DEV Community

Parth Patel for Cloud Clubs

Posted on

VPC Peering across two regions

Introduction

VPC peering across two AWS regions is a network connection that allows Virtual Private Clouds (VPCs) in different geographic locations to communicate securely and directly with each other, enabling seamless data transfer and resource access while maintaining the isolation and security of each VPC. This inter-region connectivity facilitates distributed application architectures, disaster recovery setups, and data replication scenarios, enhancing the versatility and global reach of AWS infrastructure for businesses and organizations.

Scenario

You have two Amazon VPCs, one located in the US East (N. Virginia) region (us-east-1) and the other in the Asia Pacific (Mumbai) region (ap-south-1). You need to establish VPC peering between these two regions to allow secure communication between resources in these VPCs while keeping them logically isolated.

Image description

Solution

To achieve VPC peering across regions, first, create the necessary VPCs in each region, ensuring they have unique CIDR blocks. Next, create VPC peering connections in both regions, accepting the peer requests. Update the route tables in each VPC to include routes for the peer VPC's CIDR block, pointing to the peering connection. Finally, configure security groups and network ACLs to allow the required traffic between the peered VPCs. This setup enables seamless and secure communication between resources in the US East and Asia Pacific South regions while maintaining network isolation.

Step-by-Step Guide:

Step 1: Create a VPC in the Asia Pacific (Mumbai) region (ap-south-1)

  1. If you don't already have a VPC, you can create one by clicking "Your VPCs" in the VPC Dashboard.
  2. Click the "Create VPC" button.
  3. Fill in the VPC details, only the name, and leave the other setting as default. As, it will automatically create Subnets, Route Tables, and Internet Gateway.
  4. Click "Create VPC."

Image description

Step 2: Launching a Windows EC2 Instance

  1. Click the "Launch Instance" button.
  2. Select an "Amazon Linux Server" AMI based on your requirements.
  3. For instance, type, set as "t2.micro" is a free tier eligible.
  4. If you already have an EC2 "key pair", select it.
  5. If not, create a "new key pair". You'll use this key pair to securely connect to your Windows EC2 instance.
  6. "Save the file" on your local device. Make sure it is safe.
  7. Automatically "assigned public IP" should be "Enabled" for Private Subnet and vice-versa.
  8. Create a "new security group" or select an "existing one".
  9. Define rules to allow ALL ICMP (IPv4) and SSH (443) traffic for a web server.
  10. Click "Launch" to proceed.

Image description

Repeat the above two steps in the US-East (N. Virginia) region us-east-1

Step 3: Create a VPC Peering Connection

  1. In the VPC Dashboard, click on "Peering Connections" in the left sidebar.
  2. Click on the "Create Peering Connection" button.
  3. Fill in the details for the peering connection, including a name, your VPC ID (in the current region), and the peer VPC ID (in the other region).
  4. Repeat this step in the other region to create a peering connection from the second VPC to the first VPC.

Image description

Step 4: Accept the Peering Connection

  1. After you've created the peering connections in both regions, you'll need to accept the peering request.
  2. In the VPC Dashboard, select "Peering Connections."
  3. Find the pending peering request, select it, and click "Actions" -> "Accept Request" in both regions.

Image description

Step 5: Update Route Tables

  1. To allow traffic to flow between the peered VPCs, you need to update the route tables.
  2. In each VPC's route table, add a route to the CIDR block of the other VPC, pointing to the peering connection. This enables traffic to be routed through the peering connection.
  3. Navigate to the "Route Tables" in the VPC Dashboard, select the route table associated with your VPC, and add a route.

Image description

Step 6: Connect to the EC2 Instance

  1. Open a terminal or command prompt on your local machine.
  2. Navigate to the directory where your private key (.pem) file is located.
  3. Use the chmod command to change the permissions of the private key file to be secure: “chmod 400 your-key.pem”
  4. Connect to your EC2 instance using SSH, replacing your-key.pem with the actual key file and your-instance-public-IP with your EC2 instance's public IP address: “ssh -i your-key.pem ec2-user@your-instance-public-ip”
  5. If you see a message asking if you want to continue connecting, type "yes" and press Enter.
  6. You are now connected to your EC2 instance via SSH. You should see the command prompt for your instance in your terminal.

Image description

Step 7: Ping the Peered VPC

  1. Once connected to your EC2 instance, use the ping command to ping an EC2 instance or resource in the peered VPC.
  2. Replace peer-instance-private-ip with the private IP address of the resource you want to ping in the other VPC: “ping peer-instance-private-ip”

Congratulations! Your VPC peering connection is now established, unlocking seamless communication between your AWS Virtual Private Clouds. Enjoy enhanced network connectivity and flexibility in your AWS architecture.

Conclusion

In conclusion, creating a VPC peering connection across two AWS regions enables secure and efficient communication between separate VPCs in different geographic locations, fostering a global network environment. By following a few straightforward steps, you can seamlessly bridge these regions, allowing resources to interact as if they were on a single network while maintaining isolation and control, enhancing the versatility and scalability of your AWS infrastructure.

Top comments (2)

Collapse
 
mark_seery_a40a9a567cb536 profile image
mark seery

thank you. helpful. So do you end up with two peer connections, one initiated from each VPC?

If so, in the routing tables, which peer connection do you point to, the one you initiated or the one you accepted?

Collapse
 
parth7802 profile image
Parth Patel

You have to allow both sides of the route table with their respective peering connections.