Setting up an AWS environment

I would like to set up a web server that is accessible through the internet. I will use EC2 to host this webserver.


One way to do this is to create a VPC with a public subnet, and create an EC2 instance within it. However, this is less secure than keeping the EC2 instance in a private subnet. This seems like a simple tweak, but it actually generates a bit of complexity.


I will step you though how to accomplish it.

The Architecture

Let's first discuss what we will need. To be able to access this EC2 instance over the internet whilst it lies in a private subnet, there must be something in a public subnet to hit that will direct traffic to that private subnet EC2 instance.


To do this, I will use an application load balancer (ALB).


An ALB must exist over at least two availability zones (AZs), so it must sit over two public subnets (one per AZ). It must also target at least two resources. This means we need at least two web servers. Since we need two EC2 instances anyways to host these web servers, we might as well put them in separate private subnets (similarly, in different AZs).


We want to run web servers on these EC2 instances. To do this, we will need a way to get access to these EC2 instances to

The easiest way I could find to do this is a "bastion" EC2 instance. This guy will sit in one of the public subnets so we can ssh into it. Then, once inside, we will be able to ssh into the EC2 instances in the private subnets.


Remember how we said we will need to install code to run that web server? This means the EC2 instances in the private subnets will need to be able to access the internet. This means we will also need a NAT gateway to enable outbound internet access from these private subnets.


SO, the architecture will look like this:

architecture

Implementation

Before starting, it is important to note that we will be hosting our web server on port 8080


Let's get started!

VPC

Create a VPC with 2 AZs, 2 public subnets, 2 private subnets and 1 NAT gateway


You need to point your private subnets to this NAT gateway. Go to the Route Table used by your private subnets and click "actions" -> "edit routes". Now add a route with destination "0.0.0.0/0" and target as "Nat Gateway". Make sure you fill in the name of your provisioned NAT gateway in the textbox below. Save your changes.

EC2 Instances

Create your first EC2 instance.

Name and tags

Give it a clear name so you know if it is one of the web servers or the bastion.

Key pair (login)

Create a key pair and assign the same one to all three.

Network settings

Make sure you are putting the EC2 instance in the right VPC and subnet. If this EC2 instance is the public one, make sure to toggle on "auto-assign public IP".


We will want to create a new security group (sg) that we will use for all three of our instances -- when creating this sg, in addition to the default ssh rule we will want to add another rule for custom TCP on port 8080 with source 0.0.0.0/0. In your second two EC2 instances, make sure you click "select existing security group" and select it from the list


Go ahead and launch your instance. Create 2 more for your other two EC2 instances.

Target group

In preparation for our ALB, we will create a target group this ALB will hook on to that points to our web server EC2 instances. Select "instances", give it a name, set the port as http on port 8080, and select your VPC. Hit next.


Select your web server EC2 instances, change the "ports for the selected instances" port to 8080, and click "include as pending below". Then go ahead and create your target group.

Application Load Balancer

Let's create our ALB.

Basic configuration

Give it a name

Network mapping

Select your VPC and select your AZs (with your public subnets)

Security groups

We will use the security group we defined for our EC2 instances

Listeners and routing

Adjust your listener to port 8080, using our target group we defined in the previous step.


And hit create!

Running the Web Servers

Now we have provisioned all of our necessary services! Time to set up the web server EC2 instances to... ya know... serve some webpages!

Getting into our Web Server EC2 instance

We will need to first ssh into our bastion EC2 instance. We need our key we provisioned to do this. And remember -- the private subnet web server EC2 instances we will ssh into next will also need this key.


One approach we can take is to

  1. copy over the ssh key onto the bastion
  2. use the key that exists on our local machine to ssh into the bastion
  3. use the key that exists on the bastion to ssh into the web server EC2 instances

But this solution is insecure -- we would prefer not to move around our key. Instead, we can use key forwarding!


To do this, run the following commands in a terminal:

eval "$(ssh-agent -s)"
ssh-add /path/to/your/private_key.pem

Now, go to the EC2 dashboard, click your bastion EC2 instance, and hit "connect". Run the chmod command found there, then copy the private IP address found there. Use it in the following command in your terminal:

ssh -A ec2-user@{private-ip-address}

You should now be in your bastion EC2 instance. Go ahead and follow the same instructions given above to get into a web server EC2 instance (using that EC2 instance's private IP address).


Once inside, make sure you can hit the outside internet with a quick curl www.google.com. If you get output, go ahead and run the following:

sudo yum install nodejs npm -y
sudo npm install -g http-server
mkdir pages

vi to create a new file called "pages/index.html" with the following context:

<!DOCTYPE html>
<html lang="en">
  <head>
    <meta charset="UTF-8" />
    <meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <title>Web Server 1</title>
  </head>
  <body>
    <h1>From web server 1</h1>
    <p>You have hit my site!</p>
  </body>
</html>

Now call the following to spin up the web server in the background (which lets you close out your terminal without shutting it down)

nohup http-server /pages -p 8080 &

Repeat once more with the alternate EC2 instance. Use the following html index.html there:

<!DOCTYPE html>
<html lang="en">
  <head>
    <meta charset="UTF-8" />
    <meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <title>Web Server 2</title>
  </head>
  <body>
    <h1>From web server 2</h1>
    <p>You have hit my site!</p>
  </body>
</html>

Accessing the ALB

Go to your ALB in AWS and grab its DNS name. You can go ahead and paste it into your browser. You may need to tweak it by changing it to http instead of https and adding a :8080 to fix the port, but your web servers should be accessible. Try reloading the page a couple times -- you should see the pages swap between the servers. Cool!

What's Next?

If you want to regularly publish code on your EC2 instances, you might wanna use something like AWS CodeDeploy. You might think that using CodeDeploy might be doable w/o going thru these steps, but you would be mistaken -- AWS hates you and as well as anything simple and wants you to suffer. You will need to install a CodeDeploy agent on your EC2 instances, so at minimum the bastion instance is necessary. Once you have CodeDeploy on the EC2 instances and deployments seem to work, you can tear down the bastion and probably the NAT gateway as well.


I read that you can also use AWS SM to ssh into EC2 instances in private subnets, but I couldn't figure out how to get it to work. And, because Amazon hates everyone, the link on AWS to their internal documentation describing how to get SM FleetManager to work on EC2 instances is dead. Epic.