You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/part1/20-operator-access.md
+19-13Lines changed: 19 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,37 +18,43 @@ In this lab, you expose one of the VSIs in the management VPC as a 'jump-box'. T
18
18
Complete the following steps to enable public SSH access to one of the VSI in the management VPC. This VSI is the unique operator entry point ('jump-box') to the landing zone VPC topology.
19
19
20
20
1. Access the [Virtual server instances for VPC list](https://cloud.ibm.com/vpc-ext/compute/vs).
21
-
2. Verify that the region is set to the region you provisioned your resources and click the VSI labeled `<your_initials>-management-server-1`.
22
-
3. Add a floating IP address by clicking the pencil icon in the Network Interface section. Reserve a new floating IP address.
21
+
1. Verify that the region is set to the region you provisioned your resources and click the VSI labeled `<your_initials>-management-server-1`.
22
+
1. Add a floating IP address by clicking the pencil icon in the Network Interface section. Reserve a new floating IP address.
12. You can now access the 'jump-box' through the public floating IP address that you provisioned earlier. On your computer, issue the following command from the terminal or command window:
48
+
1. You can now access the 'jump-box' through the public floating IP address that you provisioned earlier. On your computer, issue the following command from the terminal or command window:
49
49
50
50
```sh
51
51
ssh -i ./lab-key root@<Floating IP of Virtual server instance>
52
52
```
53
53
54
54
Replace \<Floating IP of Virtual server instance> with the address that you reserved earlier.
55
+
56
+
1. You can terminate the ssh session with the following command.
1. Access the workload VSI by completing the following steps:
26
+
26
27
1. Go to [Virtual server instances for VPC](https://cloud.ibm.com/vpc-ext/compute/vs). Take note of the private IP("Reserved IP") for the VSI labeled `<your_initials-workload-server-1` (`10.40.10.4` in this example). You need it later.
27
28
28
29

29
30
30
-
1. From your computer, copy the private key that is labeled `lab_key`` to the Bastion host.
31
+
1. From your computer, copy the private key that is labeled `lab_key` to the jump-box host.
32
+
The floating IP of the jump box is the public IP that you kept a note of in [Operator Access](./part1/20-operator-access)
31
33
32
34
```sh
33
-
scp -i lab-key lab-key root@<Floating IP address of bastion host>:/root
35
+
scp -i lab-key lab-key root@<Floating IP address of the jump box>:/root
34
36
```
35
37
36
-
1. SSH to the bastion host
38
+
1. SSH to the jump box host
37
39
38
40
```sh
39
-
ssh -i ./lab-key root@<Floating IP of Virtual server instance>
41
+
ssh -i ./lab-key root@<Floating IP address of the jump box>
40
42
```
41
43
42
44
1. Change permissions of the private key
43
45
44
46
```sh
45
47
chmod 600 lab-key
46
-
```
48
+
```
47
49
48
-
1. SSH to the workload VSI
50
+
1. SSH to the workload VSI using the private IP noted above in step 3.1. The jump-box has got connectivity to the private IP of the workload VSI.
49
51
50
52
```sh
51
53
ssh -i ./lab-key root@<Private IP address of the workload VSI>
Copy file name to clipboardExpand all lines: docs/part1/40-expose-web-app.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,8 @@
1
1
# Exposing the web application to the internet
2
2
3
-
In this part of the lab, you expose the web pages to the internet through a VPC load balancer so that anyone can access them.
3
+
In this part of the lab, you expose the web pages to the internet through a VPC load balancer so that anyone can access them.
4
+
5
+
The load balancer enables to distribute traffic among multiple application server instances running in the VPC (the workload VSIs), and by forwarding traffic to healthy instances only. Further details on load balancing, and the IBM Cloud Load Balancer are available in the [IBM Cloud documentation](https://cloud.ibm.com/docs/loadbalancer-service?topic=loadbalancer-service-getting-started).
4
6
5
7
1. Create a public load balancer to expose the web application.
6
8
1. Access the [Load balancers for VPC](https://cloud.ibm.com/vpc-ext/network/loadBalancers) page.
@@ -19,6 +21,7 @@ In this part of the lab, you expose the web pages to the internet through a VPC
19
21
- Pool protocol: `HTTP`
20
22
- Health Port: `80`
21
23
- Click **Attach server +** in the Back-end pools section and add the VSI that is in the subnet `<your_initials>-workload-vsi-zone-1` with a server port of `80`.
24
+
- (Optional) If you deployed the Apache server on the workload VSIs 2 and 3 in [Install Apache server](/./part1/30-apache-server) , you may repeat this step to attach `<your_initials>-workload-server-2` and `<your_initials>-workload-server-3` to the back-end pool.
22
25
- Create a front-end listener by clicking **Create listener** and set the Listener port to `80`.
23
26
- Under the _Security Group_ section, clear all settings except the one labeled `<your_initials>-workload`.
Copy file name to clipboardExpand all lines: docs/part1/50-going-further.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
To keep the lab simple, you give operator access through a VSI jump-box in the management VPC. Then you expose the web application directly through a public load balancer that is attached to the worker VPC.
4
4
5
-
These approaches provide a reasonable level of security, satisfy a number of compliance controls, and might be sufficient for a number of industries and enterprises. If you want more security and need to comply with different controls, consider the following information to set a more secure and compliant posture.
5
+
These approaches may be sufficient for a number of industries and enterprises. However, if you want more security and need to comply with different controls, consider the following information to set a more secure and compliant posture.
6
6
7
7
## Other ways to provide operator access
8
8
@@ -12,7 +12,7 @@ Some secure options to consider for providing network connectivity to the manage
- A [site-to-site VPN](https://cloud.ibm.com/docs/vpc?topic=vpc-using-vpn) to connect the management VPC to another private network. The landing zone deployable architecture creates a site-to-site gateway for this purpose.
15
-
- Direct LInk, which extends an organization data center network. For a starting point with more details, see [Connecting application provider to the management VPC](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-management).
15
+
- Direct Link, which extends an organization data center network. For a starting point with more details, see [Connecting application provider to the management VPC](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-management).
16
16
17
17
From a compliance perspective, record all interactive operator actions with a bastion solution. Operators connect through the bastion, which records all interactive session actions for auditing. For more information, see [Running operator actions through a bastion host
18
18
](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-bastion) in the IBM cloud Framework for Financial Services docs. For a tutorial that uses the 3rd-party solution Teleport, see [Setting up a bastion host that uses Teleport](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-bastion-tutorial-teleport).
0 commit comments