Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Runtime environments
  3. Hosted Agent
  4. Secure Agent groups
  5. Elastic runtime environments
  6. Serverless runtime environments
  7. Secure Agents
  8. Secure Agent installation

Runtime Environments

Runtime Environments

Step 1. Create AWS resources

Step 1. Create AWS resources

Create and configure AWS resources that the elastic runtime environment can use to start a Secure Agent and run jobs.
Create and configure the following AWS resources:
VPC
A VPC contains all your AWS resources, including the Kubernetes cluster that hosts the Secure Agent.
Create a VPC in your AWS account. Use IPv4 CIDR manual input and enter the CIDR block for the VPC to use.
Public subnet
A public subnet provides internet access through a NAT gateway. To create the public subnet, use the following guidelines:
  • Use any availability zone in the region where you created the VPC.
  • To set the IPv4 VPC CIDR block, use the same IPv4 CIDR block that you specified when you created the VPC.
  • To set the IPv4 subnet CIDR block, use a CIDR range that's within the VPC CIDR range. Choose a range based on the number of IP addresses that you want to have within the subnet. For example, if you use 10.1.0.0/16 for the VPC, you might use 10.1.0.0/20 for the public subnet.
Private subnet
A private subnet hosts IDMC servers and resources. To create the private subnet, use the following guidelines:
  • Use the same availability zone that you used to create the public subnet.
  • To set the IPv4 VPC CIDR block, use the same IPv4 CIDR block that you specified when you created the VPC.
  • To set the IPv4 subnet CIDR block, use a CIDR range that's within the VPC CIDR range. For example, if you use 10.1.0.0/16 for the VPC, you might use 10.1.240.0/20 for the private subnet.
    Choose a range that has enough available IP addresses to accommodate the maximum number of worker nodes in the elastic runtime environment. For example, if the environment has a minimum of one worker node and a maximum of 10 worker nodes, then at least 10 IP addresses must be available in the private subnet to accommodate the worker nodes.
NAT gateway
A NAT gateway allows outbound traffic to the internet from nodes in the private subnet. The NAT gateway ensures that private nodes are isolated from the public internet.
To create the NAT gateway, use the following guidelines:
  • Use the public subnet as the subnet.
  • Set the connectivity type to
    Public
    .
  • Allocate an elastic IP address to the NAT gateway.
Internet gateway
An internet gateway is used for internet access. The public subnet and the internet gateway allow the jump host to receive SSH connections from the public internet.
Create an internet gateway in AWS and then attach it to the VPC.
For information about the jump host, see Step 6. Create the jump host (optional).
Public route table
A public route table routes traffic in the public subnet. To create the public route table, use the following guidelines:
  • Use the VPC that you created.
  • Add a route using
    0.0.0.0/0
    as the destination and the internet gateway that you created.
  • Edit the subnet association and select the public subnet that you created.
Private route table
A private route table routes traffic in the private subnet. To create the private route table, use the following guidelines:
  • Use the VPC that you created.
  • Add a route using
    0.0.0.0/0
    as the destination and the NAT gateway that you created.
  • Edit the subnet association and select the private subnet that you created.
Security group for the elastic runtime environment
A security group allows SSH access to the elastic runtime environment. You specify this security group in the config.txt file. For more information about the config.txt file, see Deploy an elastic runtime environment.
To create the security group, use the following guidelines:
  • Use an existing security group or create a new one.
  • Use the VPC that you created.
  • Add inbound rules that allow the following types of traffic:
    • All traffic from the same security group
    • All traffic from the local machine that you're using to create AWS resources
The following image shows an example of the inbound rules:
The inbound rules in the AWS Management Console include a rule that
                                allows all traffic from the same security group and a rule that
                                allows all traffic from the local machine.
If any required inbound rules are missing, the cluster installer populates them.
Security group for the jump host (optional)
The jump host is an EC2 instance in the public subnet that you can use to SSH into nodes in the elastic runtime environment in the private subnet. A security group allows SSH access to the jump host from your local machine. If you can access the private subnet through your enterprise network, you don't need to create a jump host or a security group for the jump host.
To create a security group for the jump host, use the following guidelines:
  • Use the VPC that you created.
  • Add an inbound rule that allows SSH traffic on port 22 from source
    <local machine IP address>/32
    .
For information about creating the jump host, see Step 6. Create the jump host (optional).
EFS file systems for system storage (required) and data storage (optional)
An elastic runtime environment uses EFS file systems for system storage and data storage. System storage is required for Secure Agent operations, and data storage is used to store flat files that you used as data sources in tasks, such as
mapping
tasks.
Create an EFS file system for system storage and then create an access point for it. Optionally, you can create another EFS file system for data storage and create an access point for it as well.
To create each file system, use the following guidelines:
  • For the VPC, use the VPC that you created.
  • For the system disk, don't specify any mount targets, and remove the default mount targets that AWS adds. The cluster installer automatically adds mount targets to the EFS file system.
    For the data disk, specify the private subnet as the mount target.
  • On the
    Network access
    page, customize the file system to set the availability zone to the name of the availability zone that you created and the security group to the name of the security group that you created.
  • Create the file system only after you've customized it.
To create each access point, use the following guidelines:
  • For the file system, use the file system that you created.
  • Enter a root directory, such as
    /ert_sysdisk
    or
    /ert_datadisk
    .
  • For the POSIX user, use the user ID
    1200
    and group ID
    1200
    .
  • In the root directory creation permissions, use owner user ID
    1200
    , owner group ID
    1200
    , and access point permission
    0755
    .
The following image shows an example of an EFS file system in the AWS Management Console:
An EFS file system in the AWS Management Console has an access
                                point configured with a POSIX user UID of 1200, a GID of 1200, and
                                permissions set to 0755.

0 COMMENTS

We’d like to hear from you!