You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/part1/00-objectives.md
+2-1
Original file line number
Diff line number
Diff line change
@@ -18,12 +18,13 @@ We will then manually customize the deployed infrastructure to:
18
18
- An IBM Cloud Pay-As-You-Go or Subscription account.
19
19
:information_source:**Note**: Participants in the TechXchange classroom will be provided with credentials to access an IBM Cloud account for the duration of the lab.
20
20
- An IBMId
21
-
- API Key
21
+
- API Key with the following permissions...
22
22
23
23
A development machine with the following software:
- Tools to generate SSH key. Linux and Mac comes with ssh-keygen. [PuTTYgen](https://www.ssh.com/academy/ssh/putty/windows/puttygen) can be used on Windows. See [Generating an external SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys&interface=ui#generating-ssh-keys)
Copy file name to clipboardExpand all lines: docs/part1/10-project.md
+19-4
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,14 @@
5
5
ssh-keygen -t rsa -b 4096 -N '' -f ./lab-key
6
6
```
7
7
This command generates two files in the current directory: `lab-key` (the private key) and `lab-key.pub` (the public key).
8
-
8
+
Verify that the keys have been created in the current directory.
9
+
```
10
+
ls lab-key*
11
+
```
12
+
This should return:
13
+
```
14
+
lab-key lab-key.pub
15
+
```
9
16
2. Access the [VSI on VPC landing zone Deployable Architecture](https://cloud.ibm.com/catalog/architecture/deploy-arch-ibm-slz-vsi-ef663980-4c71-4fac-af4f-4a510a9bcf68-global?catalog_query=aHR0cHM6Ly9jbG91ZC5pYm0uY29tL2NhdGFsb2cjcmVmZXJlbmNlX2FyY2hpdGVjdHVyZQ%3D%3D)
10
17
3. On the Overview page, make sure the following is selected:\
11
18
a. Product version: **Select the latest** (4.4.7 at the time of writting)
4. Click **Review deployment options** on the bottom right
16
23
5. Click **Add to project**
17
-
6. Under _Create New_, input a name that you wish to provide to the project. For example "Landing Zone Lab"
24
+
6. Under _Create New_, input a name that you wish to provide to the project. For example "\<your initials\>Landing Zone Lab"
18
25
7. Click **Add** on the bottom right
19
26
8. Under _Configure -> Security_ section, set the following:\
20
27
a. Authentication: untoggle _Use a secret_ and paste your IBM Cloud API key input the box
@@ -29,10 +36,18 @@
29
36
a. `add_atracker_route`: false
30
37
11. Click **Save**
31
38
12. Click **Validate**
32
-
13. The project will go through different steps in validation. When it completes, the validation might fail due to a rule within the Security and compliance section. In the _Approval not recommended_section, add a comment and click **Override and approve** to start provisioning.
39
+
13. The project will go through different steps in validation. When it completes, the validation is marked as successful. In the _Approval pending_section, add a comment and click **Approve** to start provisioning.
33
40
34
41

35
42
36
43
14. Click **Deploy**
37
44
38
-
Note: The deploy will take approximately 15 minutes to complete
45
+
46
+
:information_source:**Note**: The deploy will take approximately 15 minutes to complete. Some suggestions during this time:
47
+
- You may following the execution logs. Of interest:
48
+

49
+
- The terraform plan steps shows the list of resources that are going to be created.
50
+
- The terraform apply steps shows the resources that are being created.
51
+
- You may also navigate to the [VPC section](https://cloud.ibm.com/vpc-ext/vpcLayout) and the [resource list](https://cloud.ibm.com/resources) in your account to see the resources starting to spawn up as you refresh the screen during the execution.
52
+
- Explore in more details some of the materials in the [introduction section](README)
# Providing operator access to the VPC landing zone
2
2
3
-
By default, network access to the VPC landing zone topology is locked down for security compliance reasons. In this section, you will open up the necessary access for an operator to access the VPC environment, including deploying application on the VSI's located in the workload VPC.
3
+
## Introduction
4
+
5
+
By default, network access to the VPC landing zone topology is locked down for security compliance reasons. In this section, you will open up the necessary access for an operator to access the VPC environment, including deploying application on the VSIs located in the workload VPC.
4
6
5
7
Operator access is provided through the _Management VPC_. There are multiple ways to give operator access to the VPC landing zone, with varying level of security, compliance, and ease of enablement:
6
8
@@ -9,9 +11,11 @@ Operator access is provided through the _Management VPC_. There are multiple way
9
11
- Deploying a site-to-site VPN solution in the management VPC
10
12
- Deploying a certified bastion solution, such as Gravitational Teleport in the management VPC.
11
13
12
-
This part of the lab shows how to expose one of the VSI's in the management VPC as a ‘jump-box’, as this is one of the simplest way to proceed, albeit not being strongly secure. The Going Further section below provides links to some of the other ways to provide operator access.
14
+
This part of the lab shows how to expose one of the VSI in the management VPC as a 'jump-box', as this is one of the simplest way to proceed, albeit not being strongly secure. The [Going Further](./part1/50-going-further) section below provides links to some of the other ways to provide operator access.
15
+
16
+
## Steps
13
17
14
-
Perform the following actions to provide operator access to a VSI in the management VPC
18
+
Perform the following actions to enable public ssh access to one of the VSI in the management VPC. This VSI will be the unique operator entry point ('jump-box') to the landing zone VPC topology.
15
19
16
20
1. Access the [Virtual server instances for VPC list](https://cloud.ibm.com/vpc-ext/compute/vs)
17
21
2. Verify that the region is set to the region you provisioned your resources and click the VSI labeled _<initials>-management-server-1_
@@ -20,16 +24,17 @@ Perform the following actions to provide operator access to a VSI in the managem
4. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one label _<initials>-management_
24
-
5. Go to the Rules section and allow port 22 for inbound by clicking **Create** in the _Inbound rules_ section (Note: Security groups are stateful so you don’t need to add a corresponding outbound rule)
27
+
4. Take note of the public Floating IP. This IP will be used in a subsequent step.
28
+
5. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one labelled _<initials>-management_
29
+
6. Go to the Rules section and allow port 22 for inbound by clicking **Create** in the _Inbound rules_ section (Note: Security groups are stateful so you don’t need to add a corresponding outbound rule)
25
30
26
31

27
32
28
-
6. Click **Create**
29
-
7. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled _<initials>-management-acl_
30
-
8. Create the following ACL inbound rule:
33
+
7. Click **Create**
34
+
8. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled _<initials>-management-acl_
10. You will now be able to access the Floating IP address that you provisioned in a prior step. On your workstation, issue the following command from a terminal\
35
-
`ssh -i key root@<Floating IP of Virtual server instance>`
39
+
11. You will now be able to access the 'jump-box' through the public Floating IP address that you provisioned in a prior step. On your workstation, issue the following command from a terminal\
40
+
`ssh -i ./lab-key root@<Floating IP of Virtual server instance>`
Copy file name to clipboardExpand all lines: docs/part1/30-apache-server.md
+10-7
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
In this section, you will install the Apache server on a workload VSI.
4
4
5
-
1. By default, the workload Virtual server instances are locked down from the management VPC. You will need to allow access through the Access control list. In the [Access control list](https://cloud.ibm.com/vpc-ext/network/acl), click the ACL labeled _<initials>-workload-acl_.
5
+
1. By default, the workload VSI (Virtual Server Instances) are locked down from the management VPC. You will need to allow access through the Access control list. In the [Access control list](https://cloud.ibm.com/vpc-ext/network/acl), click the ACL labeled _<initials>-workload-acl_.
6
6
1. Create an ACL inbound rule to allow ssh access from the Management VPC
3. Access the workload VSI by doing the following:
16
-
1. Copy the private key labeled _lab_key_ to the bastion host
16
+
1. Navigate to [Virtual server instances for VPC](https://cloud.ibm.com/vpc-ext/compute/vs). Take note of the private IP ("Reserved IP") for the VSI labeled *initials-workload-server-1* (10.40.10.4 in this example).
17
+

18
+
2. From your machine, copy the private key labeled *lab_key* to the bastion host
17
19
`scp -i lab-key lab-key root@<Floating IP address of bastion host>:/root`
18
-
2. SSH to the bastion host
19
-
`ssh -i key root@<Floating IP of Virtual server instance>`
20
-
3. Change permissions of the private key
20
+
3. SSH to the bastion host
21
+
`ssh -i ./lab-key root@<Floating IP of Virtual server instance>`
22
+
4. Change permissions of the private key
21
23
`chmod 600 lab-key`
22
-
4. SSH to the workload VSI
23
-
`ssh -i lab-key root@<Private IP address of the workload VSI>`
24
+
5. SSH to the workload VSI
25
+
`ssh -i ./lab-key root@<Private IP address of the workload VSI>`
24
26
4. Install the Apache web server by issuing the following commands:
25
27
```shell
26
28
apt-get update
27
29
apt-get install apache2 --yes
28
30
```
31
+
5. (Optional) You may repeat the steps 3 and 4 for the workload VSIs *<initials>-workload-server-2* and *<initials>-workload-server-3*
Copy file name to clipboardExpand all lines: docs/part1/40-expose-web-app.md
+4-3
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Exposing the web application to the internet
2
2
3
-
In this section, you will expose the web application to the internet so you can access it.
3
+
In this section, we will expose the web pages to the internet through a VPC load balancer so anyone can access them.
4
4
5
5
1. Create a public load balancer to expose the web application. Access the [Load balancers for VPC](https://cloud.ibm.com/vpc-ext/network/loadBalancers) page and click **Create**.
6
6
2. Set the following for the load balancer:
@@ -28,9 +28,10 @@ In this section, you will expose the web application to the internet so you can
5. It can take several minutes for your load balancer to provision. Check and wait until the status is set to Active in [Load balancers for VPC](https://cloud.ibm.com/vpc-ext/network/loadBalancers). You may need click the refresh button in the page periodically.
32
+
6. You web application is exposed:
32
33
- Retrieve the FQDN of your Load balancer
33
34
-[Access the Load Balancer list](https://cloud.ibm.com/vpc-ext/network/loadBalancers) and click your provisioned load balancer
34
35
- Copy the value under _Hostname_
35
-
-Issue the following command:
36
+
-On your machine, open up a web browser pointing to `http://<Hostname of your load balancer>` . You may also test connectivity by issuing the following command:
0 commit comments