This course covers the core learning objective to meet the requirements of the 'Designing Network & Data Transfer solutions in AWS - Level 2' skill
- Understand the most appropriate AWS connectivity options to meet performance demands
- Understand the appropriate features and services to enhance and optimize connectivity to AWS public services such as Amazon S3 or Amazon DynamoDB.
- Understand the appropriate AWS data transfer service for migration and/or ingestion
- Apply an edge caching strategy to provide performance benefits for AWS solutions
In this lesson, we will discuss Using VPC Peering for Inter and intra-Regional Communication. Although we can use technologies such as site-to-site VPNs to connect our AWS VPCs together, there are significant drawbacks of this approach. Drawbacks such as device management; you will need to deploy at least one virtual appliance to create your site-to-site VPN. You'll be responsible for the high availability of this device and there'll also be a cost for this device. Data flowing through the Internet; because you are creating a site-to-site VPN, your traffic will travel across public networks and be susceptible to delay and potential attack.
Bandwidth bottlenecks; because you are using a virtual appliance, the virtual appliance can become a bandwidth bottleneck due to the max bandwidth limits for EC2 instances. Data out charges; you'll be charged for data leaving the region. VPC peering removes most of these drawbacks. VPC peering is used to connect a pair of VPCs into a single routing domain.
VPC peering can be used to peer VPCs in the same or different regions. When using VPC peering, traffic traversing a VPC peering connection always stays on the AWS Backbone, reducing the likelihood of your data being accepted. Traffic traversing a VPC peering connection is always encrypted, and when using VPC peering, there is no device for you to manage, there is no single point of failure, and no bandwidth bottlenecks. There is no charge for the VPC peering connection itself, but there is a data charge for data traversing the VPC peering connection. A VPC peering connection is only used to peer a pair of VPCs. VPC peering does not care whether VPCs are in the same region, in different regions, in the same AWS account, or in different AWS accounts. One big rule for us to remember, in order to peer a pair of VPCs using VPC peering, the VPCs must use non-overlapping IP ranges. Two of VPC peering characteristics worth knowing: VPC peering connections are non-transitive. If VPC A and VPC B are peered, and VPC B and VPC C are peered, VPC A and VPC C are not.
In order to route traffic between VPC A and VPC C, you could peer the VPCs directly with each other. Peered VPCs cannot share Internet gateways or virtual private gateways. If you have multiple VPCs that need to connect to the Internet or to on-premises, then they must have their own gateways or connect using transit gateway. VPC peering works really well when you have a small number of VPCs to interconnect. But as your number of VPCs grow, the more VPCs that you have that need to connect to on-premises and the Internet, the more complex your route environment is, then the more likely you are to use transit gateways.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.