LiveChat Messenger
The client needed to create a reliable, high-available, scalable, and secure cloud infrastructure for their microservice application. They needed to support four environments for their development team, and automate builds and deployments. Additionally, the client needed to ensure secure access to inner resources for their Dev and QA engineers.
Our approach
To accomplish this, the Luneba Solutions team first analyzed and refactored their existing AWS infrastructure. We then designed a cloud infrastructure for their LiveChat Messenger application, using a hub-and-spoke network architecture.
The Luneba team created PowerShell scripts to cover separate deployment steps, allowing the client to easily deploy to multiple environments. We also utilized tools such as CloudFormation and SAM to manage the client’s infrastructure.
To ensure security, the Luneba team used VPC endpoints, a Client VPN, and a Transit Gateway to hide traffic from public access. They also utilized services such as CloudFormation, Serverless, API Gateway, Route 53, RDS with RDS Proxy, Secret Manager, Elastic Beanstalk Applications, ALB, AutoScaling Groups, EC2, Security Groups, CloudWatch, WAFv2, and VPC Endpoints.
The Transit Gateway proved to be an essential part of the network, allowing the team to easily connect multiple VPCs. This allowed the client to isolate their environments in different ways for added security. Additionally, the use of WAFv2 with a free but effective set of rules helped to further secure the infrastructure.
Business Needs
Create reliable, highly-available, scalable, and secure cloud infrastructure
Support four environments for the team
Be able to automate builds and deployments
Secure access to the inner resources for Dev and QA engineers
Luneba’s Proposed Solution
Analyze and refactor existing AWS infrastructure.
Design LiveChat Messenger cloud infrastructure.
Create PowerShell scripts that cover separate deployment steps, and deploy multiple environments.
Organize hub-and-spoke network architecture.
Use VPC endpoints, Client VPN, and Transit Gateway to hide traffic from public access.
Utilize such tools as CloudFormation and SAM.
Products Used
CF, Serverless, API Gateway, Route 53, RDS with RDS Proxy, Secret Manager, Elastic Beanstalk Applications, ALB, AutoScaling Groups, EC2, Security Groups, CloudWatch, WAFv2, Transit Gateway, Client VPN, VPC Endpoints.
Results
Luneba Solutions team was able to successfully create Development, Test, Staging, and Production environments for the client’s application.
Inner resources were hidden from public access, and the application was able to scale up and down as needed.
Luneba Solutions team was able to create a reliable and secure cloud infrastructure for the client’s microservice application.
Office
100 Meadowcreek Drive, #102, Corte Madera, CA, 94529