Skip to content

Commit 6f99cb0

Browse files
committed
docs: minor updates
1 parent 3bb4e22 commit 6f99cb0

File tree

5 files changed

+34
-23
lines changed

5 files changed

+34
-23
lines changed

docs/part1/10-project.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
Copy and paste the **full** content including the ssh-rsa and the user name pieces - for instance: `ssh-rsa ... ibmuser@student`
4848

4949
b. `region`: The region that you want to deploy in. \
50-
c. `prefix`: Your initials.
50+
c. `prefix`: `<your initials>`.
5151

5252
![Configuration](../images/part-1/10-configuration.png)
5353

docs/part1/20-operator-access.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,37 +18,43 @@ In this lab, you expose one of the VSIs in the management VPC as a 'jump-box'. T
1818
Complete the following steps to enable public SSH access to one of the VSI in the management VPC. This VSI is the unique operator entry point ('jump-box') to the landing zone VPC topology.
1919

2020
1. Access the [Virtual server instances for VPC list](https://cloud.ibm.com/vpc-ext/compute/vs).
21-
2. Verify that the region is set to the region you provisioned your resources and click the VSI labeled `<your_initials>-management-server-1`.
22-
3. Add a floating IP address by clicking the pencil icon in the Network Interface section. Reserve a new floating IP address.
21+
1. Verify that the region is set to the region you provisioned your resources and click the VSI labeled `<your_initials>-management-server-1`.
22+
1. Add a floating IP address by clicking the pencil icon in the Network Interface section. Reserve a new floating IP address.
2323

24-
![Pencil icon](../images/part-1/20-network-int-pencil.png)
25-
26-
:exclamation: **Important**: Take note of the public floating IP address. You need it later.
24+
![Pencil icon](../images/part-1/20-network-int-pencil.png)
2725

2826
![Floating IP address](../images/part-1/20-floating-ip.png)
2927

30-
5. Click **Save**.
31-
6. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one labeled `<your_initials>-management`.
32-
7. Go to the Rules section and allow port 22 for SSH inbound access by clicking **Create** in the _Inbound rules_ section.
28+
:exclamation: **Important**: Take note of the public floating IP address. You need it later.
29+
30+
1. Click **Save**.
31+
1. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one labeled `<your_initials>-management`.
32+
1. Go to the Rules section and allow port 22 for SSH inbound access by clicking **Create** in the _Inbound rules_ section.
3333

3434
:information_source: **Tip**: Security groups are stateful so you don’t need to add a corresponding outbound rule.
3535

3636
![Allow SSH in Security group](../images/part-1/20-ssh-sg.png)
3737

38-
8. Click **Create**.
39-
9. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled `<your_initials>-management-acl`.
40-
10. Create the following ACL inbound rule for SSH access:
38+
1. Click **Create**.
39+
1. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled `<your_initials>-management-acl`.
40+
1. Create the following ACL inbound rule for SSH access:
4141

4242
![SSH ACL Inbound rule](../images/part-1/20-ssh-acl-inbound.png)
4343

44-
11. Create the following ACL outbound rule for SSH access:
44+
1. Create the following ACL outbound rule for SSH access:
4545

4646
![SSH ACL Outbound rule](../images/part-1/20-ssh-acl-outbound.png)
4747

48-
12. You can now access the 'jump-box' through the public floating IP address that you provisioned earlier. On your computer, issue the following command from the terminal or command window:
48+
1. You can now access the 'jump-box' through the public floating IP address that you provisioned earlier. On your computer, issue the following command from the terminal or command window:
4949

5050
```sh
5151
ssh -i ./lab-key root@<Floating IP of Virtual server instance>
5252
```
5353

5454
Replace \<Floating IP of Virtual server instance> with the address that you reserved earlier.
55+
56+
1. You can terminate the ssh session with the following command.
57+
58+
```sh
59+
exit
60+
```

docs/part1/30-apache-server.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,29 +23,31 @@ By default, the workload VSI (Virtual Server Instance) is locked down from the m
2323
![Management SSH ACL Outbound rule](../images/part-1/30-mgmt-ssh-acl-outbound.png)
2424

2525
1. Access the workload VSI by completing the following steps:
26+
2627
1. Go to [Virtual server instances for VPC](https://cloud.ibm.com/vpc-ext/compute/vs). Take note of the private IP("Reserved IP") for the VSI labeled `<your_initials-workload-server-1` (`10.40.10.4` in this example). You need it later.
2728

2829
![Private IP](../images/part-1/30-private-ip.png)
2930

30-
1. From your computer, copy the private key that is labeled `lab_key`` to the Bastion host.
31+
1. From your computer, copy the private key that is labeled `lab_key` to the jump-box host.
32+
The floating IP of the jump box is the public IP that you kept a note of in [Operator Access](./part1/20-operator-access)
3133

3234
```sh
33-
scp -i lab-key lab-key root@<Floating IP address of bastion host>:/root
35+
scp -i lab-key lab-key root@<Floating IP address of the jump box>:/root
3436
```
3537

36-
1. SSH to the bastion host
38+
1. SSH to the jump box host
3739

3840
```sh
39-
ssh -i ./lab-key root@<Floating IP of Virtual server instance>
41+
ssh -i ./lab-key root@<Floating IP address of the jump box>
4042
```
4143

4244
1. Change permissions of the private key
4345

4446
```sh
4547
chmod 600 lab-key
46-
```
48+
```
4749

48-
1. SSH to the workload VSI
50+
1. SSH to the workload VSI using the private IP noted above in step 3.1. The jump-box has got connectivity to the private IP of the workload VSI.
4951

5052
```sh
5153
ssh -i ./lab-key root@<Private IP address of the workload VSI>

docs/part1/40-expose-web-app.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
# Exposing the web application to the internet
22

3-
In this part of the lab, you expose the web pages to the internet through a VPC load balancer so that anyone can access them.
3+
In this part of the lab, you expose the web pages to the internet through a VPC load balancer so that anyone can access them.
4+
5+
The load balancer enables to distribute traffic among multiple application server instances running in the VPC (the workload VSIs), and by forwarding traffic to healthy instances only. Further details on load balancing, and the IBM Cloud Load Balancer are available in the [IBM Cloud documentation](https://cloud.ibm.com/docs/loadbalancer-service?topic=loadbalancer-service-getting-started).
46

57
1. Create a public load balancer to expose the web application.
68
1. Access the [Load balancers for VPC](https://cloud.ibm.com/vpc-ext/network/loadBalancers) page.
@@ -19,6 +21,7 @@ In this part of the lab, you expose the web pages to the internet through a VPC
1921
- Pool protocol: `HTTP`
2022
- Health Port: `80`
2123
- Click **Attach server +** in the Back-end pools section and add the VSI that is in the subnet `<your_initials>-workload-vsi-zone-1` with a server port of `80`.
24+
- (Optional) If you deployed the Apache server on the workload VSIs 2 and 3 in [Install Apache server](/./part1/30-apache-server) , you may repeat this step to attach `<your_initials>-workload-server-2` and `<your_initials>-workload-server-3` to the back-end pool.
2225
- Create a front-end listener by clicking **Create listener** and set the Listener port to `80`.
2326
- Under the _Security Group_ section, clear all settings except the one labeled `<your_initials>-workload`.
2427
- Click **Create load balancer**.

docs/part1/50-going-further.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
To keep the lab simple, you give operator access through a VSI jump-box in the management VPC. Then you expose the web application directly through a public load balancer that is attached to the worker VPC.
44

5-
These approaches provide a reasonable level of security, satisfy a number of compliance controls, and might be sufficient for a number of industries and enterprises. If you want more security and need to comply with different controls, consider the following information to set a more secure and compliant posture.
5+
These approaches may be sufficient for a number of industries and enterprises. However, if you want more security and need to comply with different controls, consider the following information to set a more secure and compliant posture.
66

77
## Other ways to provide operator access
88

@@ -12,7 +12,7 @@ Some secure options to consider for providing network connectivity to the manage
1212

1313
![Client-to-site VPN](../images/part-1/50-c2s.png)
1414
- A [site-to-site VPN](https://cloud.ibm.com/docs/vpc?topic=vpc-using-vpn) to connect the management VPC to another private network. The landing zone deployable architecture creates a site-to-site gateway for this purpose.
15-
- Direct LInk, which extends an organization data center network. For a starting point with more details, see [Connecting application provider to the management VPC](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-management).
15+
- Direct Link, which extends an organization data center network. For a starting point with more details, see [Connecting application provider to the management VPC](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-management).
1616

1717
From a compliance perspective, record all interactive operator actions with a bastion solution. Operators connect through the bastion, which records all interactive session actions for auditing. For more information, see [Running operator actions through a bastion host
1818
](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-bastion) in the IBM cloud Framework for Financial Services docs. For a tutorial that uses the 3rd-party solution Teleport, see [Setting up a bastion host that uses Teleport](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-connectivity-bastion-tutorial-teleport).

0 commit comments

Comments
 (0)