- cloud watch
1 VPC (/24)
- 1 public subnet (/25)
- 2 private subnets (2x /26)
- spread across 2 AZ's
2 security groups
- for public subnets
- inbound
- http (port 80)
- ssh (port 22)
- outbound
- all traffic (0.0.0.0/0)
- inbound
- for private subnets
- inbound
- api comms (todo)
- ssh (port 22) from public subnet only
- outbound
- all traffic (0.0.0.0/0)
- inbound
1 Internet Gateway 1 NAT Gateway
4 Route Tables
- 1 inherent from the VPC (provides connection within it)
- 1 associates public subnet to internet gateway
- 2 associate private subnets to nat gateway
4 EC2 Instances
- 2 in public subnet
- 1 in each private subnet
2 RDS Instances
- across both private subnets
1 S3 bucket
- make changes inside submodule
git add . && git commit -m "changes" && git push
# or
git pull
- update submodules in control room
git submodule update --remote --recursive
SSH Agent Forwarding to connect to instances in private subnets securely