Skip to content

Commit 8f731bc

Browse files
committed
docs: editorial review of part 1
review for IBM style, grammar, terminology, and for consistency. Signed-off-by: Allen Dean <[email protected]> Addresses:
1 parent bd70137 commit 8f731bc

6 files changed

+250
-161
lines changed

Diff for: docs/part1/00-objectives.md

+26-17
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,39 @@
1-
# Part 1: End-to-end deployment of a sample web application on top of a secure VPC-topology
1+
# Part 1: End-to-end deployment of a sample web application on a secure VPC topology
22

3-
This section of the lab walks through the steps to provision a secure VPC-based topology aligned with the with Financial the **VSI on VPC landing zone** Deployable Architecture as show in the diagram below.
3+
In part 1, you provision a secure VPC-based topology that is aligned with the **VSI on VPC landing zone** deployable architecture, as shown in the following diagram.
44

55
![](https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-landing-zone/main/reference-architectures/vsi-vsi.drawio.svg 'size=60%' )
66

7-
We will then manually customize the deployed infrastructure to:
8-
1. Expose one of the VSI in the management VPC to act as a "jump box" for operator access. This jump box is the entry point for operators to access the VSIs in the workload VPC.
9-
2. Deploy an Apache server in a VSI in the workload VPC.
10-
3. Expose the web pages served by the Apache service to the internet through a public load balancer.
117

8+
After you provision the VPC, you customize the deployed infrastructure in the following ways:
9+
- Expose one of the VSI in the management VPC to act as a "jump box" for operator access. This jump box is the entry point for operators to access the VSIs in the workload VPC.
10+
- Deploy an Apache server in a VSI in the workload VPC.
11+
- Expose the web pages that are served by the Apache server to the internet through a public load balancer.
1212

1313
## Lab Prerequisites :white_check_mark:
1414

1515
?> _TODO_ review
1616

17+
Make sure that you meet the following prerequisites before you begin the lab.
1718

18-
- An IBM Cloud Pay-As-You-Go or Subscription account.
19-
:information_source: **Note**: Participants in the TechXchange classroom will be provided with credentials to access an IBM Cloud account for the duration of the lab.
20-
- An IBMId
21-
- API Key with the following permissions...
19+
- IBM Cloud
20+
- An IBM Cloud Pay-Go or Subscription account
2221

23-
A development machine with the following software:
24-
- [Terraform](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/install-cli)
25-
- Text editor of your choice
26-
- Web browser
27-
- Tools to generate SSH key. Linux and Mac comes with ssh-keygen. [PuTTYgen](https://www.ssh.com/academy/ssh/putty/windows/puttygen) can be used on Windows. See [Generating an external SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys&interface=ui#generating-ssh-keys)
28-
- Optional: [IBM Cloud CLI](https://cloud.ibm.com/docs/cli?topic=cli-getting-started)
22+
:information_source: **Note**: Participants in the TechXchange classroom will be provided with credentials to access an IBM Cloud account during the lab.
23+
- An IBMid
24+
- API key with the following permissions
2925

30-
:information_source: **Note**: Participants in the TechXchange classroom will be provided with a development VM with pre-installed software.
26+
?> _TODO_ review
27+
28+
- A development computer with the following software.
29+
- [Terraform](https://developer.hashicorp.com/terraform/tutorials/aws-get-started/install-cli)
30+
- Text editor of your choice
31+
- Web browser
32+
- Tools to generate SSH key
33+
- Linux and Mac come with ssh-keygen.
34+
- Windows users can use [PuTTYgen](https://www.ssh.com/academy/ssh/putty/windows/puttygen)
35+
36+
For more information, see [Generating an external SSH key](https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys&interface=ui#generating-ssh-keys).
37+
- Optional: [IBM Cloud CLI](https://cloud.ibm.com/docs/cli?topic=cli-getting-started)
38+
39+
:information_source: **Note**: Participants in the TechXchange classroom will be provided with a development VM with the prerequisite software installed.

Diff for: docs/part1/10-project.md

+75-53
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,75 @@
1-
# Deploying Landing Zone VSI pattern through IBM Cloud Project
2-
3-
1. On your machine, create an SSH key pair via the command:
4-
```
5-
ssh-keygen -t rsa -b 4096 -N '' -f ./lab-key
6-
```
7-
This command generates two files in the current directory: `lab-key` (the private key) and `lab-key.pub` (the public key).
8-
Verify that the keys have been created in the current directory.
9-
```
10-
ls lab-key*
11-
```
12-
This should return:
13-
```
14-
lab-key lab-key.pub
15-
```
16-
2. Access the [VSI on VPC landing zone Deployable Architecture](https://cloud.ibm.com/catalog/architecture/deploy-arch-ibm-slz-vsi-ef663980-4c71-4fac-af4f-4a510a9bcf68-global?catalog_query=aHR0cHM6Ly9jbG91ZC5pYm0uY29tL2NhdGFsb2cjcmVmZXJlbmNlX2FyY2hpdGVjdHVyZQ%3D%3D)
17-
3. On the Overview page, make sure the following is selected:\
18-
a. Product version: **Select the latest** (4.4.7 at the time of writting)
19-
20-
b. Variation: Standard
21-
![Overview page](../images/part-1/10-overview-page.png)
22-
4. Click **Review deployment options** on the bottom right
23-
5. Click **Add to project**
24-
6. Under _Create New_, input a name that you wish to provide to the project. For example "\<your initials\> Landing Zone Lab"
25-
7. Click **Add** on the bottom right
26-
8. Under _Configure -> Security_ section, set the following:\
27-
a. Authentication: untoggle _Use a secret_ and paste your IBM Cloud API key input the box
28-
29-
9. Under _Configure->Required_ section, set the following:\
30-
a. `ssh_public_key`: The value of lab-key.pub that was generated from step 1\
31-
b. `region`: Select a region that you wish to deploy in\
32-
c. `prefix`: your initials
33-
![Configuration](../images/part-1/10-configuration.png)
34-
35-
10. Under _Configure-> Optional_, set the following:\
36-
a. `add_atracker_route`: false
37-
11. Click **Save**
38-
12. Click **Validate**
39-
13. The project will go through different steps in validation. When it completes, the validation is marked as successful. In the _Approval pending_ section, add a comment and click **Approve** to start provisioning.
40-
41-
![Validation](../images/part-1/10-validation.png)
42-
43-
14. Click **Deploy**
44-
45-
46-
:information_source: **Note**: The deploy will take approximately 15 minutes to complete. Some suggestions during this time:
47-
- You may following the execution logs. Of interest:
48-
![Deployment](../images/part-1/10-deployment.png)
49-
- The terraform plan steps shows the list of resources that are going to be created.
50-
- The terraform apply steps shows the resources that are being created.
51-
- You may also navigate to the [VPC section](https://cloud.ibm.com/vpc-ext/vpcLayout) and the [resource list](https://cloud.ibm.com/resources) in your account to see the resources starting to spawn up as you refresh the screen during the execution.
52-
- Explore in more details some of the materials in the [introduction section](README)
53-
- Coffee ☕
1+
# Deploying the Landing Zone VSI pattern through IBM Cloud projects
2+
3+
1. On your computer, create an SSH key pair by issuing the following command:
4+
5+
```sh
6+
ssh-keygen -t rsa -b 4096 -N '' -f ./lab-key
7+
```
8+
9+
This command generates two files in the current directory: `lab-key` (the private key) and `lab-key.pub` (the public key.
10+
11+
List the keys exist in the current directory with the following command:
12+
13+
```sh
14+
ls lab-key*
15+
```
16+
17+
If the SSH key pair succeeded, the output lists them:
18+
19+
```sh
20+
lab-key lab-key.pub
21+
```
22+
23+
1. Add the deployable architecture to a project:
24+
25+
1. Access the [VSI on VPC landing zone Deployable Architecture](https://cloud.ibm.com/catalog/architecture/deploy-arch-ibm-slz-vsi-ef663980-4c71-4fac-af4f-4a510a9bcf68-global?catalog_query=aHR0cHM6Ly9jbG91ZC5pYm0uY29tL2NhdGFsb2cjcmVmZXJlbmNlX2FyY2hpdGVjdHVyZQ%3D%3D) in IBM Cloud.
26+
1. On the VSI on VPC landing zone details page, make sure that the following settings are selected:
27+
a. Product version: **Select the latest** (`4.4.7`` at the time of writing).
28+
b. Variation: `Standard`
29+
30+
![Details page](../images/part-1/10-overview-page.png)
31+
32+
1. Click **Review deployment options** on the lower right.
33+
1. Click **Add to project**.
34+
1. In **Create New**, enter a name for the project. For example, "\<your initials\> Landing Zone Lab". You can leave the other information as is.
35+
1. Click **Add** on the lower right.
36+
37+
1. Configure the project
38+
1. In the **Configure** > **Security** section, specify the following information:
39+
a. Authentication: Clear **Use a secret** and paste in your IBM Cloud API key.
40+
41+
1. In the **Configure** > **Required** section, specify the following settings:
42+
a. `ssh_public_key`: The value of the `lab-key.pub` file that you generated in step 1.
43+
b. `region`: The region that you want to deploy in.
44+
c. `prefix`: Your initials.
45+
46+
![Configuration](../images/part-1/10-configuration.png)
47+
48+
1. In the **Configure** > **Optional**, set the following options:
49+
a. `add_atracker_route`: `false`.
50+
1. Click **Save**.
51+
52+
1. Validate and deploy the deployable architecture:
53+
1. Click **Validate**.
54+
55+
The project runs through several validation steps. When it finishes, the validation is marked as successful. In the **Approval pending** section, add a comment and click **Approve** to start provisioning.
56+
57+
![Validation](../images/part-1/10-validation.png)
58+
59+
1. Click **Deploy**
60+
61+
:information_source: **Tip**: Deployment takes approximately 15 minutes to complete.
62+
63+
1. While you wait for the deployment to finish, consider doing these things:
64+
65+
- Look at the deployment logs:
66+
- The Terraform plan steps show the list of resources that are going to be created.
67+
- The Terraform apply steps shows the resources that are being created.
68+
69+
Example:
70+
71+
![Deployment](../images/part-1/10-deployment.png)
72+
73+
- Go to the [VPC section](https://cloud.ibm.com/vpc-ext/vpcLayout) and the [resource list](https://cloud.ibm.com/resources) in your IBM Cloud account. Refresh the screen to see the resources that are created during deployment.
74+
- Explore some of the materials in the [introduction](README) to this lab.
75+
- Have a coffee ☕

Diff for: docs/part1/20-operator-access.md

+34-21
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,53 @@
11
# Providing operator access to the VPC landing zone
22

3-
## Introduction
3+
## Overview of operator access
44

5-
By default, network access to the VPC landing zone topology is locked down for security compliance reasons. In this section, you will open up the necessary access for an operator to access the VPC environment, including deploying application on the VSIs located in the workload VPC.
5+
By default, network access to the VPC landing zone topology is locked down for security compliance reasons. In this part of the lab, you open the necessary access for an operator to access the VPC environment, including deploying application on the VSIs located in the workload VPC.
66

7-
Operator access is provided through the _Management VPC_. There are multiple ways to give operator access to the VPC landing zone, with varying level of security, compliance, and ease of enablement:
7+
You give operator access through the _Management VPC_. You have several options to give operator access, with varying level of security, compliance, and ease of enablement.
88

99
- Exposing a VSI in the management VPC as a ‘jump-box’ by assigning a public floating IP
1010
- Deploying a client-to-site VPN solution in the management VPC
1111
- Deploying a site-to-site VPN solution in the management VPC
1212
- Deploying a certified bastion solution, such as Gravitational Teleport in the management VPC.
1313

14-
This part of the lab shows how to expose one of the VSI in the management VPC as a 'jump-box', as this is one of the simplest way to proceed, albeit not being strongly secure. The [Going Further](./part1/50-going-further) section below provides links to some of the other ways to provide operator access.
14+
In this lab, you expose one of the VSIs in the management VPC as a 'jump-box'. This method is one of the simplest ways to proceed, although it is not overly secure. The [Going further](./part1/50-going-further) section later in the lab provides links to some of the other ways that you can provide operator access.
1515

1616
## Steps
1717

18-
Perform the following actions to enable public ssh access to one of the VSI in the management VPC. This VSI will be the unique operator entry point ('jump-box') to the landing zone VPC topology.
18+
Complete the following steps to enable public SSH access to one of the VSI in the management VPC. This VSI is the unique operator entry point ('jump-box') to the landing zone VPC topology.
1919

20-
1. Access the [Virtual server instances for VPC list](https://cloud.ibm.com/vpc-ext/compute/vs)
21-
2. Verify that the region is set to the region you provisioned your resources and click the VSI labeled _&lt;initials&gt;-management-server-1_
22-
3. Add a Floating IP address by clicking the pencil icon in the Network Interface section and reserve a new floating IP
23-
![Pencil icon](../images/part-1/20-network-int-pencil.png)
20+
1. Access the [Virtual server instances for VPC list](https://cloud.ibm.com/vpc-ext/compute/vs).
21+
2. Verify that the region is set to the region you provisioned your resources and click the VSI labeled `<your_initials>-management-server-1`.
22+
3. Add a floating IP address by clicking the pencil icon in the Network Interface section. Reserve a new floating IP address.
2423

25-
![Floating IP](../images/part-1/20-floating-ip.png)
24+
![Pencil icon](../images/part-1/20-network-int-pencil.png)
2625

27-
4. Take note of the public Floating IP. This IP will be used in a subsequent step.
28-
5. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one labelled _&lt;initials&gt;-management_
29-
6. Go to the Rules section and allow port 22 for inbound by clicking **Create** in the _Inbound rules_ section (Note: Security groups are stateful so you don’t need to add a corresponding outbound rule)
26+
:exclamation: **Important**: Take note of the public floating IP address. You need it later.
3027

31-
![Allow SSH in Security group](../images/part-1/20-ssh-sg.png)
28+
![Floating IP address](../images/part-1/20-floating-ip.png)
3229

33-
7. Click **Create**
34-
8. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled _&lt;initials&gt;-management-acl_
30+
5. In the [Security Groups for VPC](https://cloud.ibm.com/vpc-ext/network/securityGroups), click the one labeled `<your_initials>-management`.
31+
6. Go to the Rules section and allow port 22 for inbound by clicking **Create** in the _Inbound rules_ section.
32+
33+
:information_source: **Tip**: Security groups are stateful so you don’t need to add a corresponding outbound rule.
34+
35+
![Allow SSH in Security group](../images/part-1/20-ssh-sg.png)
36+
37+
7. Click **Create**.
38+
8. In the [Access control lists for VPC](https://cloud.ibm.com/vpc-ext/network/acl), click the one labeled `<your_initials>-management-acl`.
3539
9. Create the following ACL inbound rule:
36-
![SSH ACL Inbound rule](../images/part-1/20-ssh-acl-inbound.png)
37-
10. Create the folloiwng ACL outbound rule:
38-
![SSH ACL Outbound rule](../images/part-1/20-ssh-acl-outbound.png)
39-
11. You will now be able to access the 'jump-box' through the public Floating IP address that you provisioned in a prior step. On your workstation, issue the following command from a terminal\
40-
`ssh -i ./lab-key root@<Floating IP of Virtual server instance>`
40+
41+
![SSH ACL Inbound rule](../images/part-1/20-ssh-acl-inbound.png)
42+
43+
10. Create the following ACL outbound rule:
44+
45+
![SSH ACL Outbound rule](../images/part-1/20-ssh-acl-outbound.png)
46+
47+
11. You can now access the 'jump-box' through the public floating IP address that you provisioned earlier. On your computer, issue the following command from the terminal or command window:
48+
49+
```sh
50+
ssh -i ./lab-key root@<Floating IP of Virtual server instance>
51+
```
52+
53+
Replace \<Floating IP of Virtual server instance> with the address that you reserved earlier.

0 commit comments

Comments
 (0)