Skip to content

Latest commit

 

History

History
100 lines (74 loc) · 5.78 KB

File metadata and controls

100 lines (74 loc) · 5.78 KB

1. What Is AWS VPC & Core Components

  • Amazon VPC = logically isolated virtual network in AWS where you control IP ranges, subnets, routing, gateways, and access controls—mirrors a data center network.

  • Key building blocks:

    • CIDR blocks (IPv4/IPv6), primary and secondary ranges.
    • Subnets (public/private), across Availability Zones.
    • Route tables, directing traffic.
    • Internet Gateway (IGW), NAT Gateway, Egress-only IGW, Virtual Private Gateway (VGW).
    • Endpoints (Interface for PrivateLink and Gateway endpoints).
    • Security Groups (instance-level firewall) and Network ACLs (subnet-level stateless rules).

2. Relationships to Other AWS Services

  • Compute (EC2, Fargate, Lambda): resources launched inside a VPC, rely on SGs/NACLs for network control.
  • Load Balancers (ELB/ALB/NLB) route traffic within VPCs.
  • RDS, ElastiCache also deploy inside VPC for network isolation.
  • PrivateLink endpoints allow private access to AWS services without internet.
  • Transit Gateway for hub-and-spoke connectivity across many VPCs or on-prem networks; VPC Peering for one-to-one links; VPC Lattice (new in 2025) for application-layer connectivity across microservices/multi-account setups with built-in service discovery, auth, load balancing.
  • IPAM (IP Address Manager) helps centrally manage IP allocation across accounts/regions.

3. Typical Use Cases

  • Securely isolate workloads (e.g., front-end vs. backend subnets).
  • Multi-tier architectures: public-facing services in public subnets, databases in private.
  • Hybrid connectivity: VGW for Site-to-Site VPN or Direct Connect.
  • Multi-VPC design: use Peering for simple, low-scale; Transit Gateway for complex/hub; VPC Lattice for microservices communication across accounts.
  • Access AWS APIs privately using Interface/Gateway endpoints.

4. Similar/Complementary Services

  • VPC Peering: simple, non-transitive, low-latency point-to-point.
  • Transit Gateway: scalable, centralized routing.
  • VPC Lattice: modern, layer-7, auth-aware microservices networking.
  • IPAM: IP management across fleets.
  • PrivateLink (Interface Endpoint) vs. Gateway Endpoint (e.g., for S3, DynamoDB). These alternatives suit different connectivity scales, complexity, or architectural needs.

5. Limits & Quotas (Per Region, Default, Adjustable)

  • VPCs per Region: default 5, adjustable.
  • Subnets per VPC: 200 default, adjustable.
  • IPv4/IPv6 CIDR blocks per VPC: 5 default, up to 50.
  • Elastic IPs per Region: 5; per NAT gateway: 2 (up to 8).
  • IGW/Egress-only IGW/NAT Gateway per Region/AZ: defaults vary, adjustable.
  • Network ACLs per VPC: 200; rules per ACL: 20.
  • Route tables per VPC: 200.
  • Routes per route table: previously 50, now 500 by default as of June 2025.
  • Security Groups per Region: 2,500. Rules per SG: 60. SGs per ENI: 5 (adjustable up to 16).
  • VPC peering connections per VPC: default 50, adjust up to 125.
  • Endpoints: Gateway endpoints per Region: 20; Interface/Gateway Load Balancer endpoints per VPC: 50.
  • Resource endpoints per VPC: 200.

6. Wrong Use Cases / When Not to Use VPC

  • Trying to bypass all network-level access controls—VPC doesn’t override IAM or resource-level policies.
  • Over-complicating simple systems with multiple VPCs or unnecessary peering/transit gateways.
  • Using peering for many-to-many connectivity—better solved by Transit Gateway.
  • Using VPC for application-layer service discovery or load balancing—VPC Lattice or ALB is better.
  • Deploying systems that don’t require network isolation or need global unisolated networking (e.g., purely serverless public APIs)—simpler architectures may suffice.

7. Exam-Relevant Insights & Tips

  • Understand security layers: public vs private subnets, routing via IGW vs NAT, stateless NACLs vs stateful SGs.
  • Know connectivity options: Internet Gateway, NAT Gateway, VGW (VPN/Direct Connect), PrivateLink endpoints.
  • Distinguish when to choose Peering, Transit Gateway, or VPC Lattice.
  • Be able to reason about quotas when designing scale: e.g., route limits (now 500), subnet count, CIDR blocks.
  • Expect questions on cost optimization and resilience in network design (e.g., high availability with NAT or IGW across AZs).
  • Stay updated: e.g., the default route table capacity change in June 2025—no longer need quota requests for up to 500 routes.

Summary Table

Aspect Key Points
Definition & Core Logical isolation, control of IPs, subnets, routes, gateways
Integration EC2, databases, load balancers, endpoints, connectivity services
Use Cases Isolated multi-tier apps, hybrid connectivity, private AWS access, microservices networking
Alternatives Peering, Transit Gateway, VPC Lattice, Endpoints, IPAM
Limits Defaults (VPC:5, subnets:200, route tables:200, routes/table:500, SGs, endpoints...)
Misuse Unnecessary complexity, wrong connectivity choices, ignoring better tools
Exam Tip Master components, connectivity paths, security controls, quotas, and new features (e.g., route limit increase)