The article discusses setting up a WireGuard VPN at AWS with Terraform.
Two ways to access internal AWS VPC resources for the team are through using a Bastion/Jump Host and through a Private VPN, where WireGuard is chosen as the VPN solution for its convenience.
The article prepares the initial Terraform and generates key pairs for the server and peer clients.
A WireGuard setup script is created to be run during EC2 creation.
Ubuntu AMI, Security Group, and Elastic IP are then setup to create the WireGuard server.
A client configuration is then generated using a client-conf template and checked for VPN connection.
The article discusses adding clients which involves generating a new key pair, updating the secrets.yaml file, and running Terraform apply again.
The article concludes by highlighting that with WireGuard, a cheap and fast VPN setup can be created to access internal AWS VPC resources along with different client configurations.
The source files for the article can be accessed via the attached link.