To deploy Tanzu Operations Manager on AWS, you must follow the procedures in this topic to create the objects in the AWS Management Console that Tanzu Operations Manager requires. You can manually configure the Amazon Web Services (AWS) components that you need to deploy VMware Tanzu Operations Manager on AWS.
To view the list of AWS objects created by the procedures in this topic, see Required AWS Objects.
Log in to the AWS Management Console, and file a ticket with Amazon to ensure that your account can launch more than the default 20 instances. In the ticket, ask for these limits:
t3.micro
instancesc5.large
instancesYou can verify the limits on your account by visiting the EC2 Dashboard on the AWS Management Console and clicking Limits on the left navigation menu.
For specialized deployments:
To deploy to… | Instructions |
---|---|
AWS for US Gov | Log in to the AWS GovCloud (US) Console instead of the standard AWS Management Console. |
AWS China | Set up an AWS China account and contact the Platform Architect assigned for your account. |
S3 bucket names must be globally unique. When naming buckets, VMware recommends that you prefix the generic names below with an unique and easily identifiable string (For example, ID-STRING-pcf-ops-manager-bucket
, MY-IDENTIFIER-pcf-buildpacks-bucket
, and so on). Then you should use the same prefix when naming other associated resources, such as IAM policies.
Follow these steps to create five S3 buckets:
On the S3 Dashboard, click Create Bucket.
In Bucket name, enter ID-STRING-pcf-ops-manager-bucket
.
In AWS Region, select your region.
Click Create bucket.
Repeat these steps to create 4 more S3 buckets:
ID-STRING-pcf-buildpacks-bucket
ID-STRING-pcf-packages-bucket
ID-STRING-pcf-resources-bucket
ID-STRING-pcf-droplets-bucket
Follow these steps to create a Amazon Identity and Access Management (IAM) policy with the minimal permissions necessary to run and install Tanzu Operations Manager:
Click IAM to access the IAM Dashboard.
Click Policies and then click Create Policy.
Copy the policy document included in Tanzu Operations Manager for AWS Policy Document. You must edit the policy document so the names of the S3 buckets match the ones you created in Create S3 Buckets above.
Paste the policy document into the JSON tab on the Create policy page.
Click Next: Tags and click Next: Review.
In the Name text box, enter pcf-iam-policy
.
Click Create policy.
Follow these steps to create an Amazon Identity and Access Management (IAM) user or role with the minimal permissions necessary to run and install Tanzu Operations Manager:
VMware recommends that you use IAM roles instead of users for better security.
Click IAM to access the IAM Dashboard.
If you are configuring AWS access using an AWS instance profile, create an IAM role:
pcf-role
.If you are configuring AWS access using AWS keys, create an IAM user:
pcf-user
.In AWS access type, check the Access key - Programmatic access check box.
If you prefer to create your keys locally and import them into AWS, see the Amazon documentation.
Click Next: Permissions.
Click Download .csv to download the user security credentials.
The credentials.csv
contains the IDs for your user security access key and secret access key. Keep the credentials.csv
file for your currently active key pairs in a secure directory. You cannot recover a lost key pair.
Click Close.
Follow the AWS tutorial to create an elastic IP address, a VPC, and additional subnets. To access the tutorial, see the AWS documentation. Refer to the following table when configuring the VPC wizard fields and subnets.
VPC wizard field | Instructions |
---|---|
Resources to create | Select VPC and more |
Name tag | Enter pcf-vpc |
IPv4 CIDR block | Select IPv4 CIDR manual input |
IPv4 CIDR | Enter 10.0.0.0/16 |
IPv6 CIDR block | Select No IPv6 CIDR block |
Number of public subnets | Select 0 |
Number of private subnets | Select 0 |
For all other fields, accept the defaults.
Click Create VPC.
On the VPC dashboard, click Subnets, and then Create subnet.
In VPC ID, click the VPC that includes (pcf-vpc)
.
Add the following subnets. For each subnet, enter the Subnet name, Availability Zone, and IPv4 CIDR block. Then click Add new subnet to add the next subnet in the table:
Subnet name | Availability zone | IPv4 CIDR block |
---|---|---|
pcf-public-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.0.0/24 |
pcf-public-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.1.0/24 |
pcf-public-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.2.0/24 |
pcf-management-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.16.0/28 |
pcf-management-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.16.16/28 |
pcf-management-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.16.32/28 |
pcf-tas-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.4.0/24 |
pcf-tas-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.5.0/24 |
pcf-tas-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.6.0/24 |
pcf-services-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.8.0/24 |
pcf-services-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.9.0/24 |
pcf-services-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.10.0/24 |
pcf-rds-subnet-az0 |
REGION-#a (for example, us-west-2a ) |
10.0.12.0/24 |
pcf-rds-subnet-az1 |
REGION-#b (for example, us-west-2b ) |
10.0.13.0/24 |
pcf-rds-subnet-az2 |
REGION-#c (for example, us-west-2c ) |
10.0.14.0/24 |
Click Add new subnet.
On the VPC dashboard, click Internet gateways.
Click Create internet gateway.
In Name, enter pcf-internet-gateway
.
Click Create internet gateway.
In Actions, click Attach to VPC.
In Available VPCs, click the VPC that includes pcf-vpc
.
Click Attach internet gateway.
On the VPC dashboard, click NAT gateways.
Click Create NAT gateway.
In Name, enter pcf-nat-gateway
.
In Subnet, select the subnet that includes (pcf-public-subnet-az0)
.
Click Allocate Elastic IP.
Click Create NAT gateway.
On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter pcf-public-route-table
.
In VPC, click the VPC that includes (pcf-vpc)
.
Click Create route table.
0.0.0.0/0
.(pcf-internet-gateway)
.Click the Subnet associations tab.
pcf-public-subnet-az0
, pcf-public-subnet-az1
, and pcf-public-subnet-az2
.On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter pcf-management-route-table
.
(pcf-vpc)
.In the Routes section, click Edit routes.
0.0.0.0/0
.(pcf-nat-gateway)
.Click the Subnet associations tab.
pcf-management-subnet-az0
, pcf-management-subnet-az1
, pcf-management-subnet-az2
, pcf-tas-subnet-az0
, pcf-tas-subnet-az1
, pcf-tas-subnet-az2
, pcf-services-subnet-az0
, pcf-services-subnet-az1
, and pcf-services-subnet-az2
.Return to the EC2 Dashboard.
Click Security Groups, then Create Security Group.
In Security group name, enter pcf-ops-manager-security-group
.
In Description, enter a description to identify this security group.
In VPC, click the VPC in which you want to deploy Tanzu Operations Manager.
In the Inbound rules section, add rules using the information in the following table.
VMware recommends limiting access to Tanzu Operations Manager to IP ranges within your organization, but you might reduce the IP restrictions after configuring authentication for Tanzu Operations Manager.
Type | Protocol | Port range | Source | |
---|---|---|---|---|
HTTP | TCP | 80 | My IP | |
HTTPS | TCP | 443 | My IP | |
SSH | TCP | 22 | My IP | |
Custom TCP (BOSH Agent) | TCP | 6868 | Custom | 10.0.0.0/16 |
Custom TCP (BOSH Director) | TCP | 25555 | Custom | 10.0.0.0/16 |
Click Create security group.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-vms-security-group
.
In Description, enter a description to identify this security group.
In VPC, click the VPC where you want to deploy the BOSH-deployed VMs.
In the Inbound rules section, add rules for all traffic from your public and private subnets to your private subnet, as shown in the table. This rule configuration does the following:
Type | Protocol | Port range | Source | |
---|---|---|---|---|
All traffic | All | All | Custom | 10.0.0.0/16 |
Custom TCP rule | TCP | 2222 | Anywhere-IPv4 | 0.0.0.0/0 |
Click Create security group.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-web-elb-security-group
.
In the Description text box, enter a description to identify this security group.
In VPC, click the VPC where you want to deploy this Elastic Load Balancer (ELB).
In the Inbound rules section, add rules to allow traffic to ports 80
, 443
, and 4443
from 0.0.0.0/0
, as shown in the table.
Allow traffic to port 4443
only if you are in an AWS cloud region that does not support AWS ALBs. For example, the GovCloud region. For more information about AWS regions and availability zones, see AWS Global Infrastructure.
For finer control over what can reach TAS for VMs, change 0.0.0.0/0
to be more restrictive. This security group governs external access to TAS for VMs from apps such as the cf CLI and app URLs.
Type | Protocol | Port range | Source | |
---|---|---|---|---|
Custom TCP | TCP | 4443 | Anywhere-IPv4 | 0.0.0.0/0 |
HTTP | TCP | 80 | Anywhere-IPv4 | 0.0.0.0/0 |
HTTPS | TCP | 443 | Anywhere-IPv4 | 0.0.0.0/0 |
Click Create security group.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-tcp-elb-security-group
.
In Description text box, enter a description to identify this security group.
In VPC, click the VPC in which you want to deploy this ELB.
In the Inbound rules section, add the following rule:
Type | Protocol | Port range | Source | |
---|---|---|---|---|
Custom TCP rule | TCP | 1024 - 1123 | Anywhere-IPv4 | 0.0.0.0/0 |
Click Create security group.
If you plan to use an internal database, skip this step. If you are using RDS, you must configure a security group that enables the Tanzu Operations Manager VM and BOSH Director VM to access the database.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter pcf-mysql-security-group
.
In Description text box, enter a description to identify this security group.
In VPC, click the VPC where you want to deploy MySQL.
In the Inbound rules section, add a rule of type MySQL and specify the subnet of your VPC in Source, as shown in the table.
Type | Protocol | Port range | Source | |
---|---|---|---|---|
MYSQL/Aurora | TCP | 3306 | Custom | 10.0.0.0/16 |
In the Outbound rules section, add a rule of type All traffic
and specify the subnet of your VPC in Destination, as shown in the table.
Type | Protocol | Port range | Source | |
---|---|---|---|---|
All traffic | All | All | Custom | 10.0.0.0/16 |
Click Create security group.
Proceed to the next step, Deploying Tanzu Operations Manager on AWS.