I have a custom VPC which has 6 public subnets in 6 AZs.
When I tried to create Aurora Serverless, I do see my VPC in the VPC dropdown but there is only 1 item 'Create new DB subnet group'.
I'm expecting my VPC has available subnet groups already.
I have researched a lot already, even compare another VPC (which is working) with my VPC, I don't see anything differences from VPC to Subnet to RouteTable to Security Group ...
Please advice.
You need to bundle the subnets you want to use on your instance on a db subnet group, you can't add the subnets directly.
It is very easy, as seeing here.
Related
I'm trying to set up the AWS cloud for some VMs as an alternative for existing setups in Azure. AWS however has some limitations on the subnet that Azure does not have. With Azure I have it set up using the following IPs in the picture below, but AWS gives me the following errors when trying to create the VPC with the subnets I need.
Would anyone have suggestions on how to use these IP ranges for a subnet on AWS? Perhaps something with AWS Cli? Any feedback is appreciated!
Your subnets are not part of your VPC they way you set it up. That's way it errors out. Its surprising that azure would allow to do it.
It should be, for example:
VPC: 10.0.0.0/20
subnet 1: 10.0.0.0/24
subnet 2: 10.0.16.0/24
subnet 3: 10.0.32.0/24
The subnets in AWS must be a subset in VPC Range
This means that your subnet must be within the IP Range in the VPC
In your example, you are trying to create a VPC with 10.0.0.0/20
This means that the total range of your subnet is 10.0.0.0 until 10.0.15.255
So, the first 16 bits (10.0) part of your CIDR cannot change while creating a subnet
That's why the subnets you are trying to create does not work, because it not within the range of the VPC
I made a Django app and deployed it on Elastic Beanstalk. I made a Postgres DB with RDS as well. I want to add both of these to a VPC.
I created the VPC using the VPC wizard (VPC with Public and Private Subnets): which created, as the name suggests, one public and one private VPC.
I was told here that I need to add a second private subnet for RDS. Now I have:
1 public subnet (10.0.0.0/24)
2 private subnets (10.0.1.0/24 and 10.0.10.0/24)
I also know that from here that I needed to "modify the route table of the new private subnet to point to the NAT gateway". However, I am not sure what that means. Right now, here is what my route tables look like:
One for the public subnet
One for the private subnet (main)
Also, after configuring this, what do I need to do to add my RDS to this? Should I just make a subnet group with these 2 private subnets and set it when configuring the RDS? I think I know how to do EBS using CLI.
Please let me know if you need any more information! Thanks!
For the private subnets your route tables should point 0.0.0.0/0 to NAT gateway, as shown on the screenshot:
Example SG for RDS for testing:
I want to set up a VPC for my Elastic Beanstalk web app and RDS postgres db. I tried creating a VPC but ran into problems:
I went to VPC on AWS -> Launch VPC Wizard -> VPC with Public and Private Subnets. I am not sure what configurations to use. For example, what should I set Elastic IP Allocation ID? Do I need to set the VPC name?
After I create this, am I ready to just add it in EBS and RDS, or is there something else I need to do? Thanks!
Do I need to set the VPC name?
Its optional, but you can use, e.g. MyVPCforEB or what you want. It easier to find your vpc by name, than by cryptic vpc-id.
what should I set Elastic IP Allocation ID
You have to create EIP first. Its done in VPC -> Elastic IP addresses menu. This is required for NAT gateway, so that instances in private subnet can access the internet.
After I create this, am I ready to just add it in EBS and RDS, or is there something else I need to do?
Not really. To do it properly, you would need to add one more private subnet. The VPC wizard will create only one private subnet. For RDS, to create a subnet group, you need to have at least two private subnets in different Availability Zones.
Thus, once you have two private subnets in two different AZs, then you can create new Subnet Group in RDS with the subnets. Having this, you can create the RDS in these two subnets.
I've created a VPC. By default the VPC created one public and one private subnet. I've created an additional private subnet in a different availability zone.
I then (in the ElasticCache console) created a new subnet group that contains these two private subnets from the VPC. This subnet group is also associated, of course, with the VPC.
Then, on creating an Aurora RDS within this VPC, it asks for a subnet group. There's one there, a 'default' group, but my new subnet group doesn't appear.
How do I create a subnet group that is acceptable when creating a database?
Well.. as it turns out the ElasticCache subnet groups are not visible when creating a database. You have to use the RDS console to create a 'Database Subnet Group'. Once you do that.. you're set.
ElasticCache and RDS are different types of product groups. Their SubnetGroups are different entities and they don't over lap with each other. You would need to create subnet groups in RDS to use it with RDS engines (database engines). They are not tied to any db engine, so you can re-use them within RDS.
One additional thing to note is that some other Database productions like Amazon Neptune and Amazon DocDB are able to access your RDS subnet groups as well. Just an FYI.
Given a VPC, can I not explicitly mention which subnets the RDS instance should exist?
I have created a VPC 10.0.0.0/24 with three subnets as shown below:
REST servers - 10.0.0.0/25
RDS - AZ1 - 10.0.0.128/26
RDS - AZ2 - 10.0.0.192/26
When creating the DB, I am able to provide the VPC name. It seems, all subnets of this VPC are automatically selected. I am not able to specify the two subnets (as shown in the list above). There is an option for public accessibility which I have set to No. Therefore, even though all subnets seem to be applied for this RDS instance, it seems that, it will be accessible only from the REST servers subnet.
You need to select the DBSubnet Group , which should have your private subnets.
You need to create a new subnet group and assign it while creating a new RDS. Make note that existing RDS doesn't reflect when you change the subnet group, hence you need to create a new one.