Virtual Private Cloud

Build Your First Virtual Private Cloud (VPC) in AWS

Are you creating Virtual Private Cloud for the first time? Here we’ve got you covered with this lab session!

In this lab session, we will create a Virtual Private Cloud (VPC) without using the VPC wizard. This VPC will include a frontend Web Server and a backend Relational Database Services (RDS).

Here is an overview of the VPC you will create:

Virtual Private Cloud

Looks Scary? Don’t worry follow along, and we shall achieve our goal.

AWS Certified Solutions Architect Associate Online Course

Understand Few Terms to Create a Virtual Private Cloud (VPC)

Region

AWS Region is an independent collection of AWS computing resources in a defined geography. Each AWS Region has multiple, isolated locations known as Availability Zones.

Amazon Virtual Private Cloud (VPC)

Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including the selection of your own IP address range, the creation of subnets, and the configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.

Subnet

A subnet (short for “subnetwork”) is an identifiably separate part of an organization’s network. These are the logical subdivisions of an IP network.

Public Subnet

A logical subnet whose instance can be reachable over the internet directly.

Private Subnet

A logical subnet whose instance cannot be reachable over the internet directly.

Security group

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic.

Network ACL

A network access control list (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.

Route Table

A route table contains a set of rules, called routes, that are used to determine where network traffic is directed.

Internet Gateway

An Internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and the Internet.

Also Read: How to Improve Connectivity and Secure your VPC Resources?

What are We Going to Cover in this Lab?

In this lab, you will not only learn to create Amazon Virtual Private Cloud (VPC) but also how to launch a frontend and backend server. In brief, you will learn to

  • Create a base Amazon Virtual Private Cloud (VPC)
  • Create a public subnet for your web server
  • Create an Internet Gateway
  • Add a route to your main VPC route table so that people can access your web server from the internet
  • Create a security group to restrict only HTTP traffic to your web server
  • Launch a frontend web server
  • Create a private subnet for your Backend MySQL server
  • Create a security group for your private subnet to only allow MySQL traffic from the public subnet
  • Launch a backend Amazon RDS MySQL server instance

During the workshop or after, at any point, if you need any assistance – kindly write us at Whizlabs Helpdesk and we will respond you in no time to resolve your query!

  1. To get to the AWS Learning account, log in to https://aws.amazon.com/console/
  2. Click on “Sign In to the Console
  3. Provide the email address used for signing in the text box “Email address of your AWS account
  4. Provide the “IAM username” and “Password” used while signing in. The default IAM user could be root.
  5. Click on “Sign In
  6. Alternatively, you can also sign in using root credentials using the “Sign-in using root account credentials” link on the login page.
  7. If you do not have an AWS account, you can create one by clicking on “Create a new AWS account” and filling in your details that will be used for signup.

After launching the AWS console, ensure you have selected the region as “Oregon” (us-west-2). This is the region, where we will be using the AWS resources during the workshop.

Oregon

Task 1: Create a Virtual Private Cloud (VPC)

In this task, you will create a VPC.

  1. In the AWS Management Console, on the search bar, type VPC, from the drop-down click on VPC.

AWS Management Console

  1. In the navigation pane on the left, click Your VPCs on the VPC dashboard.

WATCH OUT: There is a default VPC that has been created while your account is set up. A default VPC is ready for you to use so that you don’t have to create and configure your own VPC. You can immediately start launching Amazon EC2 instances into your default VPC. However, we are not going to use this for our workshop. We will build a new VPC for the entire workshop.

You are requested, not to delete any of the existing VPC, Subnets, Route Tables, Internet Gateways, Security Groups, and Network ACLs.

VPC

Okay, let’s proceed to create a new VPC for our lab.

  1. Click Create VPC.
  2. In the Create VPC window use the following:

Name tag: myawslabVPC

IPv4 CIDR block: 10.0.0.0/16

Ensure Tenancy: Default

Click Yes, Create

myawslabVPC

Task 2: Create a Public Subnet

In this task, you will create a public subnet to launch your frontend web server into.

  1. In the Navigation pane on the left, click Subnets.
  2. Click Create Subnet
  3. In the Create Subnet window configure the following:

Name tag: myawslabPublic

VPC: myawslabVPC

Availability Zone: Select the first one in the list us-west-2a

IPv4 CIDR block: 10.0.1.0/24

Click Yes, Create

create subnet

And there you go, you just created a Public subnet.

create a public subnet

Are we all set to launch our web server?? Well, not yet.

Even though your subnet is labelled Public, it is not a public subnet. Do you know why it is not public subnet? By definition a public subnet must have an Internet Gateway. In the next task, you will add an Internet Gateway so that the instances in your public subnet can access the Internet.

task 2

Task 3: Create an Internet Gateway

  1. In the navigation pane on the left, click Internet Gateways.
  2. Create an Internet Gateway by configuring the following:

Click Create Internet Gateway

Name tag: myawslabIGW

Click Yes, Create

create internet gateway

  • Click Attach to VPC
  • Click Yes Attach

This will attach the Internet Gateway to your VPC.

attach to vac

Even though you created an Internet Gateway and attached it to the VPC, you still have to tell the instances within your public subnet how to get to the Internet. In the next task, you will add a route to your main VPC route table to tell traffic in your public subnet how to get to the Internet.

Task 4: Route Tables and Routes

  1. In the navigation pane on the left, click Route Tables.

There is currently one default (main) route table associated with the VPC (myawslabVPC) that you created.

  1. Select the route table that is associated with myawslabVPC create route table
  2. Click the Routes tab.

Notice that there is one route in your route table that is associated with your default network. This route allows traffic from the 10.0.0.0/16 network to pass to other nodes within the network, but it does not allow traffic to go outside of the network.

  1. Click the Subnets Associations tab.

subnet associations

Every single time we create a new subnet it’s going to be associated by default to our main route table. You can browse this same tab when we create another subnet (the private subnet) later during our lab. Now for that reason, we don’t want our main route table to have a way out to the internet, because every time you create a subnet it shall become internet accessible.

Let’s create a new route table.

  1. Click the Create Route Table.

Name tag: myawslabPublicRouteTable

VPC: Select myawslabVPC from the drop down

Click Yes, Create.

create route table

Great, we are now ready to create a route to internet.

  1. Select the Route Table (myawslabPublicRouteTable) we just created.
  2. Click on the Routes tab.
  3. Click on Add another route.
  4. Click the Destination field and enter 0.0.0.0/0
  5. Click the Target field. Auto-complete will display the name of the Internet Gateway that you created earlier.
  6. Click the Internet Gateway that you created (myawslabIGW)
  7. Click Save.create route table
  8. Click Subnet Associations.
  9. Click Edit.
  10. Select myawslabPublic subnet
  11. Click Save.

create route table

This will associate our Public subnet to the Public Route Table. You have now configured your public subnet so that traffic within it can get out to the internet. Before you create your web server and launch it in the public subnet, you need to control the traffic that is allowed to access your web server. You can do this by creating a security group that only allows HTTP traffic and attaching the security group to your web server.

NOTE: A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. Security groups act at the instance level, not the subnet level.

If you don’t specify a particular security group at launch time, the instance is automatically assigned to the default security group for the VPC.

Task 5: Create A Security Group For Your Public Subnet

In this task, you will add a security so that people can access your web server using HTTP.

  1. In the Navigation pane on the left, click Security Groups.
  2. Click Create Security Group.
  3. In the Create Security Group window, configure the following:

Name tag: myawslabWebServerSG

Group Name: myawslabWebServerSG

Description: My Web Server Security Group

VPC: myawslabVPC

Click Yes, Create

create security group

  1. Select your myawslabWebServerSG security group.
  2. Click the Inbound Rules tab.
  3. Click Edit.
  4. Click the Custom TCP Rule drop-down arrow and select HTTP (80).
  5. Click the Source box and enter the IP address of your laptop/network: viz. 100.10.150.0/24
  6. Click Save. And we are done.

create security group

quiz no 2

You have been AWESOME so far and a security guru.

Did you realize, what have you created, so far – Let’s recall?

Done?

Ok, Let’s Visualize.

security group

Wondering, when did we create the Network ACL? And that’s not the quiz ☺

The Network ACL is created by default when you create the VPC. We are not going to create a separate Network ACL for our subnets and consider using the default Network ACL instead.

You can browse Network ACL by going to the Navigation pane on the left and clicking Network ACLs

Click on Inbound Rules and Outbound Rules and view various rules.

By default, all traffic is allowed via Network ACLs.

In the next task, you will launch your web server in your public subnet. Yes, finally, the fun stuff, we have been laying the network platform so far.

Task 6: Launch a Web Server In Your Public Subnet

  1. On the Services menu, click EC2.
  2. Click Launch Instance.
  3. On 1. Choose an Amazon Machine Image AMI, on the Navigation pane on the left, click Quick Start, in the search tool box, select the Amazon Linux 2 AMI HVM, SSD Volume Type – ami-xxxxxxxx and click on Select

Choose an Amazon Machine Image AMI

  1. On 2. Choose Instance Type, click Next: Configure Instance Details.
  2. On 3. Configure Instance Details, configure the following:

Network: Select myawslabVPC

Auto-assign Public IP: Enable

Configure Instance Details

  1. On same page scroll down, Expand >Advanced Details

Copy and paste the code snippet below into the text box:

code snippet

This snippet of code is run the first time the instance is launched. It installs the web server on EC2 instance and configures it.

Install Web Server on EC2 Instance

  1. Click Next: Add Storage.
  2. On 4. Add Storage, click Next: Add Tags.
  3. On 5. Add Tags, click Add Tag and configure the following:

Key: Name

Value: Webserver

51. Click Next: Configure Security Group.

52. On 6. Configure Security Group, configure the following:

Click Select an existing security group

Click the myawslabWebServerSG security group

53. Click Review and Launch

configure security group

54. At the Warning screen, click Continue.

55. On 7. Review, configure the following:

Review the settings

Click Launch

56. On the Select an existing key pair or create a new key pair window, configure the following:

Click the I acknowledge that … checkbox

Click Launch Instances

57. Click View Instances.

This brings you to the Instances window, where you can watch your web server launch and view its details.

58. Wait for your web server to fully launch. It should display the following:

  • Instance State: running
  • Status Checks: 2/2 Checks

You can click the refresh icon to refresh your instance status.

59. Select your instance

60. Copy the IPv4 Public IP address of the instance to your clipboard.

Launch Instances

61. Open a new browser tab and paste the IP address into the browser.

62. Press Enter to go the web page.

Well, Congratulations. If you configured everything the way the directions were written, you should be able to see the index page of your web server.

Frontend Web Server

Amazing, isn’t it. You have been awesome, so far.

Let’s continue to configure our (Private) Backend infrastructure.

Task 7: Create A Private Subnet For Your Backend MySQL Server

To deploy your RDS database, your VPC must have at least one subnet in at least two Availability Zones in the region where you want to deploy your DB instance. In RDS, this is termed as Multi-AZ deployment and is best practice for high availability.

In this task, we are going to deploy RDS instance in single Availability Zone for simplicity. You will create your first private subnet for your soon to be created Amazon RDS Instance.

63. On the Services menu, click VPC.

64. In the navigation menu on the left, click Subnets.

65. Click Create Subnet.

66. In the Create Subnet window configure the following:

Name tag: myawslabPrivate

VPC: myawslabVPC

Availability Zone: us-west-2a

IPv4 CIDR block: 10.0.2.0/24

Click Yes, Create

create subnet

Task 8: Create A Second Private Subnet For Your Backend MySQL Server

We will need to create a secondary additional Private Subnet. You must have two private subnets available to create an Amazon RDS DB subnet group for an RDS DB instance to use in a VPC. Let’s add a second private subnet to the VPC.

67. On the Services menu, click VPC.

68. In the navigation menu on the left, click Subnets.

69. Click Create Subnet.

70. In the Create Subnet window configure the following:

Name tag: myawslabPrivate2

VPC: myawslabVPC

Availability Zone: us-west-2b

IPv4 CIDR block: 10.0.3.0/24

Click Yes, Create

create subnet

Task 9: Create A Security Group For Your Backend MySQL Server

Now that private subnets are configured, you’ll want to secure the types of traffic that can access your MySQL database. In this task, you’ll create a security group to only allow MySQL traffic from your public subnet.

71. In the Navigation pane on the left, click Security Groups.

72. Click Create Security Group.

73. In the Create Security Group window, configure the following:

Name tag: myawslabDBServerSG

Group Name: myawslabDBServerSG

Description: My Backend Security Group

VPC: Select myawslabVPC

Click Yes, Create

create security group

74. Select your myawslabDBServerSG security group.

75. Click the Inbound Rules tab.

76. Click Edit.

77. Click the Custom TCP Rule drop-down and select MySQL/Aurora (3306)

78. Click the Source box and enter 10.0.1.0/24

79. Click Save.

myawslabDBServerSG

This rule states that only MySQL traffic coming from your public subnet is allowed to access the database in the Private Subnet.

Task 10: Create a Backend Amazon RDS Database

80. On the Services menu, click RDS.

81. In the RDS Dashboard, click Instances.

82. Click Launch DB Instance.

83. On Step 1: Select engine, configure the following:

Click MySQL

Click Next

amazon rds database

84. On Step 2: Choose use case, configure the following:

Click Dev/Test – MySQL

Click Next

Choose use case

85. On Step 3: Specify DB details, configure the following:

Instance specifications

DB instance class: db2.t2.micro – 1 vCPU, 1 GiB RAM

Specify DB details

Settings

DB instance identifier: myawslabDB

Master username: admin

Master password: pAssw0rd

Confirm password: pAssw0rd

Click Next

setting

86. On Step 4: Configure advanced settings, configure the following:

Network & Security

VPC: myawslabVPC

VPC security groups: Select existing VPC security groups

From drop-down, select myawslabDBServerSG(VPC)

Configure advanced settings

Database Options

Database name: myawslabDB

database options

87. Scroll to the bottom of the page.

88. Click Launch DB instance.

89. Click View DB instance details.

It will take a few minutes for your MySQL database to become available.

90. Review the configuration of your database.

In the RDS Dashboard, click Instances.

Select the database instance you just created (myawslabdb), click the link on the instance.

This page provides all the information about your DB instance – Summary, CloudWatch, Connect – this provides you with the Endpoint you can connect your DB on from the web server, Details – various DB configurations, CloudWatch alarms, Snapshots, Tags, Logs, Recent events, Replication.

db endpoint

Congratulations! You have configured everything properly, and now you have a VPC that consists of one public and two private subnets. You should be able to access the web server through your public subnet. Your Amazon RDS database should also be accessible by your web server.

Yay!! You have achieved your goal. Yes, we created an entire ecosystem. Here is the end state you created.

RDS Dashboard

It’s the Time to End the Lab

Follow these steps to close the console and end your lab.

Delete the RDS DB instance

91. In the RDS Dashboard, click Instances.

92. Select the DB instance myawslabdb

93. Click on Instance actions

94. Click Delete

95. Under Options

Are you sure you want to Delete the myawslabdb DB Instance? Create a final snapshot? Select No

Mark the checkbox against – I acknowledge that upon instance deletion, automated backups, including system snapshots and point-in-time recovery, will no longer be available.

96. Click Delete

Delete the EC2 instance – the web server

97. On the Services menu, click EC2.

98. Select the Web server instance.

99. Click on Actions, click Instance State and select Terminate.

100. On the confirmation page Terminate Instances, click Yes, Terminate

Delete the VPC myawslabVPC

101. On the Services menu, click VPC.

102. Select the VPC you created myawslabVPC.

103. Click on Actions, select Delete VPC.

104. On the confirmation page Delete VPC, click Yes, Delete.

This will wipe off all the VPC components we created, viz. Subnets, Route Tables, Routes, Internet Gateways, Security Groups

Wrapping Up

So, in this lab, you created a VPC with a single public subnet and two private subnets. AWS provides you with access to multiple Availability Zones at no additional cost. The best practice is to mirror servers across two Availability Zones and then use load balancing and other techniques in order to distribute traffic between them.

Security group rules can be very precise or quite loose. You need to ensure that your security groups are as restrictive as possible.

Congratulations, you have now successfully:

  • Created an Amazon Virtual Private Cloud(VPC).
  • Created a Public as well as two private subnets.
  • Created an Internet Gateway.
  • Created a route in your main route table to route traffic to the internet.
  • Created a security group for your frontend web server to only allow HTTP traffic to your web server.
  • Created a security group for your backend MySQL server to only allow MySQL traffic to it from your public subnet.
  • Deployed a frontend web server into your public subnet.
  • Deployed a backend RDS server into your private subnet.
  • Removed the resources you no longer use.

Thinking to validate your skills and experience of working on the AWS platform? Just go for AWS certifications! We at Whizlabs are aimed to help you to become a certified professional and so we offer AWS certifications training and practice tests. With our AWS certifications training courses, your exam preparation will get a new edge. Also, you will be confident enough to pass the certification exam in the first attempt only.

Have any query related to AWS? Just put it in the comment box below or submit in Whizlabs forum and it will be resolved by the AWS experts!

About Pavan Gumaste

Pavan Rao is a programmer / Developer by Profession and Cloud Computing Professional by choice with in-depth knowledge in AWS, Azure, Google Cloud Platform. He helps the organisation figure out what to build, ensure successful delivery, and incorporate user learning to improve the strategy and product further.

1 thought on “Build Your First Virtual Private Cloud (VPC) in AWS”

  1. At step 6, after launching the front end code and im getting this site cant be reached and timed out . i have entered my IP address only

Leave a Comment

Your email address will not be published. Required fields are marked *


Scroll to Top