Module 3..pptx
Module 3..pptx
AWS Route 53
Amazon Route 53 is used to register new domains, transfer existing domains,
route traffic for your domain to your AWS and external resources, and monitor
the health of your resources.
DNS management
Traffic management
Availability monitoring (health check)
Registration of domain
2
AWS Route 53
Route 53 performs three main functions
3
AWS Route 53
When you register a domain with route 53,the service automatically
makes itself the DNS service for the domain by doing the following-
It creates a hosted zone that has the same name as your domain
It assigns a set of four name servers to the hosted zone, unique to the
account.
When someone uses a browser to access your website, the name
server inform the browser where to find your resources, such as a
web server or an amazon S3 bucket.
It gets the name server from the hosted zone and add them to the
domain
4
AWS Route 53
AWS supports
Generic Top level domains (.com,.org…
Geographic Top level domain(.in,.uk…
5
AWS Route 53
Using Route 53 as your service
You can use route 53 as the DNS service for any domain, even if the
TLD for the domain is not included on the supported TLD list
6
AWS Route 53
Hosted zone-A hosted zone in Amazon Route 53 is a container for
DNS records that define how internet traffic is routed for a specific
domain or subdomain.
4.You add DNS records (A, CNAME, etc.) to route traffic to websites,
applications, or AWS services.
8
Virtual Private Cloud (VPC)
A VPC (Virtual Private Cloud) is a logically isolated private network in a
cloud environment, allowing you to launch and manage cloud resources securely.
It functions like a virtual data center within a cloud provider such as AWS,
Azure, or Google Cloud.
2.Custom IP Addressing
•You define a CIDR block (e.g., 10.0.0.0/16) to allocate private IPs to
your resources.
•The CIDR block determines how many subnets can be created inside the
9
VPC.
Virtual Private Cloud (VPC)
3. Subnets
A VPC is divided into subnets, which can be either public (accessible
from the internet) or private (isolated from the internet).
•Subnets help in organizing and distributing resources across Availability
Zones (AZs).
10
Virtual Private Cloud (VPC)
5. Scalability & Flexibility
11
Virtual Private Cloud (VPC)
12
VPC Subnet
5. Scalability & Flexibility
13
VPC Subnet
14
Virtual Private Cloud (VPC)
Once we created VPC, DHCP, NACL and security group will be automatically
created.
A VPC is confined to an AWS region and does not extend between regions.
15
16
Virtual Private Cloud (VPC)
NAT gateway is always made in public subnet and used for private subnet.
Once the VPC is created, you can not change its CIDR block range.
You can expand your VPC CIDR by adding new/extra IP address ranges
17
Components of VPC
18
Types of VPC
1. Default VPC
1. Created in each AWS region when an AWS account is created
2. Has default CIDR, security group, NACL and routing table settings.
3. Has an Internet gateway by default
2. Custom VPC
1. It is a VPC on AWS account owner creates
2. AWS user creating custom VPC can decide the CIDR
3. Has its own default security group, network ACL, and routing tables
4. Does not have an Internet gateway by default, one needs to be created if
needed
19
Steps to create VPC
1. Create a VPC
2. Create a subnet
3. Crate internet gateway
4. Create routing table
20
Subnet
1. Public subnet (IGW is connected)
1. If a subnet’s traffic is routed to an IGW, the subnet is known as a public
subnet.
2. If you want your instance in a public subnet to communicate with the
internet over IPV4, it must have a public IPV4 address (dynamic) or on
Elastic IP address (doesn’t changed).
21
Subnet
Suppose CIDR=10.0.0.0/16
22
Implied Router and Router Table
It is the central routing function inside the VPC
It connects the different AZ together and connects the VPC to the IGW
Each subnet must be associated with only one rote table at any given time
If you don not specify a subnet to route table association, the subnet will be
associated with the default VPC route table.
23
Internet Gateway
IGW is a virtual router that connects a VPC to the Internet
If you create a new VPC then you must attach the IGW in order to access the
Internet
You are charged for creating and using a NAT gateway in your account.
Generally web servers are stored in a public subnet so user can access my web
site.
Database servers are stored in private subnet, so no one can access my database.
To create a subnet gateway, you must specify the public subnet in which the NAT
gateway should reside.
25
NAT Gateway
You must also specify an Elastic IP address to associate with NAT gateway when
you create it
After you created a NAT gateway, you must update the route table associated with
one or more of your private subnets to pint Internet bound traffic to the NAT
gateway. This enables instances in your private subnet to communicate with the
Internet.
Deleting a NAT gateway, disassociates its Elastic IP address, but does not release
the address from your account.
26
Few questions
Q1. I created a NAT gateway, attached with private subnet, but getting error.
Instances are not accessed over Internet.
Q2. I have created NAT gateway, assigned public IP, it is in public subnet, still the
same problem.
27
Security Groups
In AWS (Amazon Web Services), a Security Group (SG) in a VPC
(Virtual Private Cloud) acts as a virtual firewall that controls inbound and
outbound traffic for AWS resources like EC2 instances, RDS databases, and
Lambda functions (when using VPC networking).
•Default Behavior:
•By default, all inbound traffic is denied.
•All outbound traffic is allowed unless restricted.
29
AWS Identity and Access Management (IAM)
•AWS Identity and Access Management (IAM) is a service that helps
securely control access to AWS resources. It allows you to create and manage
users, groups, roles, and permissions to enforce least privilege access.
1. IAM Users
•A user represents an individual person or application that needs access to
AWS.
•Each user has credentials (username/password, access keys).
•Users can be assigned permissions via policies.
2. IAM Groups
•A group is a collection of IAM users.
•Policies assigned to a group apply to all members.
•Example groups: Developers, Admins, ReadOnlyUsers.
30
AWS Identity and Access Management (IAM)
3. IAM Roles
•Roles grant temporary access to AWS resources.
•Used for:
•Cross-account access (e.g., an AWS service accessing another AWS
service).
•EC2 instances to access S3, DynamoDB, etc.
•AWS Lambda to interact with other services.
4. IAM Policies
•JSON-based documents that define permissions.
•Can be attached to users, groups, or roles.
•Two types:
1.AWS Managed Policies – Predefined by AWS (e.g.,
AdministratorAccess).
2.Customer Managed Policies – Created by users.
31
AWS Identity and Access Management (IAM)
Example IAM Policy (Allow S3 Access):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "*"
}
]
}
32
AWS Certificate Manager (ACM)
AWS Certificate Manager (ACM) is a service that helps you provision,
manage, and deploy SSL/TLS certificates for securing AWS-based
applications and websites.
34
AWS Key Management Service (KMS)
35
AWS Key Management Service (KMS)
36