Virtual Private Cloud (VPC)
VPC provides network solutions to AWS resources.
A Virtual Private Cloud (VPC) represents a traditional network, but on the cloud.
Public Oath
Fluid Attacks will look for a cloud network architecture that properly balances security, simplicity, and accessibility.
Architecture
vpc
owns the network configuration for AWS.- It is managed as code using Terraform.
- There is a single VPC for the entire company called
fluid-vpc
. - It has subnets for:
- common: Default resources like the ERP.
- batch: Batch jobs
- ci: GitLab CI.
- k8s: Kubernetes Cluster.
- lambda: integrates lambdas.
- observes: observes ETLs.
- machine_learning: Sorts trainings.
- All components have subnets in multiple availability zones in order to grant higher redundancy and broader access to spot instances.
- It has an Internet Gateway that allows resources in public subnets to reach the Internet.
- It has NAT gateways that allow resources in private subnets to reach the Internet.
- It uses Flow Logs to sends network logs to CloudWatch.
- The
observes
subnets use VPC endpoints for privately connecting to Kinesis and Glue. - There is a security group called
CloudFlare
, which allows income traffic from the CloudFlare IP addresses.
Tip
Have an idea to simplify our architecture or noticed docs that could use some love? Don't hesitate to
open an issue or submit improvements.