DEV Community

Cover image for How to deploy a static website on a PRIVATE S3 bucket served by CloudFront on a custom domain name.
Raji Risikat Yewande
Raji Risikat Yewande

Posted on

How to deploy a static website on a PRIVATE S3 bucket served by CloudFront on a custom domain name.

Scenario:

You're assigned a task to create an S3 bucket, with a time stamp to ensure it's unique, enable static website hosting, whilst the bucket must be private. Explore Cloudfront to privately expose your index.html file in your S3 bucket, and ensure it's accessible via a secured custom domain name.

Essentials:

  • An AWS Account.
  • Be logged in an IAM user with Admin priviledges.
  • Files for the static website
  • A custom domain name.
    • If you dont have, get a free domain name from freenom
      Deployment architecture.
      Figure 1: Cloudfront and S3 Deployment Architecture

Figure 1 explains the deployment architecture.

  • A Private Amazon S3 bucket containing files for the static website to be hosted
  • CloudFront caches the S3 private pages and distributes the content to its default URL
  • CloufFront is linked to the custom domain name(wandexdev.me) via Hosted zone in Route 53.
  • The connection is secured via SSL and Certificate Mangaer
  • Users can access the static website by simply navigating the custom domain name(wandexdev.me)

Steps to achieve the setup

Step 1: Create an S3 bucket with private Access

  • Navigate to your home console on your aws account, select Northern Virginia (us-east-1) as your region. This is optional and done to stay within the free tier limits of the aws account
  • Move to the S3 console either by searching for S3 in the search bar or by clicking S3 in 'recently visited services'
  • Select create Bucket in Figure 2 below.
    Create Bucket.
    Figure 2: Create a bucket in S3 console
  • Set up Bucket Configuration. Refer to figures 3, 4, 5
    • Give a bucket name. The name has to be unique, no spaces or uppercase letters present, avoid using dots(.), hyphens(-) are more welcome. Using Timestamps helps relieve the stress.
    • Region is US East (N. Virginia) as previously mentioned
    • Leave Object Ownership as default
      Bucket Details
      Figure 3: Bucket Name, Region and Object Ownership
    • Leave Public Access blocked as we want our bucket private
    • Enable Versioning if you would like to still make changes to the static files you're about to upload but still have older versions uploaded, keep it Disabled if not.
    • Tags are not neccessary for this simple static website demo
    • Server-side Encryption is automatically applied so we leave encryption to default 'Amazon S3-managed keys'. The Encryption enables S3 encrypt objects before saving it and decrypts it when downloaded. Encryption doesn't change the way that you access data as an authorized user.
    • Disable Bucket key as we are not using KMS encryption click on Create bucket
      Bucket Details
      Figure 4: Public Access, Bucket Versioning and Encryption
      • Observe and verify new bucket details (name, region, bucket access etc) and ensure no error was made
        Bucket Details
        Figure 5: New Bucket details

Step 2: Upload static website files into S3 bucket created.

  • Select the bucket name just created
  • Select Upload, then select add files
  • Add all files needed to run the static website from your local device
    Upload Details
    Figure 6: Pre Upload Details
  • Leave other options at default
  • Select Upload
    Upload Details
    Figure 7: Uploaded Bucket Details

Step 3: Enable Static Website Hosting

  • Select Bucket name, then Properties
  • Move down to the very last option 'static website hosting' and select Edit
    Web Static Hosting
    Figure 8: Static Website Hosting Section
  • Select Enable and a new interface shows.
  • Select host static website. A Static website is made up of individual webpages that contain static / unchaging content. Enabling your S3 bucket as a static website mean the website is available at the specific AWS Region website endpoint of the S3 bucket.
  • Specify the home page of the website files i.e index.html
  • Save changes
  • Success message
    Web Static Hosting
    Figure 9: Successfully Enabled

Step 4: Set up Hosted Zone and name servers in Route 53

  • Move to the route 53 console either by searching for Route 53 in the search bar or by clicking Route 53 in 'recently visited services'
  • Click create hosted zone
  • Input your custom Domain name in the Domain name field
  • Select Public hosted zone as Type
    Hosted zone
    Figure 10: Hosted Zone Created in Route 53
  • Click on the hosted zone. The ns- values under the Value/Route traffic to are called name servers
    • To link custom domain name with route 53, the name servers from route 53 have to be updated on custom domain name provider's management.
    • The name servers generally tell the domain name to redirect requests to it.
      Name Servers
      Figure 11: List of Name servers generated
  • Switch to a new tab in your browser (do not close the Route 53 page with the nameservers), log in your custom domain provider's site and add name servers
    • Mine is namecheap.com, log in, select domain list, then manage
    • Navigate to custom DNS, select add name server and add all four name servers from Route 53 without the last dots!(.)
    • Save changes
      Name Servers
      Figure 12: Name servers in Domain Providers site

Step 5: Set up an SSL certificate via the AWS Certificate Manager

  • Setting up an SSL certificate ensures CloudFront custom domain with SSL is secured.
  • Move to the Certificate Manager console either by searching for Certificate Manager in the search bar or by clicking Certificate Manager in 'recently visited services'
  • Select Request a public certificate and then Request a certificate.
  • Input your custom Domain name i.e wandexdev.me
  • Choose DNS validation as method of validation.
  • Select next till you can confirm and request certificate
  • It then displays 'pending validation' on next page. This would be fixed by linking the certificate with Route 53
  • Click Certificate ID
  • Next click on Create record in Route 53 button under Domains.
    SSL Cetificate
    Figure 13: Link Pending SSL Certificate with Route 53
  • click create records
  • Certificate Manager takes a while before certificate is issued so please be patient.
    SSL Cetificate
    Figure 14: Issued SSL Certificate
  • Once certificate is issued, CloudFront Distribution can be set up.

Step 6: Set up CloudFront Distribution

  • Move to the CloudFront console either by searching for CloudFront in the search bar or by clicking CloudFront in 'recently visited services'
  • Select create Cloudfront distribution in Figure 15 below.
    CloudFront
    Figure 15: Create CloudFront Distribution
  • Click on Origin domain and select the name of S3 bucket created from drop down list i.e wandebucket-0432pm.s3.amazonaws.com. Its simply the source from which CloudFront caches from.
  • Origin Name automatically fills up
  • Select Legacy access identities for Origin access. Origin Access is mainly for restricting access of a S3 bucket to only authenticated requests from CloudFront. An OAI(Origin Access Identity) would be used to do this
  • Select Create new OAI
    • An autogenerated name shows in the prompt, click create
      Cloudfront
      Figure 16: Origin Access Identity (OAI)
    • Select yes, update bucket policy as in Figure 17 below
      CloudFront
      Figure 17: CloudFront Configuration
      CloudFront
      Figure 18: CloudFront Configuration
  • Select to Redirect HTTP to HTTPs
  • Scroll down to Alternate Domain Name (CNAMEs) under Settings section then type in your custom domain name i.e wandexdev.me
  • Still under settings, select the drop down list for Custom SSl certificate and select your issued certificate for your domain name.

    CloudFront

    Figure 19: CloudFront Configuration
  • Scroll to Default root object and write index.html in the box
  • Create distribuition
  • The Distribution takes a while to deploy so be patient
    • Once provisioned, status changes to deployed and state turns Enabled.

Step 7: Link Custom domain with CloudFront via Alias in Route 53

  • Move to the route 53 console either by searching for Route 53 in the search bar or by clicking Route 53 in 'recently visited services'
  • Select your domain name in Hosted zone
  • Click Create record, choose Simple routing, turn Alias on.
  • Select the drop down menu at Route Traffic to and choose Alias to CloudFront distribution
  • Click drop down list and select cloudfront distridution
    Alias Record
    Figure 20: Create an Alias Record for CloudFront
  • Wait a few minutes for the DNS records to be updated
  • Type in your custom domain name in a browser and you would see your static website ONLY distributed and accesible via by cloudfront. Here's mine!!
    My Chess Static website
    Figure 21: Final Output showing my static website

Remarks

  • I hope you found this guide helpful and as enjoyable as I enjoyed making it. Ask me questions in the comment section and I'll surely respond.
  • I used app.diagram to draw my architechture diagram and its free!
  • Please dont forget to delete all AWS resources provided after youre done. Staying within the free tier limits is low cost friendly

Top comments (6)

Collapse
 
moriam_raji_08436b3381718 profile image
Moriam

Awesome! This is really detailed and helpful 👍🏾

Collapse
 
wandexdev profile image
Raji Risikat Yewande

I'm glad I could be of help

Collapse
 
raj_ford_ profile image
Akorede

This was really helpful for me, thank you👍🏾

Collapse
 
wandexdev profile image
Raji Risikat Yewande

I'm glad it was.

Collapse
 
sekinat_raji_ecb2912b13e4 profile image
Sekinat Raji

Such a good read!Thank you for this

Collapse
 
wandexdev profile image
Raji Risikat Yewande

You're welcome