Preparing to Deploy Ops Manager on AWS
- Overview of Deploying on AWS
- File a Ticket
- Create S3 Buckets
- Create a Policy for Ops Manager
- Create an IAM Role or User for Ops Manager
- Create a VPC
- Create an Internet Gateway
- Create a NAT Gateway
- Create Route Table for Public Subnets
- Create Route Table for Remaining Subnets
- Configure a Security Group for Ops Manager
- Configure a Security Group for BOSH-Deployed VMs
- Configure a Security Group for the Web ELB
- Configure a Security Group for the TCP ELB
- Configure a Security Group for MySQL
- Next Step
Page last updated:
This topic describes how to manually configure the Amazon Web Services (AWS) components that you need to deploy VMware Tanzu Operations Manager (Ops Manager) on AWS.
Overview of Deploying on AWS
To deploy Ops Manager on AWS, you must perform the procedures in this topic to create the objects in the AWS Management Console that Ops Manager requires.
To view the list of AWS objects created by the procedures in this topic, see Required AWS Objects.
To prepare Ops Manager for deployment with AWS:
After completing the procedures in this topic, proceed to Deploying Ops Manager on AWS to continue deploying Ops Manager.
File a Ticket
Log in to the AWS Management Console, and file a ticket with Amazon to ensure that your account can launch more than the default 20 instances. In the ticket, ask for a limit of 50 t3.micro
instances and 20 c5.large
instances in the region you are using.
Note: To deploy Ops Manager to AWS GovCloud (US), log in to the AWS GovCloud (US) Console instead of the standard AWS Management Console.
Note: To deploy Ops Manager to AWS China, set up an AWS China account and contact the Platform Architect assigned for your account.
You can check the limits on your account by visiting the EC2 Dashboard on the AWS Management Console and clicking Limits on the left navigation menu.
Create S3 Buckets
Note:S3 bucket names must be globally unique. When naming buckets, VMware recommends that you prefix the generic names below with an unique and helpfully identifiable string (i.e. ID-STRING-pcf-ops-manager-bucket, MY-IDENTIFIER-pcf-buildpacks-bucket, and so on). Then you should use the same prefix when naming other associated resources, such as IAM policies.
Perform the following steps to create five S3 buckets:
On the S3 Dashboard, click Create Bucket.
In Bucket name, enter
ID-STRING-pcf-ops-manager-bucket
.In AWS Region, select your region.
Click Create bucket.
Repeat these steps to create four more S3 buckets:
ID-STRING-pcf-buildpacks-bucket
ID-STRING-pcf-packages-bucket
ID-STRING-pcf-resources-bucket
ID-STRING-pcf-droplets-bucket
Create a Policy for Ops Manager
Perform the following steps to create a Amazon Identity and Access Management (IAM) policy with the minimal permissions necessary to run and install Ops Manager:
Click IAM to access the IAM Dashboard.
Click Policies and then click Create Policy.
Copy the policy document included in Ops Manager for AWS Policy Document. You must edit the policy document so the names of the S3 buckets match the ones you created in Create S3 Buckets above.
Paste the policy document into the JSON tab on the Create policy page.
Click Next:Tags and click Next:Review.
In the Name field, enter
pcf-iam-policy
.Click Create policy.
Create an IAM Role or User for Ops Manager
Perform the following steps to create an Amazon Identity and Access Management (IAM) user or role with the minimal permissions necessary to run and install Ops Manager:
Note: VMware recommends that you use IAM roles instead of users to improve security.
Click IAM to access the IAM Dashboard.
If you are configuring AWS access using an AWS instance profile, create an IAM role:
- Click Roles and then click Create role.
- On the Create role page, set:
- Role type: AWS service
- Use case: EC2
- Click Next.
- On the Add permissions page, enter the name of the policy you created in the Permission policies search box. Select the check box next to the policy in the search results.
- Click Next.
- On the Name, review, and create page, enter a role name. For example, enter
pcf-role
. - Click Create role.
If you are configuring AWS access using AWS keys, create an IAM user:
- Click Users and then click Add users.
- Enter a username. For example, enter
pcf-user
. In AWS access type, check the Access key - Programmatic access check box.
Note: If you prefer to create your keys locally and import them into AWS, see the [Amazon documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html).
Click Next: Permissions.
Click the Attach existing policies directly tab.
In the Filter policies search box, enter the name of the policy you created. Then check the check box next to the policy in the search results.
Click Next: Tags, and then click Next: Review.
Click Create user.
Click Download .csv to download the user security credentials.
Warning: The
credentials.csv
contains the IDs for your user security access key and secret access key. Keep thecredentials.csv
file for your currently active key pairs in a secure directory. You cannot recover a lost key pair.Click Close.
Create a VPC
Follow the AWS tutorial to create an elastic IP address, a VPC, and additional subnets. To access the tutorial, see the AWS documentation. Refer to the following table when configuring the VPC wizard fields and subnets.
VPC Wizard Field Instructions Resources to create Select VPC and more
Name tag Enter pcf-vpc
IPv4 CIDR block Select IPv4 CIDR manual input
IPv4 CIDR Enter 10.0.0.0/16
IPv6 CIDR block Select No IPv6 CIDR block Number of public subnets Select 0 Number of private subnets Select 0
For all other fields, accept the defaults.Click Create VPC.
On the VPC dashboard, click Subnets, and then Create subnet.
In VPC ID, select the VPC that includes
(pcf-vpc)
.Add the following subnets. For each subnet, enter the Subnet name, Availability Zone, and IPv4 CIDR block. Then click Add new subnet to add the next subnet in the table:
Subnet name Availability Zone IPv4 CIDR block pcf-public-subnet-az0
REGION-#a
(for example,us-west-2a
)10.0.0.0/24
pcf-public-subnet-az1
REGION-#b
(for example,us-west-2b
)10.0.1.0/24
pcf-public-subnet-az2
REGION-#c
(for example,us-west-2c
)10.0.2.0/24
pcf-management-subnet-az0
REGION-#a
(for example,us-west-2a
)10.0.16.0/28
pcf-management-subnet-az1
REGION-#b
(for example,us-west-2b
)10.0.16.16/28
pcf-management-subnet-az2
REGION-#c
(for example,us-west-2c
)10.0.16.32/28
pcf-tas-subnet-az0
REGION-#a
(for example,us-west-2a
)10.0.4.0/24
pcf-tas-subnet-az1
REGION-#b
(for example,us-west-2b
)10.0.5.0/24
pcf-tas-subnet-az2
REGION-#c
(for example,us-west-2c
)10.0.6.0/24
pcf-services-subnet-az0
REGION-#a
(for example,us-west-2a
)10.0.8.0/24
pcf-services-subnet-az1
REGION-#b
(for example,us-west-2b
)10.0.9.0/24
pcf-services-subnet-az2
REGION-#c
(for example,us-west-2c
)10.0.10.0/24
pcf-rds-subnet-az0
REGION-#a
(for example,us-west-2a
)10.0.12.0/24
pcf-rds-subnet-az1
REGION-#b
(for example,us-west-2b
)10.0.13.0/24
pcf-rds-subnet-az2
REGION-#c
(for example,us-west-2c
)10.0.14.0/24
Click Add new subnet.
Create an Internet Gateway
On the VPC dashboard, click Internet gateways.
Click Create internet gateway.
In Name tag, enter
pcf-internet-gateway
.Click Create internet gateway.
In Actions, click Attach to VPC.
In Available VPCs, select the VPC that includes
pcf-vpc
.Click Attach internet gateway.
Create a NAT Gateway
On the VPC dashboard, click NAT gateways.
Click Create NAT gateway.
In Name, enter
pcf-nat-gateway
.In Subnet, select the subnet that includes
(pcf-public-subnet-az0)
.Click Allocate Elastic IP.
Click Create NAT gateway.
Create Route Table for Public Subnets
On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter
pcf-public-route-table
.In VPC, select the VPC that includes
(pcf-vpc)
.Click Create route table.
- In the Routes section, click Edit routes.
- Click Add route.
- In Destination, enter
0.0.0.0/0
. - In Target, select Internet Gateway, then select the internet gateway that includes
(pcf-internet-gateway)
.\ - Click Save changes.
Click the Subnet associations tab.
- In the Explicit subnet associations section, click Edit subnet associations.
- Select
pcf-public-subnet-az0
,pcf-public-subnet-az1
, andpcf-public-subnet-az2
. - Click Save associations.
Create Route Table for Remaining Subnets
On the VPC dashboard, click Route tables.
Click Create route table.
In Name, enter
pcf-management-route-table
.- In VPC, select the VPC that includes
(pcf-vpc)
. - Click Create route table.
- In VPC, select the VPC that includes
In the Routes section, click Edit routes.
- Click Add route.n Destination, enter
0.0.0.0/0
. - In Target, select NAT Gateway, then select the NAT gateway that includes
(pcf-nat-gateway)
. - Click Save changes.
- Click Add route.n Destination, enter
Click the Subnet associations tab.
- In the Explicit subnet associations section, click Edit subnet associations.
- Select
pcf-management-subnet-az0
,pcf-management-subnet-az1
,pcf-management-subnet-az2
,pcf-tas-subnet-az0
,pcf-tas-subnet-az1
,pcf-tas-subnet-az2
,pcf-services-subnet-az0
,pcf-services-subnet-az1
, andpcf-services-subnet-az2
. - Click Save associations.
Configure a Security Group for Ops Manager
Return to the EC2 Dashboard.
Select Security Groups>Create Security Group.
In Security group name, enter
pcf-ops-manager-security-group
.In Description, enter a description to identify this security group.
In VPC, select the VPC in which you want to deploy Ops Manager.
In the Inbound rules section, add rules using the information in the table below.
Note: VMware recommends limiting access to Ops Manager to IP ranges within your organization, but you may relax the IP restrictions after configuring authentication for Ops Manager.
Type Protocol Port Range Source HTTP TCP 80 My IP HTTPS TCP 443 My IP SSH TCP 22 My IP Custom TCP (BOSH Agent) TCP 6868 Custom 10.0.0.0/16 Custom TCP (BOSH Director) TCP 25555 Custom 10.0.0.0/16 Click Create security group.
Configure a Security Group for BOSH-Deployed VMs
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter
pcf-vms-security-group
.In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy the BOSH-deployed VMs.
In the Inbound rules section, add rules for all traffic from your public and private subnets to your private subnet, as shown in the table. This rule configuration does the following:
- Enables BOSH to deploy VMware Tanzu Application Service for VMs (TAS for VMs) and other services.
- Enables app VMs to communicate through the router.
- Allows the load balancer to send traffic to TAS for VMs.
Type Protocol Port Range Source All traffic All All Custom 10.0.0.0/16 Custom TCP rule TCP 2222 Anywhere-IPv4 0.0.0.0/0 Click Create security group.
Configure a Security Group for the Web ELB
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter
pcf-web-elb-security-group
.In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy this Elastic Load Balancer (ELB).
In the Inbound rules section, add rules to allow traffic to ports
80
,443
, and4443
from0.0.0.0/0
, as shown in the table.Note: Allow traffic to port `4443` only if you are in an AWS cloud region that does not support AWS ALBs. For example, the GovCloud region. For more information about AWS regoins and availability zones, see AWS Global Infrastructure.
Note: For finer control over what can reach TAS for VMs, change
0.0.0.0/0
to be more restrictive. This security group governs external access to TAS for VMs from apps such as the cf CLI and app URLs.Type Protocol Port Range Source Custom TCP TCP 4443 Anywhere-IPv4 0.0.0.0/0 HTTP TCP 80 Anywhere-IPv4 0.0.0.0/0 HTTPS TCP 443 Anywhere-IPv4 0.0.0.0/0 Click Create security group.
Configure a Security Group for the TCP ELB
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter
pcf-tcp-elb-security-group
.In Description, enter a description to identify this security group.
In VPC, select the VPC in which you want to deploy this ELB.
In the Inbound rules section, add the following rule:
Type Protocol Port Range Source Custom TCP rule TCP 1024 - 1123 Anywhere-IPv4 0.0.0.0/0 Click Create security group.
Configure a Security Group for MySQL
Note: If you plan to use an internal database, skip this step. If you are using RDS, you must configure a security group that enables the Ops Manager VM and BOSH Director VM to access the database.
On the Security Groups page, click Create Security Group to create another security group.
In Security group name, enter
pcf-mysql-security-group
.In Description, enter a description to identify this security group.
In VPC, select the VPC where you want to deploy MySQL.
In the Inbound rules section, add a rule of type
MySQL
and specify the subnet of your VPC in Source, as shown in the table.Type Protocol Port Range Source MYSQL/Aurora TCP 3306 Custom 10.0.0.0/16 In the Outbound rules section, add a rule of type
All traffic
and specify the subnet of your VPC in Destination, as shown in the table.Type Protocol Port Range Destination All traffic All All Custom 10.0.0.0/16 Click Create security group.
Next Step
Proceed to the next step, Deploying Ops Manager on AWS.