AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • Global E-Commerce Platform
  • How It Works
  • Multi-Region Active/Active Architecture
  • Multi-Region Design Highlights
  • Benefits
  • Challenges
  • Services
  • Route 53
  • API Gateway
  • Application Load Balancer (ALB)
  • DynamoDB Global Tables
  • Aurora Global Database
  1. AWS Exploration
  2. Use Cases

Multi-Region Resiliency with Active-Active Setup

Global E-Commerce Platform

Imagine you have an e-commerce website that serves customers worldwide. To ensure high availability, low latency, and disaster recovery, you decide to implement an Active-Active AWS Architecture across multiple regions.

How It Works

  1. Duplicate Infrastructure in Two or More AWS Regions

    • Your application is deployed in Region A (e.g., US-East-1) and Region B (e.g., US-West-2).

    • Each region has EC2, ECS, RDS, DynamoDB, S3, API Gateway, and Lambda to handle requests.

  2. Traffic Distribution with Amazon Route 53

    • A global customer visits your website.

    • Amazon Route 53 (DNS) directs them to the closest and healthiest region (A or B) based on latency-based routing.

  3. Data Synchronization

    • If a user updates their shopping cart in Region A, changes must reflect in Region B.

    • You can achieve this via multi-region databases like DynamoDB Global Tables, Amazon Aurora Global Database, or data replication methods.

  4. Load Balancing and Auto Scaling

    • Application Load Balancers (ALB) + Auto Scaling Groups (ASG) ensure traffic is evenly distributed within each region.

    • If traffic spikes in one region, it can scale up automatically.

  5. Failover and Disaster Recovery

    • If Region A goes down (e.g., due to an outage), traffic is automatically rerouted to Region B via Route 53 health checks.

    • Since both regions are active, there is no downtime.

Multi-Region Active/Active Architecture

The following architecture demonstrates a Multi-Region active/active setup using AWS Regions as active sites. While the example shows two Regions, the architecture can scale to include more Regions.Comment

Multi-Region Design Highlights

  • Traffic Distribution: Route 53 ensures requests are routed based on latency or geolocation for optimal performance and compliance.

  • High Availability: Each Region operates independently, supporting both compute and database operations locally.

  • Low Latency

    • DynamoDB Global Tables handle local read/write operations in each Region.

    • Aurora Global Database ensures low-latency reads via replicas in secondary Regions.

  • Disaster Recovery: Supports active/active configuration for high resilience, with mechanisms to route traffic away from impacted Regions.

Benefits

  • Low Recovery Time Objective (RTO): Minimal downtime in case of failure.

  • Low Recovery Point Objective (RPO): Minimal data loss during recovery.

  • Global Low-Latency Access: Optimized for geographically distributed users.

  • Site Independence: Each Region operates independently, providing separation between sites.

Challenges

  • Increased Complexity: Managing data synchronization, traffic routing, and read/write patterns.

  • Higher Costs: Running active resources in multiple Regions.

Services

Route 53

  • Acts as the DNS service for highly available and scalable traffic routing.

  • Directs user requests to the appropriate API Gateway based on configured routing policies (e.g., latency or geolocation).

  • While failover routing is not explicitly configured in active-active setups, health checks, and Route 53's inherent traffic management ensure failover.

    • Route 53 Health Check with CloudWatch Alarm based on

      • API Gateway Metrics that monitor aggregated API Gateway performance metrics like 5XXError to detect high-level issues across all APIs.

      • CloudWatch Synthetic Canary for custom health check endpoints for each API behind the API Gateway


API Gateway

  • Serves as the primary entry point for application traffic in each Region.

  • Routes requests to

    1. AWS Lambda: For serverless workloads requiring minimal infrastructure management.

    2. Application Load Balancer (ALB): For workloads hosted on ECS Fargate.

  • Universal across Single-Region and Multi-Region Setups: The distinction between single-region and multi-region setups comes from how other AWS services (e.g., Route 53) are integrated with API Gateway to manage global traffic distribution and failover. These services add layers of functionality, but the API Gateway itself remains unchanged.


Application Load Balancer (ALB)

  • Distributes incoming traffic to ECS Fargate tasks within its Region.

  • Provides fault tolerance and scalability for containerized workloads.

  • Universal across Single-Region and Multi-Region Setups: The distinction between single-region and multi-region setups comes from how other AWS services (e.g., Route 53) are integrated with ALBs to manage global traffic distribution and failover. These services add layers of functionality, but the ALB itself remains unchanged.


DynamoDB Global Tables

  • Supports the Read-Local/Write-Local pattern, allowing each Region to handle reads and writes locally for low-latency access.

  • Data is asynchronously replicated across Regions to maintain eventual consistency.

  • Provides high availability and fault tolerance for distributed workloads.

  • Supports Read-Local/Write-Local Pattern: In this pattern, requests routed to a Region are handled entirely within that Region for both reads and writes. This approach minimizes latency and potential network errors.

    • DynamoDB global tables enable live data replication across Regions within seconds, supporting the read-local/write-local model. However, concurrent updates to the same item in different Regions may lead to write contention, with the most recent update prevailing (the last writer wins). If this behavior is unsuitable, alternative write strategies may be necessary.


Aurora Global Database

  • Implements the Read-Local/Write-Global pattern

    • Region 1 contains the primary cluster for global writes.

    • Region 2 hosts a read replica for low-latency reads.

  • Data replication between Regions occurs with a typical latency of less than a second.

  • Backups are maintained to guard against

    • Accidental deletions

    • Data corruption

  • Backups allow restoration to the last known good state.

  • Support Read-Local/Write-Global Pattern

    • Aurora Global Database provides a primary cluster for global writes and read-only replicas in other Regions. Using Aurora's write-forwarding feature, write requests from replicas are routed to the primary cluster over the AWS network, reducing latency.


PreviousUse CasesNextExploration Summary

Last updated 2 months ago