Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated links in the proper manner.

...

...

...

...

...

...

...

Amazon Web Services (AWS) Installation Overview

This section describes how to set up an Amazon AWS Virtual Private Cloud (VPC) which will support either a single instance or a high availability (HA) pairing of SoftNAS

...

instances using SoftNAS SNAP HA™. SoftNAS SNAP HA™ for EC2 now supports the use of Virtual IPs, and is our best practice recommendation. Configuration with Elastic IPs is still fully supported.

The following is required:

...

  • SoftNAS®
  • Create required subnets
  • Configure the routing tables.
  • Launch an Instance of

...

  • SoftNAS® into the VPC.
  • Create and Associate the Required Elastic or Virtual IPs.
  • Set up

...

  • SoftNAS® for HA.
Note

...

The HA IAM Role is caps sensitive, and must be named SoftNAS_HA_IAM.


Note

If planning on deploying a private VPC, remember that a connection method to tunnel traffic into your private subnet is required. For more information about connecting to a private subnet, see AWS' guidance on the subject. Alternatively, AWS' Direct Connect solution can be configured.

Table of Contents

Creating the VPC

A VPC is a private, isolated section of the AWS cloud that can be set up in a variety of configurations.

  •  To create your VPC, log into the AWS console with your AWS credentials, and

...

  • select Services.
  •  Select Networking and Content Delivery

...

  •  Select VPC.

...

Image Added

  •  

...

  • From the VPC Dashboard, click on

...

  • Create VPC

...

  • .

...

Image Added

...

  •  Select VPC

...

  • and more.


Note
Private subnet instances access the Internet via a Network Address Translation (NAT) instance in the public subnet. (Hourly charges for NAT instances apply.) 

...


Note
You may not require NAT setup if setting up a Private instance using Virtual IPs. While not required for Private instances, there are some organization specific instances where set up of NAT is relevant.


Image Added

Configure the IP CIDR block, Public and Private Subnets, and all other settings as appropriate.

  1. Provide

...

  1. Name tag that will be used to generate the Name tag of all resources in the VPC.
  2. Provide an IPv4 CIDR block for your VPC.

...

  1.  The default can be kept, provided it does not conflict with other CIDR

...

  1. clocks within your organization.

...

  1.  For this example, we will

...

  1. us 10.

...

  1. 0.0.0/16

...

  1. IPv6 CIDR block

...

  1. can be kept at the default

...

  1. of No IPv6 CIDR block

...

  1. unless your use case necessitates an Amazon provided IPv6 CIDR block.

...

  1. Tenancy can be kept at the default of Default.  This ensures that instances launched in this VPC use the tenancy attribute specified at launch.  Switching this value to Dedicated would ensure that instances launched in this VPC are run on dedicated tenancy instances regardless of the tenancy attribute specified at launch.
  2. Number of Availability Zones (AZs) can be kept at the default of 2.  If you wish to customize the availability zone location, you may do so under Customize AZs.
  3. Number of public subnets should be kept as the default of 2.
  4. Number of private subnets can be kept at the default of 2.  If you wish to customize the CIDR blocks of your subnets, you may do so under Customize subnets CIDR blocks.
  5. NAT gateways ($) can be kept at the default of 0 unless your use case necessitates the use of NAT gateways.  (Hourly charges for NAT instances apply.)
  6. Select None for VPC endpoints unless you are using NAT gateways and your use case necessitates the use of S3 Gateways.
  7. The DNS options of Enable DNS hostnames and Enable DNS resolution can be kept at the default of being selected.
  8. Once all settings are configured, select Create VPC to complete your VPC creation.


Image Added

Image Added

Configuration Best Practices to Consider Now:

  • Select different availability zones when configuring the subnets for the greatest level of VPC redundancy.
  • Select the proper instance type for intended usage, including anticipated networking and storage needs.
  • Select a valid Key Pair that is secured and available for use.

Click on Create VPC. AWS will create a VPC with Public and Private subnets. 
Note: If a NAT instance is not required for the local SoftNAS Cloud® deployment, delete the NAT instance and release any assigned Elastic IPs. Amazon hourly charges apply to NAT instances. 

Specify the IAM User for

...

SoftNAS®

About Amazon IAM Users

AWS Identity and Access Management is a web service that enables Amazon Web Services (AWS) customers to manage users and user permissions in AWS. The service is targeted at organizations with multiple users or systems that use AWS products such as Amazon EC2, Amazon RDS, and the AWS Management Console. With IAM, centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access. 

Create an AWS IAM User for

...

SoftNAS®. This will allow

...

SoftNAS® instances to use the credentials of the AWS IAM User when accessing the VPC. For a step-by-step guide to setting up your IAM user, see Creating the

...

Creating a Subnet

...

Buurst'

...

No Downtime Guarantee requires that each instance in an HA pairing must belong to a separate Availability zone or region for redundancy. For this reason, at least two subnets are required for your VPC, each in a different Availability Zone.

...

Depending on how you configure your VPC during the previous steps, all subnets should already be created, requiring you only to associate the subnets to the routing table (described below).  However, if you need to create a second subnet, follow the below steps.

If you are going to assign additional subnets to your newly created VPC, it is important to log the VPC ID. The VPC ID can be found in Your VPCs from the VPC Dashboard.

...


Image Added

...

  •  Select Subnets from the VPC Dashboard

...

  • > Virtual private cloud
  •  Click Create Subnet.

...

Image Added

...

  •  In Create Subnet, you will provide the following information to create each subnet:

    Image Removed

    ...

    1. VPC ID: From the drop-down menu, select the VPC that you previously created.
    2. Subnet name: Provide a name for the subnet, ideally one that identifies it as a secondary public or private subnet, dependent on which you will be deploying into

    ...

    1. .

    ...

    ...

    1. Availability Zone:

    ...

    1.  This should be a separate availability zone from the default VPC public/private subnets.
    2. IPv4 CIDR block:

    ...

    1.  The IPv4 CIDR block specifies an IP range for your instance.

    ...

    1.  As we are creating two subnets, the CIDR block provided should be smaller than the CIDR block specified for the VPC.
    2. Tags - optional: 

    ...

    1. If you would like, you can assign a friendly name to easily identify the subnet.
    2. Create subnet: Once all settings are configured, select Create subnet to complete your subnet creation.

    Image Added

    Associating Subnets to a Route Table

    Once your subnets have been created, they need to be associated with the correct route table. If creating a private VPC HA deployment, the two private subnets just created will need to be associated with the NAT Gateway or private Route Table. If public, you will need to associate a second public subnet to the route table. In the below example, we will be associating private subnets to a private route table. However, the process is the same in either case. Simply be sure to select the correct route table, and associate the appropriate subnet. 

    Note
    To determine or verify the correct route table to assign the private subnets to, select one of the two route tables associated with your VPC (Remember, this can be determined by checking the VPC ID). Click on the Routes tab. 

    ...


    Image Added

    Scroll down to see the default route (identified by the 0.0.0.0 IP address). If this route is associated with an internet gateway, this is the public route table.

    Note
    Labelling the route table can help identify it at a glance.

    ...


    Image Added

    Move to the second route table associated with the VPC if the first is associated with an internet gateway.

    ...

    Image Added

    After verifying the private route table (associated with the NAT Gateway),

    •  select this route table, and select the Subnet

    ...

    • associations tab.

    ...

    •  
    •  Click Edit subnet associations.

    ...

    Image Added

    •  Select the two private subnets created earlier

    ...

    •  Click Save

    ...

    Note

    If deploying into a public subnet, you would simply associate a second public subnet instead (This public subnet should have been created as described earlier in

    ...

    the Creating a Subnet

    ...

     section of this guide). 


    Image Added

    Launch An Instance of

    ...

    SoftNAS® into the VPC


    To launch an instance of

    ...

    SoftNAS® into the already-set-up VPC, the following is required:

    •  Select the appropriate 

    ...

    • SoftNAS® AMI

    ...

    • from the Marketplace AMI section of EC2 services.

    ...

    •  

    ...

    • Select at least the small instance.

    ...

    •  

    ...

    • Configure the instance details.

    ...

    •  

    ...

    • Launch instance into the subnet.

    ...

    •  

    ...

    • Add an additional ethernet interface.

    ...

    •  

    ...

    • Add storage as required.

    ...

    •  

    ...

    • Tag the instance.

    ...

    •  

    ...

    • Set up security groups.

    ...

    •  

    ...

    • Select a key pair for SSH.


    The above procedure is repeated to create a second 

    ...

    Selecting the SoftNAS Cloud® AMI

    ...

    Choosing an Instance Type

    ...

    Instance Details

    ...

    Adding Storage and Tagging

    ...

    Note: Disk names for EBS volumes must follow SoftNAS Cloud® storage naming conventions. For more information, see the document SoftNAS Installation Guide

    Security Groups

    Security groups for SoftNAS Cloud® must include TCP 443, TCP 22, and ICMP Echo Reply and Echo Response. Source can be locked down per security requirements.

    Note: When assigning the Security Group for a SoftNAS Cloud® instance, either create a new Security Group or select a preexisting security Group. Regardless of the decision, ensure it includes the above-mentioned rules.

    Create the required rules for the security group

    ...

    Keep in mind that two instances are required for HA. Create a second instance at this time. 

    In order to complete the set up high availability for Amazon Web Services VPCs in either a Virtual IP or Elastic IP setup, select the appropriate link below:

    ...

    SoftNAS® instance for HA.