<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Joe Terlecki</title>
    <description>The latest articles on DEV Community by Joe Terlecki (@joeterlecki).</description>
    <link>https://dev.to/joeterlecki</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F460507%2Fc5cae007-122a-4538-a521-f5e7787624dd.png</url>
      <title>DEV Community: Joe Terlecki</title>
      <link>https://dev.to/joeterlecki</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/joeterlecki"/>
    <language>en</language>
    <item>
      <title>Connecting to your Homelab without a VPN, SSH keys, or Public VP's using AWS Systems Manager</title>
      <dc:creator>Joe Terlecki</dc:creator>
      <pubDate>Mon, 12 Jul 2021 20:52:17 +0000</pubDate>
      <link>https://dev.to/joeterlecki/connecting-to-your-homelab-without-a-vpn-ssh-keys-or-public-vp-s-using-aws-systems-manager-4fd6</link>
      <guid>https://dev.to/joeterlecki/connecting-to-your-homelab-without-a-vpn-ssh-keys-or-public-vp-s-using-aws-systems-manager-4fd6</guid>
      <description>&lt;p&gt;The pandemic has made me enter the joys of home lab. I work daily as a cloud infrastructure engineer by day, so learning the home lab stuff has been rewarding. In addition, I have been trying to incorporate my cloud knowledge and skills into my lab environment by making a hybrid cloud approach.&lt;/p&gt;

&lt;p&gt;I wanted to connect to my home lab remotely, and my cloud expertise makes me cringe at VPNs even though they have their place. It's just not "Cloud-native However, and I learned you could service in AWS to connect to private instances without the need for ssh keys, public infrastructure, or VPNs. There is a service called Systems Manager that offers a service "Sessions Manager".&lt;/p&gt;

&lt;p&gt;I created a tutorial on how to set this up if anyone is interested.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/Lm9afXJA7Q0"&gt;https://youtu.be/Lm9afXJA7Q0&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>aws</category>
      <category>architecture</category>
      <category>cloudskills</category>
    </item>
    <item>
      <title>Building a Standardized VPC</title>
      <dc:creator>Joe Terlecki</dc:creator>
      <pubDate>Fri, 02 Jul 2021 11:18:53 +0000</pubDate>
      <link>https://dev.to/joeterlecki/building-a-standardized-vpc-5flm</link>
      <guid>https://dev.to/joeterlecki/building-a-standardized-vpc-5flm</guid>
      <description>&lt;h2&gt;
  
  
  Building a Standardized VPC
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgr1upqp8us5z64le2z7w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgr1upqp8us5z64le2z7w.png" alt="AWS VPC" width="800" height="474"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As someone who is always constantly tinkering and wanting to learn new technology, I seemed to fall into a profession with a never-ending buffet of tools and concepts, the DevOps/Cloud Infrastructure space. Often I find myself scouring Reddit and LinkedIn posts for "best practices!", "security!" and "cloud-native!; however, I always find myself leaving those sessions needing more input. To settle this void, I decided its time to build out my "Enterprise" worthy sandbox with my good old pal… AWS.&lt;/p&gt;

&lt;p&gt;Working with AWS usually takes up 8 hours of my day to begin with, so I have grown quite comfortable with its features, nuances, and pricing models. It is about time I start building more stuff in my free time and blogging about it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There is no better place to start than laying down the foundation with a solid, cost-effective VPC&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  VPC Decision Making
&lt;/h3&gt;

&lt;p&gt;When planning out my network for my AWS account, I had to consider a couple of things.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;It had to adhere to industry best practices as much as possible&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Not burn a hole in my wallet&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Infrastructure as Code&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Support multi-account architecture&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No Pets(With 2 exceptions)&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If anybody has worked with AWS for at least 30 days, they know how fast the charges can rack up if you are not careful due to their consumption pricing model. To keep costs as low as possible, I had to make 3 design decisions. One, use Terraform to spin up and down my entire environment(s) as needed. Two, have very minimal pet servers by using AWS ECS Fargate as much as possible. And three support a basic multi-account architecture.&lt;/p&gt;

&lt;h3&gt;
  
  
  VPC Best Practices
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbpcgkq4m591jy179h7k7.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbpcgkq4m591jy179h7k7.jpeg" alt="Checklist" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To build something and throw it together with duct tape is always an option, but you are guaranteed to have a bad time when dealing with infrastructure and cloud services.&lt;br&gt;
To ensure I don't stumble over my 2 feet and learn all the ins and outs of new services, I made sure I stuck to the best practices below except for using a NAT instance.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The VPC must be highly available using 3 availability zones/subnets for the private internal network and the public-facing DMZ. This will give me a total of 6 subnets, 3 for the private and 3 for the public-facing network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use a NAT appliance to forward traffic from the private subnets to access public resources. This will be necessary for download packages and updates. Due to the base price of a managed NAT Gateway of $35 plus data fees, I opted to use the non-managed solution, a NAT instance. Using an EC2 as my NAT appliance, I can turn on\off the instance only when needed and only be charged by the partial compute hours utilized.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure a Bastion host for when the need arises to communicate to private services such as RDS instances and the rare occurrence of a non containerized application.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;S3 buckets for the Terraform state files, S3 server-side logging bucket, and an S3 endpoint. Even though I won't be utilizing the S3 endpoint fully at this time until I deploy some log analytics and visualization tools, the S3 endpoint won't incur extra costs and can only save me money.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Gitlab-CI Runner using ECS Fargate configured with spot pricing for my CI/CD pipeline, which will be the cornerstone of my environment for infrastructure, configuration management, and custom AWS native services. I managed to deploy a small Ubuntu container to host my CI service to keep my costs down to an extreme minimum. Additionally, since the Gitlab runner is deployed as an ECS task, I can easily scale the environment down to 0 when not in use and only pay pennies for a fully-featured CI service.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Whats Next?
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fci38no7gun0t033sawqr.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fci38no7gun0t033sawqr.jpeg" alt="Rail Road" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that the core network and services are deployed at an infrastructure level, deployed in Terraform, version controlled, and secure, It is time to dump my local IAM user for a SAML solution using G-Suite at least one more AWS account.&lt;/p&gt;

&lt;p&gt;This "root" account will serve as my managed services, identity, logging and security, and tooling environment. In the real world, you would ideally have a "separation of concern" by utilizing separate accounts for each service. However, since I am not in the printing money business, paying google $6 per user/email and AWS the additional infrastructure costs is out of the question.&lt;/p&gt;

&lt;p&gt;The other account(s) will exist as a mock application environment(s). Possible one at least one account for a DEV/STG and the other as PRD. To fill these accounts, I have found a few open-source full-stack projects on GitHub that will need to be migrated into Docker containers. That will be a fun task to take on soon; however, not before an Image/container bakery and an account vending machine :)&lt;/p&gt;

&lt;p&gt;I hope you enjoyed my semi-coherent ramblings about AWS network design. Stay tuned and look out for future updates as I build an enterprise-worthy cloud architecture for a fictional company.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0b554nakloux9soidc9u.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0b554nakloux9soidc9u.jpeg" alt="Cape Flying Child" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
