

This CloudFormation Template creates Application Load Balancer with Auto Scaling Group of Amazon Linux 2 (XXXXXXXXXXXXX) EC2 Instances which host Python Flask Web Application.ĮC2 instances are placed within WebServerSecurityGroup which allows http (80) connections only from ALBSecurityGroup, and allows tcp(3306) connections only within itself. Build an Application (Static Web Servers, ALB, Target Group)" in the article. For this, follow the commands in item: "6.2. cfn-template.yaml : In order to create an environment with CloudFormation Template.Ĭreate manually this enviroment above on your cloud provider.ddostest.sh : In order to create the test script.user-data.sh : If you create manually instance, to use in user-data.About aws-waf git hub repoĪws-waf repository root folder and terraform template folder contents are below: You can build the following environment with cloudformation template to perform the tests mentioned in the article. Create an Apache Web Server with a static website at EC2 consoleĢ.3.

Build an Application (Static Web Server, ALB, Target Group)Ģ.1. Mitigating attacks using AWS Shield StandartĦ.2. Then, we will examine and analyze the output on AWS WAF dashboard charts and CloudWatch.

We will create a test script and apply it on our web server that we build. We will mitigate an application layer DDoS attack on the web server that we build, by defining rules and then by creating rule groups with defined rules and later by associating them to Web ACLs, step by step. For this, we will build an Application consisting of Static Web Server (EC2 instance), Load Balancer, Target Group. We will create the necessary environment for WAF test. In this article, we will learn in detail about WAF, DDoS attacks, and Amazon WAF & Shield. There are codes and file about article of "How to secure our resources from DDoS attacks with AWS WAF & Shield?".
