Skip to main content

Security Groups

Subnets

nameCIDRTypeAvailability Zone
qa-subnet-public1-ap-southeast-1a10.1.0.0/20Publicap-southeast-1a
qa-subnet-public1-ap-southeast-1b10.1.16.0/20Publicap-southeast-1b
qa-subnet-private1-ap-southeast-1a10.1.128.0/20Privateap-southeast-1a
qa-subnet-private1-ap-southeast-1b10.1.144.0/20Privateap-southeast-1b

Security Groups

Security groups need to be created for each VPC. The following shows the security groups in a single subnet.

security groupallow portsourceremarks
ssh220.0.0.0/0Allow ssh into the instance from anywhere. Only to be used on bastion hosts or haproxy.
ssh2210.1.0.0/20, 10.1.16.0/20Allow ssh from instances from the private subnet.
http800.0.0.0/0Allows http request from anywhere. Only to be used on haproxy (load balancer)
https4430.0.0.0/0Allow https request from anywhere. Only to be used on haproxy (load balancer)
haproxy-stats84430.0.0.0/0Allow https request from anywhere. Only to be used on haproxy (load balancer)
jodgig.api800010.1.0.0/20, 10.1.16.0/20Allow private IP address from public subnets.
jodgig.frontend300010.1.0.0/20, 10.1.16.0/20Allow private IP address from public subnets.
jodpro.api801010.1.0.0/20, 10.1.16.0/20Allow private IP address from public subnets.
jodpro.frontend301010.1.0.0/20, 10.1.16.0/20Allow private IP address from public subnets.
jodpro.rds.private-subnet-1330610.1.128.0/20RDS will only allow all private IPs from private subnets only.
jodpro.rds.private-subnet-2330610.1.144.0/20RDS will only allow all private IPs from private subnets only.

Environment Specific Security Groups

In AWS Console, we will prepend the vpc name to the security group name to make life easier.

Example

There will be 3 security groups for a security group allowing ssh for 3 environments.

vpcsecurity groupvpc
qa-vpcsshqa-vpc.ssh
demo-vpcsshdemo-vpc.ssh
prod-vpcsshprod-vpx.ssh