.0.0/0 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
Availability Zone A
ROUTE TABLE
ACCOUNT - E
Private Route Table
Destination Target
10.3.0.0/16 Local
0.0.0.0/0 Palo-Alto-ENI
10.1.0.0/16 TGW-XYZ-123
10.1.0.0/16
10.2.0.0/16
10.3.0.0/16
vpc-aa-000
vpc-bb-000
vpc-cc-000
DC -1
172.16.0.0/16
IPSEC VPN
ECMP
INTERNET
TGW- ENI
IGW
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
us-eAst-2
Region
Private subnet
Internal app
Availability Zone A
ROUTE TABLE
TRANSITGATEWAY
TGW-XYZ-123
ACCOUNT - A
ACCOUNT - B
Customer
network
Private Route Table
Destination Target
10.1.0.0/16 Local
10.2.0.0/16 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
Transit Gateway Default Route Table
Destination Target Route Description
10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A
10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B
172.16.0.0/16 IPSEC-VPN-CONN Route to on-premises DC
Private Route Table
Destination Target
10.2.0.0/16 Local
10.1.0.0/16 TGW-XYZ-123
172.16.0.0/16 TGW-XYZ-123
10.1.0.0/16
10.2.0.0/16
vpc-aa-000
vpc-bb-000
172.16.0.0/16
DX INTEGRATION
IPSEC VPN
A Z - A
ACCOUNT - B10.22.0.0/16
Transit - vpc-bb-000
A Z - B
PRIVATE VIF
IPSEC VPN
Oregon (us-west-2) Region
CROSS REGION PEERING COMING SOON!!!!!!!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Key benefits of Transit Gateway
SimplifiedNetworking
EasytoManageSetUp
HigherVPNBandwidth
Reliability
SinglepointtoconnectVPCs(whethersameaccountoracrossaccounts)andSite-to-SiteVPNsforsimplified
management
Reducesthetime tosetupnewVPCsneedingedgeconnectivity
Reduces operationalburdeninmanagingedgeconnectivityforalargenumberofVPCs
OffersthesamereliabilityastherestofAWSplatform.Itusesacellular,scalable,andresilientplatformthat
runswithinAmazon’sproveninfrastructure
Achievebandwidthrangefrom1.2Gbpsto >60Gbps by
leveragingECMPacrosstwoto50Site-2-SiteVPNtunnels
Integration
ControloverinterconnectivitypoliciesbetweenVPCsandon-premises
networkswhichimprovetheirnetworksecurity.
Security
managementandmonitorTransitGatewayswithCloudFormation,
CloudWatchandVPCFlowLogs.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC SHARING
ShareVPCsacrossmultiple accountsinanAWSOrganization
ShareVPCsacrossmultipleaccounts
inanAWSOrganization
FLATNETWORKSPACE
FORALL
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Customers Complain About
Inconsistentnetworkconfigurationsduetolackofcentralizedcontrolandinsufficientnetworkskillsacrosstheorganization
Lackoftoolingtoenforceconsistentconfigurationsandsecuritycontrolsacross100sofVPCsacross100sofaccounts
ManagingcomplexmeshesofVPCPeeringsandPrivateLinkconnectionstoprovideinterconnectivity
HighercostsbecauseofmultipleVPN/DXconnections
IPwastageduetotheneedtohavenon-overlappingVPCCIDRsforpeering.
CustomerswithhundredsofVPCsoftencomplainof:
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
ACCOUNT – A ( VPC Owner )
VPCCIDR10.0.0.0/16
Availability Zone A Availability Zone B Availability Zone C
10.0.2.0/2410.0.1.0/24
PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet
10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24
ACCOUNT – B ACCOUNT – C ACCOUNT – C ACCOUNT – C ACCOUNT – C
Participant Accounts
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
ACCOUNT – A (VPC Owner)
VPCCIDR10.0.0.0/16
Availability Zone A Availability Zone B Availability Zone C
10.0.2.0/2410.0.1.0/24
PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet
10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24
AWS Organizations
Share across all accounts in multiple OUs in the same org
create-resource-share –name “MAVPC_OU1-3” – resource-
arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-
1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’]
--principals [‘ou-1’, ‘ou-2’, ‘ou-3’]
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC Owner Sharing VPC Subnet
Share across all accounts in multiple OUs in the same org
create-resource-share –name “MAVPC_OU1-3” – resource-arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-
1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’] --principals [‘ou-1’, ‘ou-2’, ‘ou-3’]
Share across all accounts in the same AWS Org
> create-resource-share –name “MAVPC_ORG_1” – resource-arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-
1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’] –- principals [‘org_1’]
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Participant Accounts
{
"Subnets": [
{
"VpcId": "vpc-a0110aaaa", // Participant owned VPC
………
"SubnetId": "subnet-9d4aaaaa", // Participant owned subnet
………
"OwnerAccountId": "2222222222222” // Participant AccountId
},
{
….....
"VpcId": "vpc-11111111", // MAPVC
"State": "available",
"MapPublicIpOnLaunch": false,
"SubnetId": "subnet- aaaaaaa", //MAVPC Subnet
……….,
"OwnerAccountId": "111111111111” , // MAVPC Owner id
}
]
}
aws ec2 describe-subnets
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Key Benefits & Use Cases of Sharing VPC
SimplerAllocationofPrivateIPv4SpaceNaturalInterconnectivity:
EnforcementofSeparationofDutiesandConsistentNetwork Configurations
SharingofVPCsprovidesthebenefitsofbillingsegregationandaccesscontrol
acrossprojectsandteamsthroughtheuseofmultipleaccounts
Whatarethekeybenefitsofusing thisfeature? UseCases
ConsolidationofVPCs:
Customerswith100sofaccounts,whowould
preferanetworkarchitecturewith10sof
centrallymanagedVPCswithlargeCIDR
Small-tomedium-sizecustomersmigrating
tothecloud:
Small-tomedium-sizedcustomerslookingtomigrate
tothecloudcanleveragethecapabilityduring
migration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sharing VPC Segmentation & Security
AnAccountOwner
o CannotseeParticipantAccounts recourseslikeEC2Instances,Loadbalancers,
LambdaFunctions
o DescribeNetworkInterfaceswillindicatetheowneraccountofeachENI,evenif
theowneristheVPCowner
o FullAccess&ControlofSubnets,RouteTables &NACLs
o CanDescribeSecurityGroupsforParticipantAccountsbutcannotModify
ParticipantAccount
o FullAccesstoresourcescreatedinthesubnetsbeingshared
o FullAccesstocreateSecurityGroupsforresourcesinsideinthesharedsubnets
o NoaccesstotheowneraccountSecurityGroupsorotherParticipantSecurityGroups
o UnabletointeractormodifyAmazonRoute53PrivateHostedZone,Peering,VGW,NAT
GW
PacketSegmentation
o Subnetting
o RouteTables
o SecurityGroups
o NACLs
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
ACCOUNT – A ( VPC Owner)
VPCCIDR10.0.0.0/16
Availability Zone A
10.0.1.0/24
PublicSubnet
10.0.1.0/24
PrivateSubnet
Availability Zone B
10.0.1.0/24
PrivateSubnet
10.0.1.0/24
PublicSubnet
Availability Zone C
10.0.1.0/24
PublicSubnet
10.0.1.0/24
PrivateSubnet
VPCCIDR10.2.0.0/16
Availability Zone A
10.2.1.0/24
PrivateSubnet
Prod-VPC
Availability Zone B
10.2.2.0/24
PrivateSubnet
10.0.1.0/20
Private
LambdaSubnet
10.0.1.0/20
Private
LambdaSubnet
10.0.1.0/20
Private
LambdaSubnet
ACC-1
ACC-2
ACC-N
SharedVPC
VPCPEERING
Logging&Monitoring
ADDomainControllers
Security
Logging&Monitoring
ADDomainControllers
Security
Logging&Monitoring
ADDomainControllers
Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC–ID-XYZABC
Availability Zone A
10.0.1.0/24
PublicSubnet
10.0.1.0/24
PrivateSubnet
Availability Zone B
10.0.1.0/24
PrivateSubnet
10.0.1.0/24
PublicSubnet
VPCCIDR10.0.0.0/16
Availability Zone A
10.0.1.0/24
PublicSubnet
10.0.1.0/24
PrivateSubnet
Availability Zone B
10.0.1.0/24
PrivateSubnet
10.0.1.0/24
PublicSubnet
VPCCIDR10.0.0.0/16
Availability Zone A
10.0.1.0/24
PublicSubnet
10.0.1.0/24
PrivateSubnet
Availability Zone B
10.0.1.0/24
PrivateSubnet
10.0.1.0/24
PublicSubnet
VPCCIDR10.0.0.0/16
ACCOUNT – A
( VPC Owner )
(Participant Acc) (Participant Acc)
(Participant Acc)
o OneSingleVPC,MultipleVPCCIDRBlocks
o CIDRperBusinessUnit
o NACLsSecurityBoundaryfor eachsubnet
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)
以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)
以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)Amazon Web Services
 
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...Amazon Web Services
 
Serverless: State of The Union I AWS Dev Day 2018
Serverless: State of The Union I AWS Dev Day 2018Serverless: State of The Union I AWS Dev Day 2018
Serverless: State of The Union I AWS Dev Day 2018AWS Germany
 
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...Amazon Web Services
 
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)Amazon Web Services
 
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)Amazon Web Services
 
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)Amazon Web Services
 
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018Amazon Web Services
 
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018Amazon Web Services
 
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018Amazon Web Services
 
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)Amazon Web Services
 
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...Amazon Web Services
 
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech Talks
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech TalksElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech Talks
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech TalksAmazon Web Services
 
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...Amazon Web Services
 
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...Amazon Web Services
 
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018Amazon Web Services
 
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...Amazon Web Services
 
New Features for Building Powerful Containerized Microservices on AWS - AWS O...
New Features for Building Powerful Containerized Microservices on AWS - AWS O...New Features for Building Powerful Containerized Microservices on AWS - AWS O...
New Features for Building Powerful Containerized Microservices on AWS - AWS O...Amazon Web Services
 
善用 GraphQL 與 AWS AppSync 讓您的 Progressive Web App (PWA) 加速進化 (Level 200)
善用  GraphQL 與 AWS AppSync 讓您的  Progressive Web App (PWA) 加速進化 (Level 200)善用  GraphQL 與 AWS AppSync 讓您的  Progressive Web App (PWA) 加速進化 (Level 200)
善用 GraphQL 與 AWS AppSync 讓您的 Progressive Web App (PWA) 加速進化 (Level 200)Amazon Web Services
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration Amazon Web Services
 

What's hot (20)

以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)
以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)
以 Amazon EC2 Spot 執行個體有效控制專案成本 (Level: 200)
 
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...
Increase the Value of Video with ML & Media Services - SRV322 - New York AWS ...
 
Serverless: State of The Union I AWS Dev Day 2018
Serverless: State of The Union I AWS Dev Day 2018Serverless: State of The Union I AWS Dev Day 2018
Serverless: State of The Union I AWS Dev Day 2018
 
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...
[NEW LAUNCH!] Deep Dive on Amazon FSx for Windows File Server (STG322-R) - AW...
 
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)
使用 AWS EKS 打造高效原生雲端 (Cloud Native ) 設計 (Level 400)
 
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)
OTT 成功的關鍵:打造影劇品質監控儀表板 (Level: 200)
 
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)
使用 AWS 無伺服器化應用程式模型 (SAM) 釋放您的 "敏捷" 能量 (Level 300)
 
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018
Securing Your Virtual Data Center in the Cloud (NET202) - AWS re:Invent 2018
 
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
 
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018
A Serverless Journey: AWS Lambda Under the Hood (SRV409-R1) - AWS re:Invent 2018
 
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)
Amazon Redshift 與 Amazon Redshift Spectrum 幫您建立現代化資料倉儲 (Level 300)
 
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
 
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech Talks
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech TalksElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech Talks
ElastiCache: Deep Dive Best Practices and Usage Patterns - AWS Online Tech Talks
 
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...
Architecture Patterns for Multi-Region Active-Active Applications (ARC209-R2)...
 
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...
Introducing AWS Transfer for SFTP, a Fully Managed SFTP Service for Amazon S3...
 
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018
Deploying Microservices using AWS Fargate (CON315-R1) - AWS re:Invent 2018
 
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
 
New Features for Building Powerful Containerized Microservices on AWS - AWS O...
New Features for Building Powerful Containerized Microservices on AWS - AWS O...New Features for Building Powerful Containerized Microservices on AWS - AWS O...
New Features for Building Powerful Containerized Microservices on AWS - AWS O...
 
善用 GraphQL 與 AWS AppSync 讓您的 Progressive Web App (PWA) 加速進化 (Level 200)
善用  GraphQL 與 AWS AppSync 讓您的  Progressive Web App (PWA) 加速進化 (Level 200)善用  GraphQL 與 AWS AppSync 讓您的  Progressive Web App (PWA) 加速進化 (Level 200)
善用 GraphQL 與 AWS AppSync 讓您的 Progressive Web App (PWA) 加速進化 (Level 200)
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration
 

Similar to From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re:Invent 2018

利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路Amazon Web Services
 
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...Amazon Web Services
 
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018Amazon Web Services
 
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS Summit
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS SummitPlan Advanced AWS Networking Architectures - SRV323 - Chicago AWS Summit
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS SummitAmazon Web Services
 
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City Summit
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City SummitPlanificación de arquitecturas de red de AWS - MXO211 - Mexico City Summit
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City SummitAmazon Web Services
 
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...Amazon Web Services
 
AWS Networking Fundamentals - SVC304 - Anaheim AWS Summit
AWS Networking Fundamentals - SVC304 - Anaheim AWS SummitAWS Networking Fundamentals - SVC304 - Anaheim AWS Summit
AWS Networking Fundamentals - SVC304 - Anaheim AWS SummitAmazon Web Services
 
AWS networking fundamentals - SVC211 - São Paulo AWS Summit
AWS networking fundamentals - SVC211 - São Paulo AWS SummitAWS networking fundamentals - SVC211 - São Paulo AWS Summit
AWS networking fundamentals - SVC211 - São Paulo AWS SummitAmazon Web Services
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingCobus Bernard
 
ARC304_From One to Many Evolving VPC Design
ARC304_From One to Many Evolving VPC DesignARC304_From One to Many Evolving VPC Design
ARC304_From One to Many Evolving VPC DesignAmazon Web Services
 
Fundamentals of AWS networking - SVC303 - Atlanta AWS Summit
Fundamentals of AWS networking - SVC303 - Atlanta AWS SummitFundamentals of AWS networking - SVC303 - Atlanta AWS Summit
Fundamentals of AWS networking - SVC303 - Atlanta AWS SummitAmazon Web Services
 
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018Amazon Web Services
 
Deep Dive on New AWS Networking Features - AWS Online Tech Talks
Deep Dive on New AWS Networking Features - AWS Online Tech TalksDeep Dive on New AWS Networking Features - AWS Online Tech Talks
Deep Dive on New AWS Networking Features - AWS Online Tech TalksAmazon Web Services
 
NET201_Creating Your Virtual Data Center
NET201_Creating Your Virtual Data CenterNET201_Creating Your Virtual Data Center
NET201_Creating Your Virtual Data CenterAmazon Web Services
 
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...Bhavin Desai, CCIE Security
 
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS Summit
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS SummitAWS PrivateLink: Fundamentals - SRV211 - Chicago AWS Summit
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS SummitAmazon Web Services
 
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018Amazon Web Services
 
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...Amazon Web Services
 

Similar to From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re:Invent 2018 (20)

利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路
 
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...
Interactive Zero-Touch Enterprise Networks: Nuage SD-WAN on AWS (TLC310) - AW...
 
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018
From One to Many: Evolving VPC Design (ARC309-R1) - AWS re:Invent 2018
 
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS Summit
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS SummitPlan Advanced AWS Networking Architectures - SRV323 - Chicago AWS Summit
Plan Advanced AWS Networking Architectures - SRV323 - Chicago AWS Summit
 
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City Summit
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City SummitPlanificación de arquitecturas de red de AWS - MXO211 - Mexico City Summit
Planificación de arquitecturas de red de AWS - MXO211 - Mexico City Summit
 
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...
Advanced VPC Design and New Capabilities for Amazon VPC (NET303) - AWS re:Inv...
 
AWS Networking Fundamentals - SVC304 - Anaheim AWS Summit
AWS Networking Fundamentals - SVC304 - Anaheim AWS SummitAWS Networking Fundamentals - SVC304 - Anaheim AWS Summit
AWS Networking Fundamentals - SVC304 - Anaheim AWS Summit
 
AWS networking fundamentals - SVC211 - São Paulo AWS Summit
AWS networking fundamentals - SVC211 - São Paulo AWS SummitAWS networking fundamentals - SVC211 - São Paulo AWS Summit
AWS networking fundamentals - SVC211 - São Paulo AWS Summit
 
AWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: NetworkingAWS SSA Webinar 10 - Getting Started on AWS: Networking
AWS SSA Webinar 10 - Getting Started on AWS: Networking
 
ARC304_From One to Many Evolving VPC Design
ARC304_From One to Many Evolving VPC DesignARC304_From One to Many Evolving VPC Design
ARC304_From One to Many Evolving VPC Design
 
Fundamentals of AWS networking - SVC303 - Atlanta AWS Summit
Fundamentals of AWS networking - SVC303 - Atlanta AWS SummitFundamentals of AWS networking - SVC303 - Atlanta AWS Summit
Fundamentals of AWS networking - SVC303 - Atlanta AWS Summit
 
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018
Best Practices for Securing an Amazon VPC (NET318) - AWS re:Invent 2018
 
VPC and DX PoP @ HKG
VPC and DX PoP @ HKGVPC and DX PoP @ HKG
VPC and DX PoP @ HKG
 
Deep Dive on New AWS Networking Features - AWS Online Tech Talks
Deep Dive on New AWS Networking Features - AWS Online Tech TalksDeep Dive on New AWS Networking Features - AWS Online Tech Talks
Deep Dive on New AWS Networking Features - AWS Online Tech Talks
 
NET201_Creating Your Virtual Data Center
NET201_Creating Your Virtual Data CenterNET201_Creating Your Virtual Data Center
NET201_Creating Your Virtual Data Center
 
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
 
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS Summit
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS SummitAWS PrivateLink: Fundamentals - SRV211 - Chicago AWS Summit
AWS PrivateLink: Fundamentals - SRV211 - Chicago AWS Summit
 
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
 
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...
AWS re:Invent 2018: [NEW LAUNCH] AWS Transit Gateway & Transit VPCs, Ref Arch...
 
AWS Networking Fundamentals
AWS Networking FundamentalsAWS Networking Fundamentals
AWS Networking Fundamentals
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

From One to Many: Diving Deeper into Evolving VPC Design (ARC310-R2) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. From One to Many: Evolving VPC Design Chalk Talk Androski Spicer Solutions Architect Amazon Web Services A R C 3 1 0
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. A m a z o n V P C D e s i g n Rethinking Connectivity
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC IP SPACE DESIGN Don’toverlapIPspace Considerconnectivitytocorporatenetworks PlanforexpansiontoadditionalAvailabilityZonesorregions Subnet Availability Zone A IPv4 IPv6 OptionallyenableIPv6onVPC /56ofAmazon’sGlobalUnicastAddress(GUA)perVPC /64CIDRblockpersubnet IPv6completelyindependentfromIPv4 Enabledpersubnetorperinstance(perENI) Supportedbysecuritygroups,routetables,NACLs,VPCPeering internetgateway,DX,flowlogs,andDNSResolution ChooseACIDR /16 /28 (65,536 IPs) (16IPs)
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC ID : abc-de-fg-7 Secondary CIDR : 10.2.0.0/16 Secondary CIDR : 10.3.0.0/16 Secondary CIDR : 10.4.0.0/16 Secondary CIDR : 10.5.0.0/16 Primary CIDR : 10.1.0.0/28 Main Route Table Destination Target 10.1.0.0/28 Local 10.2.0.0/16 Local 10.3.0.0/16 Local 10.4.0.0/16 Local 10.5.0.0/16 Local US-WEST-2 VPC RESIZING Primary CIDR 10.3.0.0/16 • CIDR Block/s cannot overlap • Existing CIDR Blocks cannot change • CIDR block must not be the same or larger than the CIDR range of a route in any of the VPC route tables
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. IPv4 VPC SUBNET DESIGN /16 Availability Zone A Hybrid Subnet Public subnet Private subnet Availability Zone B Public subnet Private subnet Availability Zone C Public subnet Private subnet /22 /22 /22 /20 /20 /20 /20 /20 /20 4091 IPs 1019 IPs 4091 IPs Hybrid Subnet Hybrid Subnet
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. WHAT ABOUT IPV6 DESIGN Availability Zone A Public subnet Private subnet Availability Zone B Public subnet Private subnet Availability Zone C Public subnet Private subnet /64 /56 /64 /64 /64 /64 /64 18 QUINTILLION 18 QUINTILLION 18 SEXTILLION
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. INTERNET ACCESS
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. DEPLOY A NAT GATEWAY Availability Zone A Public subnet Private Route Table Destination Target 10.1.0.0/16 Local 0.0.0.0/0 NAT-GW-1 Corp CIDR VGW Private subnet CORPORATE DATA CENTER Availability Zone A Public subnet Private subnet INTERNET GATEWAY INTERNET NAT GATEWAY • Still need internet gateway • Separate subnets • Requires Elastic IP address • AZ specific • Burst to 10 Gbps Hybrid subnet Hybrid subnet
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Hybrid subnet ROUTING IN THE PRIVATE SUBNET Availability Zone A Hybrid subnet Public subnet Private Route Table Destination Target 10.1.0.0/16 Local 0.0.0.0/0 NAT-GW-2 Corp CIDR VGW Private subnet CORPORATE DATA CENTER Availability Zone A Public subnet Private subnet INTERNET GATEWAY INTERNET NAT GATEWAY NAT GATEWAY
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. ROUTING IN THE PRIVATE SUBNET Availability Zone A Public subnet Private Route Table Destination Target 10.1.0.0/16 Local 0.0.0.0/0 NAT-GW-2 Corp CIDR VGW Private subnet CORPORTAE DATA CENTER Availability Zone A Public subnet Private subnet INTERNET GATEWAY INTERNET NAT GATEWAY NAT GATEWAY Hybrid subnet Hybrid subnet
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Availability Zone A AWS Oregon (us-west-2) Region ROUTE TABLE 0.0.0.0/0 – > NAT GW Public Subnet Public Infrastructure Availability Zone A Private Route Table Destination Target 10.1.0.0/16 Local 0.0.0.0/0 NAT-GW NAT GATEWAY (NAT-GW) ROUTE TABLE Private Route Table Destination Target 10.1.0.0/16 Local 0.0.0.0/0 IGW PRIVATE PUBLIC IGW 18.219.170.117
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Amazon S3Amazon DynamoDB Availability Zone A GATEWAY VPC ENDPOINTS VPC ENDPOINT AWS Oregon (us-west-2) Region GATEWAY ROUTE TABLE GET REQUEST TO AMAZON S3 PUT REQUEST TO DYNAMODB Route Table Destination Target 10.1.0.0/16 Local Corp CIDR VGW Prefix List for S3 us-west-2 VPC-Endpoint Prefix List for DynamoDB- us-west-2 VPC-Endpoint aws ec2 create-vpc-endpoint --vpc-id vpc-40f18d25 --service-name com.amazonaws.us-west-2.s3 --route-table-ids rtb-2ae6a24f rtb-61c78704 aws ec2 create-vpc-endpoint --vpc-id vpc-40f18d25 --service-name com.amazonaws.us-west- 2.dynamodb aws ec2 describe-vpc-endpoint-services { "ServiceNames": [ "com.amazonaws.us-east-1.s3", "com.amazonaws.us-east-1.dynamodb" ] } Amazon S3 Amazon DynamoDB Add Endpoint Hostnames to Security Group Outgoing Rules
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. { "Statement": [ { "Sid": "vpce-restrict-to-backup-bucket", "Principal": "*", "Action": [ "s3:GetObject", "s3:PutObject” ], "Effect": "Allow", "Resource": ["arn:aws:s3:::reinvent-docs", "arn:aws:s3::: reinvent-docs /*"] } ] } { "Statement": [ { "Sid": "bucket-restrict-to-specific-vpce", "Principal": "*", "Action": "s3:*", "Effect": "Deny", "Resource": ["arn:aws:s3:::backups-reinvent", "arn:aws:s3:::backups-reinvent/*"], "Condition": {"StringNotEquals": {"aws:sourceVpce": "vpce-bc42a4e5” } } } ] } S3 Bucket Policy VPC Endpoint IAM Access Policy Private subnet Internal app Availability Zone A VPC ENDPOINTGATEWAY ROIUTE TABLE GET REQUEST TO S3 VPC Endpoint IAM Access Policy S3 Bucket Policy
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. INTERFACE VPC ENDPOINTS S E R V I C E O W N E D B Y Y O U , O T H E R A C C O U N T S O R A M A Z O N P A R T N E R S E n a b l e s p r i v a t e c o m m u n i c a t i o n b e t w e e n A W S s e r v i c e s u s i n g a n e l a s t i c n e t w o r k i n t e r f a c e w i t h p r i v a t e I P s i n y o u r A m a z o n V P C 1 0 . 1 . 1 0 . 5 0 S U B N E T - 1 0 . 1 . 1 0 . 0 / 2 4 Availability Zone A O N E E N I P E R A Z F O R A S P E C I F I C S E R V I C E 1 0 . 1 . 2 0 . 5 0 S U B N E T - 1 0 . 1 . 2 0 . 0 / 2 4 Availability Zone B R e q u e s t e r - m a n a g e d n e t w o r k i n t e r f a c e 1 0 G B P S E A C H I N T E R F A C E E N D P O I N T
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. S U B N E T - 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A aws ec2 create-vpc-endpoint --vpc-id vpc-ec43eb89 --vpc-endpoint-type Interface --service-name com.amazonaws.us-east-1.kinesis --subnet-id subnet-abababab subnet-catbatratsat --security-group-id sg-1a2b3c4d S E C U R I T Y G R O U P S U B N E T - 1 0 . 1 . 2 . 0 / 2 4 Availability Zone B S E C U R I T Y G R O U P Amazon Kinesis 1 0 . 1 . 2 . 1 0 1 0 . 1 . 1 . 1 0 v p c - i d v p c - e c 4 3 e b 8 9 k i n e s i s . u s - e a s t - 1 . a m a z o n a w s . c o m Enable Private DNS Name o AWS Services o AWS Market Place Services Kinesis.putRecord DNS Resolution Virtual Private Gateway Customer network IPSec VPN NO ROUTES IN YOUR ROUTE TABLE SUPPORTS TCP ONLY aws ec2 describe-vpc-endpoints DX Gateway vpce-0fe5b17a0707d6abc-29p5708s.kinesis.us-west- 2.vpce.amazonaws.com ENDPOINT-SPECIFIC REGIONAL DNS HOSTNAME vpce-0fe5b17a0707d6abc-29p5708s-us-west- 2a.kinesis.us-west-2.vpce.amazonaws.com vpce-0fe5b17a0707d6abc-29p5708s-us-west- 2b.kinesis.us-west-2.vpce.amazonaws.com ENDPOINT-SPECIFIC ZONAL DNS HOSTNAME kinesis.us-west-2.amazonaws.com PRIVATE DNS ENABLED
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. //Lambda Handler Function aka Main exports.handler = (event, context, callback) => { event.Records.forEach(function(record) { var esDoc = new Buffer(record.kinesis.data, 'base64'); esDoc = esDoc.toString(); client.index({ index: process.env.esIndex, id: record.kinesis.sequenceNumber, type: process.env.esType, body: { "Kinesis-Shard-Event-ID": record.eventID, "Time-Written-To-Kinesis-Shard": record.kinesis.approximateArrivalTimestamp, "Message-Data": esDoc.toString(), } },function(err,resp,status) { console.log(resp); }); }); }; W r i t e s d a t a f r o m K i n e s i s S t r e a m t o E l a s t i c s e a r c h C l u s t e r P r i v a t e D N S N a m e E n a b l e d S U B N E T - 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A S E C U R I T Y G R O U P 1 0 . 1 . 1 . 1 0 v p c - i d v p c - e c 4 3 e b 8 9 k i n e s i s . u s - e a s t - 1 . a m a z o n a w s . c o m Kinesis.putRecord Application Log Data Application Server Elasticsearch Cluster Amazon Kinesis M a k e s L a m b d a S e r v i c e A w a r e o f t h e P U T e v e n t Writes to ES Endpoint VPC Endpoint IAM Access Policy S3 Bucket Policy Writes logs S3 DNS Resolution IP add : 10.1.1.10 returned
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC ENDPOINT SERVICES VIA AMAZONPRIVATELINKS
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. S U B N E T - 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A v p c - i d v p c - e c 4 3 e b 8 9 Application Servers CREATES VPC ENDPOINT SERVICE WHITELIST ACCOUNTS FOR ACCESS ASSOCIATE VPC ENDPOINT SERVICE WITH NLB aws ec2 create-vpc-endpoint-service​​​​ --whitelist-account-ids 123456789012,210987654321 --network-load-balancer-ids nlb-aaaaaaaa​​ Network Load Balancer SERVICE ARN : aws::us-east-1::service-12345678 SERVICE DNS NAME : service-12345678.vpc-Endpoints.aws u s - w e s t - 2 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A S E C U R I T Y G R O U P 1 0 . 1 . 1 . 1 0 v p c - i d v p c - b e s v p c e v r d b A P I . e x e c u t e - a p i . . u s - e a s t - 1 . a m a z o n a w s . c o m HTTPS GET DNS Resolution IP add : 10.1.1.10 returned HTTPS PUT Intranet App- A u s - w e s t - 2 LISTING AVAILABLE SERVICE OVER VPC ENDPOINTS aws ec2 describe-vpc-endpoint-services​ P R O D U C E R C O N S U M E R aws ec2 create-vpc-endpoint --vpc-id vpc-ec43eb89 --vpc-endpoint-type Interface --service-name com.amazonaws.us-east-1.elasticloadbalancing --subnet-id subnet-abababab subnet-catbatratsat --security-group-id sg-1a2b3c4d DNS Names elasticloadbalancing.us-west-2.amazonaws.com (Z35DVM6FZNQKU5) General DNS Names vpce-030344adc43a00bdb-45ltt7jj.elasticloadbalancing.us-west-2.vpce.amazonaws.com (Z1YSA3EXCYUU9Z) Zonal DNS Names vpce-030344adc43a00bdb-45ltt7jj-us-west-2b.elasticloadbalancing.us-west-2.vpce.amazonaws.com vpce-030344adc43a00bdb-45ltt7jj-us-west-2a.elasticloadbalancing.us-west-2.vpce.amazonaws.com vpce-030344adc43a00bdb-45ltt7jj-us-west-2c.elasticloadbalancing.us-west-2.vpce.amazonaws.com A c c o u n t – A A c c o u n t – B
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. S U B N E T - 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A v p c - i d v p c - e c 4 3 e b 8 9 AMAZON RELATIONAL DATABASE SERVICE Network Load Balancer u s - w e s t - 2 1 0 . 1 . 1 . 0 / 2 4 Availability Zone A S E C U R I T Y G R O U P 1 0 . 1 . 1 . 1 0 v p c - i d v p c - b e s v p c e v r d b A P I . e x e c u t e - a p i . . u s - e a s t - 1 . a m a z o n a w s . c o m HTTPS GET DNS Resolution IP add : 10.1.1.10 returned HTTPS PUT Intranet App- A u s - w e s t - 2 LISTING AVAILABLE SERVICE OVER VPC ENDPOINTS aws ec2 describe-vpc-endpoint-services​ A c c o u n t – A A c c o u n t – B RDS-FAILURE-EVENT AMAZON SNS
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Centralize network connectivity to and from cloud Centralize management, security, and common services Account owners in control of own VPC resources Many AWS accounts Many VPCs One region
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Region Customer network Internal apps DNS Directory Logging Monitoring Security Public apps 14 VPCs
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. HA VPN TO VPC VPC HA VPN Pair Availability Zone A iBGP eBGP Customer CIDRs or Default Route eBGP AWS ASN 7224 Re-advertise VPC CIDR via IGP VGW VPC CIDR Customer ASN (Public or Private) CGW1 CGW2 VPN1 Tun1 VPN1 Tun2 Availability Zone A VPN2 Tun1 VPN2 Tun2 Reuse your customer gateway public IP to connect to more VPCs Customer network MED MED REGION
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. HUB & SPOKE VPC PEERING VPC Shared services VPC Shared services VPC VPC Customer network Spoke VPC Spoke VPC Spoke VPCSpoke VPC Spoke VPC Spoke VPC REGION VPC VPC VPC VPC VPC VPC
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. HQ OREGON VPC Shared services VPC VPC Customer network OREGON REGION VPC VPC VPC VPC IRELAND REGION VPC Shared services VPC VPC VPC VPC VPC NOOVERLAPPINGIP ADDRESSSPACE SHARED SERVICES A M A Z O N B A C K B O N E I N T E R - R E G I O N V P C P E E R C R O S S - R E G I O N P E E R E D C O N N E C T I O N E N C R Y P T E D SINGAPORE REGION VPC VPC VPC Shared services VPC VPC I N T E R - R E G I O N V P C P E E R
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. us-east-2 VPC VPC VPC VPC Transit VPC VPC us-west-2 VPC VPC VPC eu-west-1 VPC VPC VPC VPC Transit VPC VPC AWS Network Backbone Provider MPLS Network Branch Branch NA HQ VPC VPC VPC VPC VPC VPC Chicago DX AP HQ London DX ap-northeast-1 VPC VPC VPC VPC Transit VPC VPC EU HQ Tokyo DX DO NOT DO THIS
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Oregon DX Location US-EAST-1 Customer Router Ireland DX Location Customer Router Singapore DX Location Customer Router US-EAST-2 US-WEST-1 US-WEST-2 US-EAST-2 US-WEST-1 ACCOUNT-A ACCOUNT-B PRIVATE VIF HOSTED PRIVATE VIF US-WEST-1 US-WEST-2 Reference Architecture
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Transit Gateway SIMPLICITY
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. TransitGatewayIsARegional,NativeAWSService AllowsYoutoInterconnectThousandsofVPCsThatExistWithinTheSameAccountOrDifferentAccounts Today,ATransitGatewayconnectstoYourDatacentersviaanIPSecTunnelOnly Supportsupto 10,000Routes NetworkSegmentationIsAchieved ByCreatingMultipleRouteTablesinaTransitGatewayandAssociateVPCs& VPN On-DemandBandwidthtoMoveLargeAmountsofData AWS Transit Gateway InterconnectingVPCsatscale:TransitGatewayisbestsuitedforcustomerswho havemultipleVPCsandwanttoconnectthem. Edgeconsolidation:TransitGatewayallowscustomerstoshareacommonVPN acrossalltheirVPCs. GlobalConnectivity:TransitGatewayscanbepeeredacrossregionsusingthe secureAWSbackboneallowingcustomerstobuildaglobalnetworkthat connectstheirVPCsandon-premisesnetworksworldwide. Whatitis Usecases
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private Subnet -A TGW- ENI Availability Zone A ROUTE TABLE ROUTE TABLE aws ec2 create-transit-gateway Whitelist other account(s) using the Cross-account resource sharing API: create-resource-share --name "Network Ops resource share" -–principals [‘account-2’, ‘account-3’] //same OU --resource-arns ["arn:aws:ec2:us-east-1:12345678901:tgw/ tgw- 0ea7775074e8d0683"] Account-2 Account-3 aws ec2 describe-transit-gateways tgw-0ea7775074e8d0683 Discover the TGWs being shared aws ec2 create-transit-gateway-vpc-attachment --transit-gateway-id tgw- 14324bbc412a43243 --vpc-id vpc-2321314314 --subnet-ids subnet-12312312,subnet- 41343432 Associate VPC with the TGWs being shared aws ec2 describe-transit-gateway-vpc- attachments --transit-gateway-id tgw-14324bbc412a43243 --filters “Name=transit-gateway-attachment- state, Values= pendingAcceptance” Discover & Accept Associations How it works Private Subnet -A TGW- ENI Availability Zone A
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Routing & The Transit Gateway TGWsupportsdynamicandstaticroutingbetweenattachedVPCs&VPN Bydefault,VPCsandVPNsareassociatedwiththedefaultroutetable RouteSegmentationcanbeachievedbycreatingadditionalroutetablesandassociateVPCsandVPNwithit. RoutescanpointtoaVPCoraVPNconnection. Thereare2wayswhereroutesgetpropagatedintheTransitGateway: o Routespropagatedto/fromon-premises-networks/ Site-to-siteVPN o Routeswillbepropagated/advertisedbetweentheTGWandyouron-premisesrouterusingBorderGateway Protocol(BGP) o RoutesPropagatedto/fromVPCs. o WhenyouattachaVPCtoaTransitGatewayorresizesanattachedVPC,theVPCCIDRswillbepropagated intotheTransitGatewayroutetableusinginternalAPIs(notBGP). o RoutesintheTransitGatewayroutetablewillnotbepropagatedtotheVPC’sroutetable. o VPCownerneedtocreatestaticroutetosendTraffictotheTransitGateway. aws ec2 create-transit-gateway-route --transit-gateway-route-table-ids tgw-rtb-abc3232 --destination-cidr-block 10.1.0.0/16 --target-vpc-id vpc-34234322 CreatingRoutesStaticallyintheTGW
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Let’s look at a routing scenario Customerhas: ThreeAccounts: [Account–A,Account–B,Account–C] Three(3)VPCs: [ vpc-aa-00 | vpc-bb-00 | vpc-cc-00 ] One(1)Datacenter: [ DC–1 ] Customerneedsto: InterconnectallthreeVPCs vpc-aa-00 & vpc-bb-00 Shouldroute ALLInternetRequestthroughaNATGatewayin VPCvpc-cc-00 Establish multipleIPSectunnels toacentralpointandpropagateitsroutestoitsAmazonVPCs vpc-aa-00, vpc-bb-00 & vpc-cc-00shouldbeabletocommunicatewithusersandresourcesinDC-1aws ec2 create-transit-gateway
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Availability Zone A ROUTE TABLE Oregon (us-west-2) Region Private subnet Internal app Availability Zone A ROUTE TABLE TRANSITGATEWAY TGW-XYZ-123 ACCOUNT - A ACCOUNT - B Customer network Private Route Table Destination Target 10.1.0.0/16 Local 10.2.0.0/16 TGW-XYZ-123 10.3.0.0/16 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 Transit Gateway Default Route Table Destination Target Route Description 10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A 10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B 10.3.0.0/24 Vpc-cc-00 Route to reach VPC - C 172.16.0.0/16 IPSEC-VPN-CONN-XXXXXX Route to on-premises DC Private Route Table Destination Target 10.2.0.0/16 Local 10.1.0.0/16 TGW-XYZ-123 10.3.0.0/16 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 Availability Zone A ROUTE TABLE ACCOUNT - EPrivate Route Table Destination Target 10.3.0.0/16 Local 10.2.0.0/16 TGW-XYZ-123 10.1.0.0/16 TGW-XYZ-123 10.1.0.0/16 10.2.0.0/16 10.3.0.0/16 vpc-aa-000 vpc-bb-000 vpc-cc-000 DC -1 172.16.0.0/16 Bandwidth per tunnel 1250Mbps Maximum Tunnels : 30 IPSEC VPN ECMP
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Availability Zone A ROUTE TABLE Oregon (us-west-2) Region Private subnet Internal app Availability Zone A ROUTE TABLE TRANSITGATEWAY TGW-XYZ-123 ACCOUNT - A ACCOUNT - B Customer network Private Route Table Destination Target 10.1.0.0/16 Local 10.30.0.0/16 TGW-XYZ-123 Transit Gateway Default Route Table Destination Target Route Description 0.0.0.0/0 IPSEC-VPN-CONN-XXXXXX Route to on-premises DC Private Route Table Destination Target 10.2.0.0/16 Local 10.30.0.0/16 TGW-XYZ-123 AZ-A ROUTE TABLE ACCOUNT - EPrivate Route Table Destination Target 10.30.0.0/16 Local 10.1.0.0/16 TGW-XYZ-123 10.1.0.0/16 10.2.0.0/16 10.30.0.0/16 vpc-aa-000 vpc-bb-000 SHARED SERVICES -vpc-cc-000 DC -1 172.16.0.0/16 Bandwidth per tunnel 1250Mbps Maximum Tunnels : 30 IPSEC VPN ECMP VPC-A to VPC –B Route Table Destination Target Route Description 10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A 10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B DNS Directory Logging Monitoring Security
  • 38. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Availability Zone A ROUTE TABLE Oregon (us-west-2) Region Private subnet Internal app Availability Zone A ROUTE TABLE TRANSITGATEWAY TGW-XYZ-123 ACCOUNT - A ACCOUNT - B Customer network Private Route Table Destination Target 10.1.0.0/16 Local 10.2.0.0/16 TGW-XYZ-123 10.3.0.0/16 TGW-XYZ-123 0.0.0.0/0 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 Transit Gateway Default Route Table Destination Target Route Description 10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A 10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B 10.3.0.0/24 Vpc-cc-00 Route to reach VPC - C 172.16.0.0/16 IPSEC-VPN-CON Route to on-premises DC 0.0.0.0/0 Vpc-cc-00 Routed to Palo-Alto ENI Private Route Table Destination Target 10.2.0.0/16 Local 10.1.0.0/16 TGW-XYZ-123 10.3.0.0/16 TGW-XYZ-123 0.0.0.0/0 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 Availability Zone A ROUTE TABLE ACCOUNT - E Private Route Table Destination Target 10.3.0.0/16 Local 0.0.0.0/0 Palo-Alto-ENI 10.1.0.0/16 TGW-XYZ-123 10.1.0.0/16 10.2.0.0/16 10.3.0.0/16 vpc-aa-000 vpc-bb-000 vpc-cc-000 DC -1 172.16.0.0/16 IPSEC VPN ECMP INTERNET TGW- ENI IGW
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private subnet Internal app Availability Zone A ROUTE TABLE us-eAst-2 Region Private subnet Internal app Availability Zone A ROUTE TABLE TRANSITGATEWAY TGW-XYZ-123 ACCOUNT - A ACCOUNT - B Customer network Private Route Table Destination Target 10.1.0.0/16 Local 10.2.0.0/16 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 Transit Gateway Default Route Table Destination Target Route Description 10.1.0.0/16 Vpc-aa-00 Route to reach VPC - A 10.2.0.0/24 Vpc-bb-00 Route to reach VPC - B 172.16.0.0/16 IPSEC-VPN-CONN Route to on-premises DC Private Route Table Destination Target 10.2.0.0/16 Local 10.1.0.0/16 TGW-XYZ-123 172.16.0.0/16 TGW-XYZ-123 10.1.0.0/16 10.2.0.0/16 vpc-aa-000 vpc-bb-000 172.16.0.0/16 DX INTEGRATION IPSEC VPN A Z - A ACCOUNT - B10.22.0.0/16 Transit - vpc-bb-000 A Z - B PRIVATE VIF IPSEC VPN Oregon (us-west-2) Region CROSS REGION PEERING COMING SOON!!!!!!!
  • 40. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Key benefits of Transit Gateway SimplifiedNetworking EasytoManageSetUp HigherVPNBandwidth Reliability SinglepointtoconnectVPCs(whethersameaccountoracrossaccounts)andSite-to-SiteVPNsforsimplified management Reducesthetime tosetupnewVPCsneedingedgeconnectivity Reduces operationalburdeninmanagingedgeconnectivityforalargenumberofVPCs OffersthesamereliabilityastherestofAWSplatform.Itusesacellular,scalable,andresilientplatformthat runswithinAmazon’sproveninfrastructure Achievebandwidthrangefrom1.2Gbpsto >60Gbps by leveragingECMPacrosstwoto50Site-2-SiteVPNtunnels Integration ControloverinterconnectivitypoliciesbetweenVPCsandon-premises networkswhichimprovetheirnetworksecurity. Security managementandmonitorTransitGatewayswithCloudFormation, CloudWatchandVPCFlowLogs.
  • 41. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC SHARING ShareVPCsacrossmultiple accountsinanAWSOrganization ShareVPCsacrossmultipleaccounts inanAWSOrganization FLATNETWORKSPACE FORALL
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Customers Complain About Inconsistentnetworkconfigurationsduetolackofcentralizedcontrolandinsufficientnetworkskillsacrosstheorganization Lackoftoolingtoenforceconsistentconfigurationsandsecuritycontrolsacross100sofVPCsacross100sofaccounts ManagingcomplexmeshesofVPCPeeringsandPrivateLinkconnectionstoprovideinterconnectivity HighercostsbecauseofmultipleVPN/DXconnections IPwastageduetotheneedtohavenon-overlappingVPCCIDRsforpeering. CustomerswithhundredsofVPCsoftencomplainof:
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. ACCOUNT – A ( VPC Owner ) VPCCIDR10.0.0.0/16 Availability Zone A Availability Zone B Availability Zone C 10.0.2.0/2410.0.1.0/24 PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 ACCOUNT – B ACCOUNT – C ACCOUNT – C ACCOUNT – C ACCOUNT – C Participant Accounts
  • 44. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. ACCOUNT – A (VPC Owner) VPCCIDR10.0.0.0/16 Availability Zone A Availability Zone B Availability Zone C 10.0.2.0/2410.0.1.0/24 PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet PublicSubnet PrivateSubnet 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 10.0.1.0/24 AWS Organizations Share across all accounts in multiple OUs in the same org create-resource-share –name “MAVPC_OU1-3” – resource- arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet- 1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’] --principals [‘ou-1’, ‘ou-2’, ‘ou-3’]
  • 45. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC Owner Sharing VPC Subnet Share across all accounts in multiple OUs in the same org create-resource-share –name “MAVPC_OU1-3” – resource-arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet- 1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’] --principals [‘ou-1’, ‘ou-2’, ‘ou-3’] Share across all accounts in the same AWS Org > create-resource-share –name “MAVPC_ORG_1” – resource-arns [‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet- 1’, ‘arn:aws:ec2:us-east-1:12345678901:subnet/subnet-2’] –- principals [‘org_1’]
  • 46. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Participant Accounts { "Subnets": [ { "VpcId": "vpc-a0110aaaa", // Participant owned VPC ……… "SubnetId": "subnet-9d4aaaaa", // Participant owned subnet ……… "OwnerAccountId": "2222222222222” // Participant AccountId }, { …..... "VpcId": "vpc-11111111", // MAPVC "State": "available", "MapPublicIpOnLaunch": false, "SubnetId": "subnet- aaaaaaa", //MAVPC Subnet ………., "OwnerAccountId": "111111111111” , // MAVPC Owner id } ] } aws ec2 describe-subnets
  • 47. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Key Benefits & Use Cases of Sharing VPC SimplerAllocationofPrivateIPv4SpaceNaturalInterconnectivity: EnforcementofSeparationofDutiesandConsistentNetwork Configurations SharingofVPCsprovidesthebenefitsofbillingsegregationandaccesscontrol acrossprojectsandteamsthroughtheuseofmultipleaccounts Whatarethekeybenefitsofusing thisfeature? UseCases ConsolidationofVPCs: Customerswith100sofaccounts,whowould preferanetworkarchitecturewith10sof centrallymanagedVPCswithlargeCIDR Small-tomedium-sizecustomersmigrating tothecloud: Small-tomedium-sizedcustomerslookingtomigrate tothecloudcanleveragethecapabilityduring migration
  • 48. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Sharing VPC Segmentation & Security AnAccountOwner o CannotseeParticipantAccounts recourseslikeEC2Instances,Loadbalancers, LambdaFunctions o DescribeNetworkInterfaceswillindicatetheowneraccountofeachENI,evenif theowneristheVPCowner o FullAccess&ControlofSubnets,RouteTables &NACLs o CanDescribeSecurityGroupsforParticipantAccountsbutcannotModify ParticipantAccount o FullAccesstoresourcescreatedinthesubnetsbeingshared o FullAccesstocreateSecurityGroupsforresourcesinsideinthesharedsubnets o NoaccesstotheowneraccountSecurityGroupsorotherParticipantSecurityGroups o UnabletointeractormodifyAmazonRoute53PrivateHostedZone,Peering,VGW,NAT GW PacketSegmentation o Subnetting o RouteTables o SecurityGroups o NACLs
  • 49. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. ACCOUNT – A ( VPC Owner) VPCCIDR10.0.0.0/16 Availability Zone A 10.0.1.0/24 PublicSubnet 10.0.1.0/24 PrivateSubnet Availability Zone B 10.0.1.0/24 PrivateSubnet 10.0.1.0/24 PublicSubnet Availability Zone C 10.0.1.0/24 PublicSubnet 10.0.1.0/24 PrivateSubnet VPCCIDR10.2.0.0/16 Availability Zone A 10.2.1.0/24 PrivateSubnet Prod-VPC Availability Zone B 10.2.2.0/24 PrivateSubnet 10.0.1.0/20 Private LambdaSubnet 10.0.1.0/20 Private LambdaSubnet 10.0.1.0/20 Private LambdaSubnet ACC-1 ACC-2 ACC-N SharedVPC VPCPEERING Logging&Monitoring ADDomainControllers Security Logging&Monitoring ADDomainControllers Security Logging&Monitoring ADDomainControllers Security
  • 50. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC–ID-XYZABC Availability Zone A 10.0.1.0/24 PublicSubnet 10.0.1.0/24 PrivateSubnet Availability Zone B 10.0.1.0/24 PrivateSubnet 10.0.1.0/24 PublicSubnet VPCCIDR10.0.0.0/16 Availability Zone A 10.0.1.0/24 PublicSubnet 10.0.1.0/24 PrivateSubnet Availability Zone B 10.0.1.0/24 PrivateSubnet 10.0.1.0/24 PublicSubnet VPCCIDR10.0.0.0/16 Availability Zone A 10.0.1.0/24 PublicSubnet 10.0.1.0/24 PrivateSubnet Availability Zone B 10.0.1.0/24 PrivateSubnet 10.0.1.0/24 PublicSubnet VPCCIDR10.0.0.0/16 ACCOUNT – A ( VPC Owner ) (Participant Acc) (Participant Acc) (Participant Acc) o OneSingleVPC,MultipleVPCCIDRBlocks o CIDRperBusinessUnit o NACLsSecurityBoundaryfor eachsubnet
  • 51. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 52. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.