1 Answers
Alright! Good on you for working through this! 👍 All of your subnets, service accounts and instance groups look good to me.
Some questions/pointers about your Firewall Rules:
1. What you’ve done will work, and it’s fine for a learning lab. And IIRC from another post, you hit the issue of not being able to edit instances owned by a MIG so this makes a lot of sense. If you want to apply least privilege, you should either find a way to edit only the instance you need to SSH to (such as setting the network tag via the command line) or create a separate firewall rule just for that one specific instance (which avoids having to edit the instance).
2. Perfect! 😀
3. Did you have to set the rule to use the subnet CIDR block, or could you set it to apply to different service accounts at both ends? 🙂
4. In this case, instead of denying some specific traffic you don’t want (i.e. backend to frontend), try denying all outbound everything from the backend and then only opening up the specific data you do want to allow. This is more secure.
It does not look to me like you overcomplicated it. Good job, so far!
Mattias
Thanks Mattias, I have completed all the course. I am looking forward to writing the exam.
🙂👍
I think there’s a very important piece of information missing here, about VPC peering being required to enable cross VPC network access.