Accenture migrations at scale presentation at AWS re:Invent 2014:
accenture-reinvent-breakout-session-deck-migration-to-cloud-v3-aws-template-final-cs
accenture-reinvent-breakout-session-deck-migration-to-cloud-v3-aws-template-final-cs
Blog posts to help enterprises run applications in the cloud. Entries on cloud migrations as Fortune 1000 companies embark on migrating to the cloud.
The MaxMind API (http://www.maxmind.com/en/country) can be used as either a Nginx module or as a web service. The API is only 99.98% accurate and does not detect proxies.
You can perform any bootstrapping action you would like using user data. Here is an example of installing Apache, PHP, and MySQL. Then Apache, PHP and MySQL are started. Then a sample application is installed on Apache.
#!/bin/sh yum -y install httpd php mysql php-mysql chkconfig httpd on /etc/init.d/httpd start cd /tmp wget http://us-east-1-aws-training.s3.amazonaws.com/self-paced-lab-4/examplefiles-as.zip unzip examplefiles-as.zip mv examplefiles-as/* /var/www/html
==================================================================================================================
Configure the VPN server software for the EC2 instances - Region 1
==================================================================================================================
Step 1
------
sudo yum install openswan
Step 2
------
nano /etc/ipsec.conf
Step 3
------
sudo vi /etc/ipsec.d/vpc1-to-vpc2.conf
Step 4
------
conn vpc1-to-vpc2
type=tunnel
authby=secret
left=%defaultroute
leftid=<EIP1>
leftnexthop=%defaultroute
leftsubnet=<VPC1 CIDR>
right=<EIP2>
rightsubnet=<VPC2 CIDR>
pfs=yes
auto=start
Step 5
------
sudo vi /etc/ipsec.d/vpc1-to-vpc2.secrets
Step 6
------
<EIP1> <EIP2>: PSK "<TYPE A KEY HERE>"
==================================================================================================================
Configure the VPN server software for the EC2 instances - Region 2
==================================================================================================================
Step 7
------
sudo vi /etc/ipsec.d/vpc2-to-vpc1.conf
Step 8
------
conn vpc2-to-vpc1
type=tunnel
authby=secret
left=%defaultroute
leftid=<EIP2>
leftnexthop=%defaultroute
leftsubnet=<VPC2 CIDR>
right=<EIP1>
rightsubnet=<VPC1 CIDR>
pfs=yes
auto=start
Note the CIDR needs to include the block range. For example: 10.0.0.0/16
Step 9
------
sudo vi /etc/ipsec.d/vpc2-to-vpc1.secrets
Step 10
-------
<EIP2> <EIP1>: PSK "<TYPE THE SAME KEY FROM STEP 6 HERE>"
==================================================================================================================
Configuration in each region
==================================================================================================================
Step 11
-------
a-
sudo service ipsec start
b-
sudo chkconfig ipsec on
c-
sudo vi /etc/sysctl.conf
net.ipv4.ip_forward = 1
d-
sudo service network restart
==================================================================================================================
Test your connections
==================================================================================================================
Step 1 - Region 1
------
ping 172.0.0.50
Step 2 - Region 2
ping 10.0.0.50