AWS VPC
A VPC (Virtual Private Cloud) is a logically isolated network within a cloud provider (like AWS) where you can launch and manage your resources (EC2 instances, RDS, EKS, etc.) securely.
Key Components of an AWS VPC
Subnets: Logical divisions of a VPC IP range that map to specific Availability Zones, used to organize and isolate resources (by route table and NACL).
IP Addressing: Supports IPv4 & IPv6; you can assign AWS-provided or bring-your-own IPs to resources like EC2, NAT, or Load Balancers. (mechanism to uniquely identify resources)
Routing: Route tables define how traffic flows within the VPC and to external networks.
Gateways & Endpoints:
Internet Gateway → connect VPC to the internet for public subnets.
NAT Gateway → Allows resources in private subnets to access the internet. (NAT must sit in Public subnet)
VPC Endpoints → private access to AWS services without internet exposure. (Secure communication between VPC resources and AWS services.)
VPC Peering: Direct communication between two VPCs without using the internet. (VPC A and VPC C can't communicate to solve this use TRANSIT GATEWAY)
Transit Gateway: Central hub to connect multiple VPCs, VPNs, and Direct Connect links. replacing multiple peering connections with a single point.
Traffic Mirroring: Duplicate traffic from network interfaces for monitoring & security analysis.
VPC Flow Logs: Capture IP traffic details for auditing, troubleshooting, and monitoring.
VPN Connections: Secure tunnels to connect on-premises networks with your AWS VPC.
Security Groups & NACLs: Act as virtual firewalls to control inbound and outbound traffic.
Last updated