Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deploy VPC components to create private EC2 instance in AWS cloud #1

Open
iwayqtech opened this issue Jun 5, 2021 · 21 comments
Open
Assignees
Labels

Comments

@iwayqtech
Copy link
Collaborator

iwayqtech commented Jun 5, 2021

VPC_Architecture

Deployment:

Please create private EC2 instance with "t2.micro" type in AWS cloud and the required dependency resources to connect to the private EC2 server as per the architecture shown above.

Verification:
Login to AWS EC2 instance deployed into Private Subnet.

@iwayqtech iwayqtech added the Tasks label Jun 5, 2021
@iwayqtech iwayqtech self-assigned this Jun 5, 2021
@RaguCapg
Copy link

RaguCapg commented Jun 5, 2021

Do we need to specify Router flow or it's understandable?

@iwayqtech
Copy link
Collaborator Author

Do we need to specify Router flow or it's understandable?

Route Table need not to be included in the architecture. Its understandable as per the requirement.

@bikash2241
Copy link

image
connected to instance in private subnet from instance in public subnet

@iwayqtech
Copy link
Collaborator Author

image
connected to instance in private subnet from instance in public subnet

Appreciated.

@abdallah-dhaou
Copy link

you could add these to your ssh config (~/.ssh/config) and then connect directly to your instance in private subnet

Host bastion_host
   HostName <public_ip_of_instance_in_public_subnet> 
   User ec2-user
   IdentityFile <path_to_pem_file>
   ProxyCommand none
Host securehost
   HostName <private_ip_of_instance_in_private_subnet> 
   User ec2-user 
   IdentityFile <path_to_pem_file>
   ProxyCommand ssh bastion_host -W %h:%p

To login to the bastion_host from your laptop: ssh bastion_host

To login to the private machine from your laptop using the bastion_host: ssh securehost

keep learning & improving

@srmanthena83
Copy link

I have completed the task.

[ec2-user@ip-172-32-1-100 ~]$ ssh 172.32.2.98
Last login: Mon Jun 7 01:56:58 2021 from 172.32.1.100

   __|  __|_  )
   _|  (     /   Amazon Linux 2 AMI
  ___|\___|___|

https://aws.amazon.com/amazon-linux-2/
[ec2-user@ip-172-32-2-98 ~]$

@trinadh430
Copy link

image

Configured NAT gateway as well to Private Server as well

@gaurmukesh
Copy link

Completed-
MukeshAssignment-connected to instance in private subnet from instance in public subnet
connected to instance in private subnet from instance in public subnet

@Chinarjaiswal
Copy link

Completed.
image

@abhi6133
Copy link

abhi6133 commented Jun 9, 2021

image

Connected private instance through public server and configured NAT Gateway for private server

@srilu1273
Copy link

Connected Private instance through public server.Assignment_1

@ameya4
Copy link

ameya4 commented Jun 9, 2021

Please find attached image , i have also includec the vpc peering in this ..
Assignment 1 -ameya pathak

@grakshay
Copy link

Screenshot (1)

@ka994
Copy link

ka994 commented Jun 11, 2021

hii, i completed the task
task aws

@siri1984
Copy link

completed the task
ec2-user

@bandisreekar
Copy link

bandisreekar commented Jun 15, 2021

Screenshot (96)
Dear Pr,

I have connected to Private server within the CIDR range from Public Server, attached the screenshot for reference. please check and let me know if any changes needed.

Thank you,
Sreekar Bandi

@krishnaprasad1994
Copy link

I created servers as per architecture and attached route tables to subnets. Connected private server through public server.
Screenshot (80)

@JeyachandraGuru
Copy link

I have created the server as per the architecture
Assignment1

@ValaxyTech
Copy link
Owner

you could add these to your ssh config (~/.ssh/config) and then connect directly to your instance in private subnet

Host bastion_host
   HostName <public_ip_of_instance_in_public_subnet> 
   User ec2-user
   IdentityFile <path_to_pem_file>
   ProxyCommand none
Host securehost
   HostName <private_ip_of_instance_in_private_subnet> 
   User ec2-user 
   IdentityFile <path_to_pem_file>
   ProxyCommand ssh bastion_host -W %h:%p

To login to the bastion_host from your laptop: ssh bastion_host

To login to the private machine from your laptop using the bastion_host: ssh securehost

keep learning & improving

@Nagarjuna-5
Copy link

Uploading 16269726079533175263334670663325.jpg…

@Nagarjuna-5
Copy link

Done the task.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests