<aside> 🤔
Before going to Step 2 & 3
This project will try to implement the EKS cluster to be fully private (no public cluster endpoints, only private) → the cluster API server can only be accessible outside the VPC through a SSM bastion host inside the same VPC
Instead of placing the bastion host in a public subnet, we can use SSM Session Manager to SSH into that host BUT in a private subnet, reducing public availability. There are two ways to connect the private bastion host to AWS services on the Internet: NAT Gateway and VPC Endpoints
https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html#private-access
</aside>
From the console, create a VPC (I prefer no subnet option for easy customization)
Create the subnets for the VPC:

Create an Internet Gateway, then attach it to the VPC
Create a NAT Gateway:
Create the route tables, associate them with the correct subnets
The VPC should look something like this after the initial setup:
