VPC only.<your-vpc-name>.10.0.0.0/16.No IPv6 CIDR block.Default.

Enable DNS hostnames.
Enable DNS resolution.
Click Create VPC.
Go to Internet Gateway section and create an Internet Gateway.
Attach the Internet Gateway to <your-vpc-name>.

| Subnet | Name | AZ | CIDR |
|---|---|---|---|
| Public Subnet 1 | <your-public-subnet-1-name> | us-east-1a | 10.0.0.0/18 |
| Public Subnet 2 | <your-public-subnet-2-name> | us-east-1b | 10.0.64.0/18 |
| Private Subnet 1 | <your-private-isolated-subnet-1-name> | us-east-1a | 10.0.128.0/18 |
| Private Subnet 2 | <your-private-isolated-subnet-2-name> | us-east-1b | 10.0.192.0/18 |

<your-public-route-table-name>.0.0.0.0/0 - <your-internet-gateway-id>.10.0.0.0/18 and 10.0.64.0/18 subnets.<your-isolated-route-table-name>.10.0.0.0/16 in isolated route table.10.0.128.0/18 and 10.0.192.0/18 subnets.

<your-alb-security-group-name>.HTTP, port 80, source pl-3b927c52. pl-3b927c52 is public endpoint from CloudFront, this mean alb only allow inboud traffic from cloudfront.

<your-backend-service-security-group-name>.Custom TCP, port 8080, source <your-alb-security-group-id>.

<your-database-security-group-name>.PostgreSQL, port 5432, source <your-backend-service-security-group-id>.

Edit outbound rules of <your-alb-security-group-name>.
Enter Outbound rule: Custom TCP, port 8080, destination <your-backend-service-security-group-id>.

Keep outbound rule of backend and database security groups as All traffic.

10.0.0.0/16.0.0.0.0/0 - <your-internet-gateway-id>.80), ALB - backend (8080), backend - database (5432).10.0.0.0/16truetrue10.0.0.0/18 in us-east-1a10.0.64.0/18 in us-east-1b10.0.128.0/18 in us-east-1a10.0.192.0/18 in us-east-1b0.0.0.0/0 - <your-internet-gateway-id>pl-3b927c5280805432