Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

          VPC ID: vpc-f67abf93 (172.16.0.0/16)

2.) After the VPC is created, create a new Internet Gateway and attach it to the new VPC:

...

10.) Launch instances into the VPC to setup the proper environment (e.g. Dev, QA, Prod, etc.).  This can be done maually, or through a CloudFormation template.  Ensure that only the ELB and Bastion server reside in the Public Subnet.  All other instances should reside in a private subnet.   Instances should be launched in the 'CommIT VPC'.   Details about each enviornment requirements are below:

General

AWS Resource

Tag: Name

Security Group

Subnet

Zone

Notes

t2.micro

CommIT-VPC-Bastion-Server

commit-vpc-bastion-server

172.16.0.0/24

us-west-2a

This server is accessible via SSH key from anywhere and can connect to the private instances.  Once launched and Elastic IP should be assigned to it for use by the server.

...

AWS Resource

Tag: Name

Security Group

Subnet

Zone

Notes

m3.medium

| CommIT-VPC-Dev-IDP-1

commit-vpc-dev-idp-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-IDP-2

commit-vpc-dev-idp-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-CPR-1

commit-vpc-dev-cpr-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-CPR-2

commit-vpc-dev-cpr-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

ELB

CommIT-VPC-Dev-IDP-ELB

commit-vpc-dev-idp-public-elb

172.16.0.0/24

us-west-2a

Listener for 80 and 443; Health thresholds are 2 each; Disable connection draining; Enable Cross-Zone Load balancing; Add Dev IDP instances

ELB

CommIT-VPC-Prod-IDP-ELB

commit-vpc-dev-cpr-public-elb

172.16.0.0/24

us-west-2a

Listener for 80 and 443; Health thresholds are 2 each; Disable connection draining; Enable Cross-Zone Load balancin; Add Dev CPR instances

m3.medium

CommIT-VPC-Dev-LDAP-1

commit-vpc-dev-ldap-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-LDAP-2

commit-vpc-dev-ldap-servers

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-Salt-Master

commit-vpc-dev-salt-master

172.16.100.0/24

us-west-2a

ami-d13845e1

m3.medium

CommIT-VPC-Dev-Rsyslog

commit-vpc-dev-log-server

172.16.100.0/24

us-west-2a

ami-d13845e1

Production (to be filled in when launched)

...

13.) Once you add the key, you should now SSH to the bastion server as the 'ec2-user' (no need to use a specific key file as you took care of that in the previous step).


14.) Once you are logged into the bastion server, you can SSH to the private instances as 'ec2-user' using their Private IP address.  Later on, after the Salt Master has deployed accounts users can use their regular account name and key as they will then exist on the servers.