This topic describes how to manually configure the Amazon Web Services (AWS) components that you need to deploy VMware Tanzu Operations Manager (Ops Manager) on AWS.
To deploy Ops Manager on AWS, you must perform the procedures in this topic to create the objects in the AWS Management Console that Ops Manager requires.
To view the list of AWS objects created by the procedures in this topic, see Required AWS Objects.
To prepare Ops Manager for deployment with AWS:
After completing the procedures in this topic, proceed to Deploying Ops Manager on AWS to continue deploying Ops Manager.
Log in to the AWS Management Console, and file a ticket with Amazon to ensure that your account can launch more than the default 20 instances. In the ticket, ask for a limit of 50 t3.micro
instances and 20 c5.large
instances in the region you are using.
Note: To deploy Ops Manager to AWS GovCloud (US), log in to the AWS GovCloud (US) Console instead of the standard AWS Management Console.
Note: To deploy Ops Manager to AWS China, set up an AWS China account and contact the Platform Architect assigned for your account.
You can check the limits on your account by visiting the EC2 Dashboard on the AWS Management Console and clicking Limits on the left navigation menu.
Note:S3 bucket names must be globally unique. When naming buckets, VMware recommends that you prefix the generic names below with an unique and helpfully identifiable string (i.e. ID-STRING-pcf-ops-manager-bucket, MY-IDENTIFIER-pcf-buildpacks-bucket, and so on). Then you should use the same prefix when naming other associated resources, such as IAM policies.
Perform the following steps to create five S3 buckets:
On the S3 Dashboard, click Create Bucket.
In Bucket name, enter ID-STRING-pcf-ops-manager-bucket
.
In AWS Region, select your region.
Click Create bucket.
Repeat these steps to create four more S3 buckets:
ID-STRING-pcf-buildpacks-bucket
ID-STRING-pcf-packages-bucket
ID-STRING-pcf-resources-bucket
ID-STRING-pcf-droplets-bucket
Perform the following steps to create a Amazon Identity and Access Management (IAM) policy with the minimal permissions necessary to run and install Ops Manager:
Click IAM to access the IAM Dashboard.
Click Policies and then click Create Policy.
Copy the policy document included in Ops Manager for AWS Policy Document. You must edit the policy document so the names of the S3 buckets match the ones you created in Create S3 Buckets above.
Paste the policy document into the JSON tab on the Create policy page.
Click Next:Tags and click Next:Review.
In the Name field, enter pcf-iam-policy
.
Click Create policy.
Perform the following steps to create an Amazon Identity and Access Management (IAM) user or role with the minimal permissions necessary to run and install Ops Manager:
Note: VMware recommends that you use IAM roles instead of users to improve security.
Click IAM to access the IAM Dashboard.
If you are configuring AWS access using an AWS instance profile, create an IAM role:
pcf-role
.If you are configuring AWS access using AWS keys, create an IAM user:
pcf-user
.In AWS access type, check the Access key - Programmatic access check box.
Note: If you prefer to create your keys locally and import them into AWS, see the [Amazon documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html).
Click Next: Permissions.
Click Download .csv to download the user security credentials.
<p class="note caution"><strong>Caution:</strong> The <code>credentials.csv</code> contains the IDs for your user security access key and secret access key. Keep the <code>credentials.csv</code> file for your currently active key pairs in a secure directory. You cannot recover a lost key pair.</p>
Click Close.
Follow the AWS tutorial to create an elastic IP address, a VPC, and additional subnets. To access the tutorial, see the AWS documentation. Refer to the following table when configuring the VPC wizard fields and subnets.
VPC Wizard Field | Instructions |
---|---|
Resources to create | Select VPC and more |
Name tag | Enter pcf-vpc |
IPv4 CIDR block | Select IPv4 CIDR manual input |
IPv4 CIDR | Enter 10.0.0.0/16 |
IPv6 CIDR block | Select No IPv6 CIDR block |
Number of public subnets | Select 0 |
Number of private subnets | Select 0 |
Click Create VPC.
On the VPC dashboard, click Subnets, and then Create subnet.
In VPC ID, select the VPC that includes (pcf-vpc)
.
Add the following subnets. For each subnet, enter the Subnet name, Availability Zone, and IPv4 CIDR block. Then click Add new subnet to add the next subnet in the table:
Subnet name | Availability Zone | IPv4 CIDR block |
---|---|---|
pcf-public-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.0.0/24 |
pcf-public-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.1.0/24 |
pcf-public-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.2.0/24 |
pcf-management-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.16.0/28 |
pcf-management-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.16.16/28 |
pcf-management-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.16.32/28 |
pcf-tas-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.4.0/24 |
pcf-tas-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.5.0/24 |
pcf-tas-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.6.0/24 |
pcf-services-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.8.0/24 |
pcf-services-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.9.0/24 |
pcf-services-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.10.0/24 |
pcf-rds-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.12.0/24 |
pcf-rds-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.13.0/24 |
pcf-rds-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.14.0/24 |
Click Add new subnet.
On the VPC dashboard, click Internet gateways.
Click Create internet gateway.
In Name tag, enter pcf-internet-gateway
.
Click Create internet gateway.
In Actions, click Attach to VPC.
In Available VPCs, select the VPC that includes pcf-vpc
.
Click Attach internet gateway.
On the VPC dashboard, click NAT gateways.
Click Create NAT gateway.
In Name, enter pcf-nat-gateway
.
In Subnet, select the subnet that includes (pcf-public-subnet-az0)
.
Click Allocate Elastic IP.
Click Create NAT gateway.
On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter pcf-public-route-table
.
In VPC, select the VPC that includes (pcf-vpc)
.
Click Create route table.
0.0.0.0/0
.(pcf-internet-gateway)
.\Click the Subnet associations tab.
pcf-public-subnet-az0
, pcf-public-subnet-az1
, and pcf-public-subnet-az2
.On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter pcf-management-route-table
.
(pcf-vpc)
.In the Routes section, click Edit routes.
0.0.0.0/0
.(pcf-nat-gateway)
.Click the Subnet associations tab.
pcf-management-subnet-az0
, pcf-management-subnet-az1
, pcf-management-subnet-az2
, pcf-tas-subnet-az0
, pcf-tas-subnet-az1
, pcf-tas-subnet-az2
, pcf-services-subnet-az0
, pcf-services-subnet-az1
, and pcf-services-subnet-az2
.Return to the EC2 Dashboard.
Select Security Groups>Create Security Group.
In Security group name, enter pcf-ops-manager-security-group
.
In Description, enter a description to identify this security group.
In VPC, select the VPC in which you want to deploy Ops Manager.
In the Inbound rules section, add rules using the information in the table below.
Note: VMware recommends limiting access to Ops Manager to IP ranges within your organization, but you may relax the IP restrictions after configuring authentication for Ops Manager.
Type | Protocol | Port Range | Source | |
---|---|---|---|---|
HTTP | TCP | 80 | My IP | |
HTTPS | TCP | 443 | My IP | |
SSH | TCP | 22 | My IP | |
Custom TCP (BOSH Agent) | TCP | 6868 | Custom | 10.0.0.0/16 |
Custom TCP (BOSH Director) | TCP | 25555 | Custom | 10.0.0.0/16 |
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-vms-security-group
.
In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy the BOSH-deployed VMs.
In the Inbound rules section, add rules for all traffic from your public and private subnets to your private subnet, as shown in the table. This rule configuration does the following:
Type | Protocol | Port Range | Source | |
---|---|---|---|---|
All traffic | All | All | Custom | 10.0.0.0/16 |
Custom TCP rule | TCP | 2222 | Anywhere-IPv4 | 0.0.0.0/0 |
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-web-elb-security-group
.
In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy this Elastic Load Balancer (ELB).
In the Inbound rules section, add rules to allow traffic to ports 80
, 443
, and 4443
from 0.0.0.0/0
, as shown in the table.
Note: Allow traffic to port `4443` only if you are in an AWS cloud region that does not support AWS ALBs. For example, the GovCloud region. For more information about AWS regoins and availability zones, see AWS Global Infrastructure.
Note: For finer control over what can reach TAS for VMs, change 0.0.0.0/0
to be more restrictive. This security group governs external access to TAS for VMs from apps such as the cf CLI and app URLs.
Type | Protocol | Port Range | Source | |
---|---|---|---|---|
Custom TCP | TCP | 4443 | Anywhere-IPv4 | 0.0.0.0/0 |
HTTP | TCP | 80 | Anywhere-IPv4 | 0.0.0.0/0 |
HTTPS | TCP | 443 | Anywhere-IPv4 | 0.0.0.0/0 |
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-tcp-elb-security-group
.
In Description, enter a description to identify this security group.
In VPC, select the VPC in which you want to deploy this ELB.
In the Inbound rules section, add the following rule:
Type | Protocol | Port Range | Source | |
---|---|---|---|---|
Custom TCP rule | TCP | 1024 - 1123 | Anywhere-IPv4 | 0.0.0.0/0 |
Click Create security group.
Note: If you plan to use an internal database, skip this step. If you are using RDS, you must configure a security group that enables the Ops Manager VM and BOSH Director VM to access the database.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-mysql-security-group
.
In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy MySQL.
In the Inbound rules section, add a rule of type MySQL
and specify the subnet of your VPC in Source, as shown in the table.
Type | Protocol | Port Range | Source | |
---|---|---|---|---|
MYSQL/Aurora | TCP | 3306 | Custom | 10.0.0.0/16 |
In the Outbound rules section, add a rule of type All traffic
and specify the subnet of your VPC in Destination, as shown in the table.
Type | Protocol | Port Range | Destination | |
---|---|---|---|---|
All traffic | All | All | Custom | 10.0.0.0/16 |
Click Create security group.
Proceed to the next step, Deploying Ops Manager on AWS.