<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Afolabi Gabriel Olaoluwa </title>
    <description>The latest articles on DEV Community by Afolabi Gabriel Olaoluwa  (@gafol).</description>
    <link>https://dev.to/gafol</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1078518%2F5c3b1692-e465-41d9-a699-387c8dc9facb.jpg</url>
      <title>DEV Community: Afolabi Gabriel Olaoluwa </title>
      <link>https://dev.to/gafol</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gafol"/>
    <language>en</language>
    <item>
      <title>AWS VPC SEGMENTATION</title>
      <dc:creator>Afolabi Gabriel Olaoluwa </dc:creator>
      <pubDate>Mon, 30 Jun 2025 23:28:35 +0000</pubDate>
      <link>https://dev.to/gafol/aws-vpc-segmentation-3l24</link>
      <guid>https://dev.to/gafol/aws-vpc-segmentation-3l24</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6xq1r9cy9v97v85m3q0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6xq1r9cy9v97v85m3q0.png" alt="Image description" width="800" height="514"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Segmentation is the practice of dividing a Virtual Private Cloud (VPC) into smaller logical, isolated section to improve security, manageability, and performance.&lt;br&gt;
It allows you to separate resources based on funtion, environment or security needs.&lt;/p&gt;

&lt;p&gt;Just like traditional network, LAN is segmented into logical separate LAN called the VLANs. These VLAN segments are based on the environment, users,  and resources that should be provisioned in that segment.&lt;/p&gt;

&lt;p&gt;In AWS VPC, segmentation is done exactly like this but in the form of subnets. You dont create VLANs but you create subnets in the AWS VPC.&lt;/p&gt;

&lt;p&gt;Remember, that VPC is an isolated virtual network within AWS, that you create and control, just like the traditional data center network.&lt;/p&gt;

&lt;p&gt;When you create a VPC, you define your CIDR or Block e.g &lt;strong&gt;10.10.0.0/16&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;But in this VPC, there's need for you to do segmentation. Then you begin to create different subnets.&lt;/p&gt;

&lt;p&gt;These subnets created will be given a block of ip from the VPC  CIDR.&lt;/p&gt;

&lt;p&gt;Say, you want to create four subnets from a VPC whose CIDR is 10.10.0.0/16. This can be manually created like this:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subnet A = 10.10.1.0/24&lt;br&gt;
Subnet B = 10.10.2.0/24&lt;br&gt;
Subnet C = 10.10.3.0/24&lt;br&gt;
Subnet D = 10.10.4.0/24&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The vpc is segmented into four subnets. Like I said , a subnet in AWS VPC is just like VLAN in traditional network.&lt;/p&gt;

&lt;p&gt;In AWS VPC, Any resource provisioned in any subnet will dynamically pick an ip address from the ip block assigned to that subnet.&lt;/p&gt;

&lt;p&gt;Example: If we provisioned a server in subnet A, the ip of that server will dynamically pick an ip address in the (10.10.1.0/24) pool.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;EC2 instance ip : 10.10.1.10/24&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Also note that, you can decide to make any of these subnets created public or private.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For ease of troubleshooting you could have a unique address range for public subnet and for private subnet.&lt;/p&gt;

&lt;p&gt;In the next article, I will show typical example of how to create VPC,  subnet and allocating IPs.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>aws</category>
      <category>awsnetworking</category>
      <category>awscommunitybuilder</category>
    </item>
    <item>
      <title>DIFFERENCE BETWEEN INTERNET GATEWAY (IGW) AND NAT GATEWAY(NAT-GW)</title>
      <dc:creator>Afolabi Gabriel Olaoluwa </dc:creator>
      <pubDate>Sat, 12 Apr 2025 14:02:14 +0000</pubDate>
      <link>https://dev.to/gafol/difference-between-internet-gateway-igw-and-nat-gatewaynat-gw-3ij0</link>
      <guid>https://dev.to/gafol/difference-between-internet-gateway-igw-and-nat-gatewaynat-gw-3ij0</guid>
      <description>&lt;p&gt;In AWS Virtual private cloud, IGW and NAT GW are very important AWS VPC components.&lt;br&gt;&lt;br&gt;
It is very pertinent to understand the function of the two components so as to know where and when to deploy each of them.&lt;br&gt;
Here i will explain the difference between the IGW and NAT Gateway.&lt;/p&gt;

&lt;p&gt;Both VPC components are called gateways, in VPC context, they allow internet access, but have different use cases.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdgborvcy1xomzye8oz0.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbdgborvcy1xomzye8oz0.JPG" alt="VPC with IGW and NAT-GW" width="623" height="619"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;INTERNET GATEWAY (IGW)&lt;/strong&gt;&lt;br&gt;
The Internet Gateway is a VPC component that provides internet access for public subnets.&lt;br&gt;
Its like a bridge that connects your VPC to the internet.  Your VPC has access to the internet through the IGW.&lt;/p&gt;

&lt;p&gt;It allows instances or resources in a public subnet to access the internet and also to be accessed from the internet. Example of this resource in a public subnet, is a web application hosted on a web server, which is expected to have access to the intenet or be accessed from the internet.&lt;/p&gt;

&lt;p&gt;This is exactly a two-way communication i.e inbound and outbound internet traffic. &lt;br&gt;
The IGW is attached to a virtual private cloud (vpc). It acts like a gate to the outside world (Internet).&lt;br&gt;
Its usually used by the instances/resources in the public subnet, to route traffic to the internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Instances or resources deployed in the Public subnets have a public ip, and their traffic is routed to the internet Gateway for internet access. It is not like that for resources in the private subnet.&lt;br&gt;
The Traffic of an instance(WEB APPLICATION) in the public subnet is:&lt;br&gt;
INSTANCE(WEB-APPLICATION) &amp;gt;&amp;gt;&amp;gt;&amp;gt; IGW &amp;gt;&amp;gt;&amp;gt;&amp;gt;INTERNET&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NAT GATEWAY&lt;/strong&gt;&lt;br&gt;
AWS NAT Gateway (Network Address Translation Gateway) is a managed AWS service that allows instances/resources  in a private subnet to connect to the internet while preventing the internet from initiating connections with those instances/resources. &lt;br&gt;
Example is a backend server typically deployed in a private subnet. Users cannot be allowed to access this backend server from the internet for strict security measures; But the server needs to have access to the internet, for updates installations. &lt;br&gt;
This is a typical ONE-WAY Communication that allows only outbound traffic (SERVER-TO-INTERNET), but does not allow inbound traffic (INTERNET-TO-SERVER).&lt;/p&gt;

&lt;p&gt;This is ideally used by instances or resources in the private subnet, because the instances in the private subnet do not have public IPs , also their route do not point towards the IGW.&lt;br&gt;
One more thing to note is that, NAT GW is used by resources in the private subnet, but the NAT GW itself is deployed in the public subnet i.e it is attached to a subnet and not vpc . &lt;/p&gt;

&lt;p&gt;The Traffic flow of an instance(BACKEND APPLICATION) in the private subnet is:&lt;br&gt;
INSTANCE(BACKEND-APPLICATION) &amp;gt;&amp;gt;&amp;gt;&amp;gt; NAT-GW &amp;gt;&amp;gt;&amp;gt;&amp;gt; IGW &amp;gt;&amp;gt;&amp;gt;&amp;gt; INTERNET&lt;/p&gt;

&lt;p&gt;In the next article, i will be sharing the difference between the public and private subnet. &lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>devops</category>
      <category>networking</category>
    </item>
    <item>
      <title>Understanding AWS VPC and Its Components</title>
      <dc:creator>Afolabi Gabriel Olaoluwa </dc:creator>
      <pubDate>Mon, 24 Mar 2025 17:01:54 +0000</pubDate>
      <link>https://dev.to/gafol/understanding-aws-vpc-and-its-components-2c7b</link>
      <guid>https://dev.to/gafol/understanding-aws-vpc-and-its-components-2c7b</guid>
      <description>&lt;p&gt;&lt;strong&gt;Amazon Virtual Private Cloud (VPC)&lt;/strong&gt; is a fundamental service within Amazon Web Services (AWS) that enables users to launch AWS resources in a logically isolated virtual network. VPC is a regional service.&lt;/p&gt;

&lt;p&gt;A VPC helps to provide control over network settings, including IP addressing subnetting, routing, and security policies. This makes it a crucial component for cloud-based applications.&lt;/p&gt;

&lt;p&gt;I am going to list below the components of AWS VPC, with a brief introduction on each of them. Going forward, I will be explaining each of them as a stand alone topic on how each of the component  functions and deployed in AWS VPC.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Subnets&lt;/strong&gt;&lt;br&gt;
A VPC is divided into subnets, which are segments of the IP address range allocated to specific Availability Zones. Subnets can be public or private, where public subnets have direct internet access, while private subnets are isolated for internal use. Note that the subnets are created in specific Availability Zone or Zones preferably for disaster recovery.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Internet Gateway (IGW)&lt;/strong&gt;&lt;br&gt;
An Internet Gateway allows resources within a VPC (specifically, public subnets) to communicate with the internet. It serves as a bridge between the VPC and external networks. Every resource deployed in the public subnet, has access to reach the internet through the internet Gateway.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;NAT Gateway or NAT Instances&lt;/strong&gt;&lt;br&gt;
Network Address Translation (NAT) is used for private subnets to access the internet without exposing their instances to inbound traffic. This service is deployed in the public subnet, but used for the private subnet for internet access.&lt;br&gt;
Useful for private resources like databases or backend servers that need to download updates or access external services but should not be exposed to the internet. AWS offers NAT Gateways (managed service) and NAT Instances (self-managed EC2 instances) for this purpose.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security Group&lt;/strong&gt;&lt;br&gt;
Security Groups act as virtual firewalls for EC2 instances within the VPC. They control inbound and outbound traffic based on predefined rules, providing security at the instance level. Security groups are stateful.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Network Access Control Lists (NACLs)&lt;/strong&gt;&lt;br&gt;
NACLs provide an additional layer of security at the subnet level. Unlike Security Groups, NACLs operate with stateless rules, meaning inbound and outbound rules must be explicitly defined.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Elastic IPs (EIPs)&lt;/strong&gt;&lt;br&gt;
Elastic IPs are static public IP addresses that are associated with EC2 instances or NAT Gateways, ensuring persistent connectivity even if an EC2 instance is stopped and restarted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;VPC Peering&lt;/strong&gt;&lt;br&gt;
VPC Peering allows secure and direct connectivity between two VPCs within the same AWS account or across different accounts. This enables seamless communication without the need for going through the internet. VPC peering is not transitive.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AWS Transit Gateway&lt;/strong&gt;&lt;br&gt;
AWS Transit Gateway simplifies network management by allowing multiple VPCs and on-premises networks to be connected through a single, scalable hub.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AWS Transit Gateway&lt;/strong&gt;&lt;br&gt;
AWS Transit Gateway simplifies network management by allowing multiple VPCs and on-premises networks to be connected through a single, scalable hub.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;VPC Endpoints&lt;/strong&gt;&lt;br&gt;
VPC Endpoints enable a VPC to connect with other AWS services without going through the internet. They are two types or categories: &lt;br&gt;
(a) Interface Endpoints (b)  Gateway Endpoints.&lt;br&gt;
These will be discussed in further articles and practical examples.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
      <category>networking</category>
    </item>
  </channel>
</rss>
