hosting internal application on AWS

0

I have a customer who wants to host their internal application on AWS. This application will be used by internal users over a private network.

->I am considering using a site-to-site VPN for a secure connection between the customer's data center and AWS. ->I will deploy an EC2 instance (single instance requirement) and a database in a private subnet. ->I suggest using a NAT Gateway for the EC2 instance to facilitate patch updates.

Since we are competing with Azure, I aim to optimize our approach as much as possible. Your insights and suggestions would be greatly appreciated. Any inputs?

AWS
已提问 9 个月前319 查看次数
1 回答
0

Your plan will work - it's pretty standard. VPN provides a private connection from the customer's network to the VPC where the EC2 instance is hosted. In the long term, Direct Connect may be a better option (it provides for dedicated bandwidth and more predictable latency) but it takes a bit more time to set up. You can switch from VPN to Direct Connect at a later stage with very little interruption.

profile pictureAWS
专家
已回答 9 个月前
profile picture
专家
已审核 9 个月前
profile picture
专家
已审核 9 个月前
  • Thank you so much for your quick response. Is it possible to remove NAT gateway and use any other way to facilitate patch updates to reduce cost?

  • If we eliminate the NAT Gateway, we would need to route from on-premises to the public network via Site to Site VPN. Running the patch manager itself should be no problem once the VPC endpoints are set up. When you run the patch manager, package updates, etc. will probably fail unless you have access to the public.

  • You haven't mentioned which operating system you're using; but in many cases you could have a single instance in a public subnet which downloads patches and then the instances on the private subnets retrieve patches from there. It may be simpler and easier to use NAT Gateway.

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则