VPCs

AWS Virtual Private Cloud (VPC) is an isolated virtual network in AWS. This virtual network enables MeBeFake to manage the resources allocation inside the established VPCs including implementing a secure access between MeBeFake and AWS data centres.

MeBeFake’s strategy on VPC is to utilise the Multi-VPC approach. This approach enables MeBeFake to set isolated boundaries based on core services being provided. This effectively establishes VPC as a foundational platform in the MeBeFake SRE-Managed AWS platform of which workloads will be placed into.

The VPC structure is outlined as follows:

VPC Name Description TransitGateway Interconnect
Production (PRD) A VPC containing the Visy production and UAT environments Yes

Development

(DEV)

A VPC containing MeBeFake’s development and test

environments

Yes

Shared Services

(SHARE)

A VPC containing MeBeFake’s SRE shared services

that hosts MeBeFake’s CI/CD framework and other

services such as ActiveDirectory

Yes

Security

Operations

(SecOps)

A VPC that is used for SRE Management and Audit

Operational Services. This VPC also provides

centralised management services.

No

An AWS Virtual Private Cloud (VPC) allows an isolated virtual network created in AWS. The address range is allocated per RFC1918 with the largest address range for a VPC being a /16 subnet. Inside a VPC, subnets are deployed in multiple availability zones (AZs) to provide support for a highly available applications architecture. Multiple subnets are required to separate public, private and protected subnets.

The following table highlights the network allocation for each VPC in-scope for the MeBeFake SRE- Managed AWS Platform.

Region VPC Network CIDR Mask Usable IP’s
Sydney PRD 10.92.0.0 /18 16378
DEV 10.92.64.0 /18 16378
SHARE 10.92.128.0 /18 16378
SecOps 10.92.192.0 /18 16378