Skip to content

Commit

Permalink
added prerequisites
Browse files Browse the repository at this point in the history
  • Loading branch information
Michaël Van de Borne committed Dec 29, 2018
1 parent bad2b9f commit 0a298af
Showing 1 changed file with 10 additions and 2 deletions.
12 changes: 10 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,14 +20,22 @@ Let's assume the 'shared' environment will host shared components, such as proxy
* The dev VPCs can access each other, and the shared VPC
* The prod VPCs can only access the shared VPC

To enable such a scenario, three Route Tables are created in the Transit Gateway, one per environment. Which means both dev VPCs attach to the same Route Table, whereas the shared and prod VPCs each attach to their respective Route Table. Each VPC gets a t2.micro Ubuntu instance to validate the network connectivity over ssh and ICMP (ping)
To enable such a scenario, three Route Tables are created in the Transit Gateway, one per environment. Which means both dev VPCs attach to the same Route Table, whereas the shared and prod VPCs each attach to their respective Route Table. Each VPC gets a t2.micro Ubuntu instance to validate the network connectivity over ssh and ICMP (ping). The instance in the 'shared' is assigned a public IP so a VPN connection isn't needed. Adding the necessary Terraform resources to establish a VPN connection could be an extension of this project.

![transit-gateway-architecture](./doc/transit-gateway.png?raw=true "Transit Gateway Architecture")

The thick green links on the diagram represents the authorized traffic through the gateway.

Prerequisites
-------------

* An AWS account
* Terraform


Usage
-----


* Change ACCESS_KEY and SECRET_KEY values in Variables.tf
* Change the public_key value to a keypair you own
* Deploy the setup with:
Expand Down

0 comments on commit 0a298af

Please sign in to comment.