Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Introduction to Abiquo and AWS

In the AWS integration, Abiquo creates VPCs with NAT support with a public subnet, and allows virtual machines on different subnets to be connected to the same load balancer. Abiquo now supports the AWS gateway address as the first address in the network.

Abiquo now configures VPC networking Scenario 2 as described in the AWS documentation http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenario2.html
Under this configuration, users must attach Elastic IPs to virtual machines with a connection to the public subnet. And by default, virtual machines in private networks will have internet access through the public subnet. This is helpful for automation because a virtual machine can now connect to the internet to download its configuration, for example, using Chef, without an Elastic IP.

Diagram of how Abiquo creates a VPC in AWS with a NAT gateway

VPC and Subnet

When you create an Abiquo virtual datacenter in an AWS public datacenter, Abiquo creates a VPC of size /16 and a subnet of size /24 (or as defined by the user). The default CIDR for the VPC and the subnet is 192.168.0.0, which is the default private network in Abiquo. You can set a custom private network in Abiquo and this network will be used to create the VPC and subnet in Abiquo. You can create multiple Abiquo private networks in different availability zones in the same VPC.

AWS Reserves IP Addresses

AWS reserves five IP addresses in your private networks. It reserves the first four IP addresses and the last IP address of the VPC private connect network. These IP addresses are not displayed or used by Abiquo. Therefore the first available IP address in a network that is defined to start with address 0, will be address 5, and the gateway address will be address 1.

For example, in the default_private_network with network address 192.168.0.0, the following addresses would be reserved or used as the gateway.

IP AddressNotes
192.168.0.1Reserved by AWS, default gateway address
192.168.0.2Reserved by AWS
192.168.0.3Reserved by AWS
192.168.0.4Reserved by AWS
192.168.0.254Reserved by AWS

Internet Access

Abiquo creates a route table that is equivalent to the AWS route table with the values of the Abiquo private network. You can use the AWS NAT instance for Internet access from the Abiquo virtual datacenter private network. You can acquire floating public IPs for your virtual datacenter and in AWS, these will be created as Elastic IPs with public network addresses. Note that AWS may charge for Elastic IPs when they are NOT in use, i.e. when they are not assigned to a virtual machine or when the virtual machine is not deployed in AWS. In Abiquo 4.0+, you must assign the Elastic IPs to virtual machines with connections to the Public subnet.

Security

By default Abiquo assigns instances to the default VPC security group. This means that by default, all outbound traffic from instances is allowed. Enterprise administrators should configure an Abiquo firewall. Abiquo will create an AWS Security group in the VPC when this firewall is assigned to a virtual datacenter. Users can synchronize their firewalls with AWS, which will import existing security groups. The most basic configuration is to allow SSH inbound traffic, for example, port 22, which will allow SSH connections to the machine through a public IP, NAT, or from a private IP within the virtual datacenter. See AWS Security Groups as Abiquo Firewalls.

Number of IP Addresses per VM

Abiquo supports multiple IP addresses in the AWS integration. You can synchronize existing virtual machines with multiple IP addresses and create multiple IP addresses through Abiquo, including multiple Elastic IPs. 

Abiquo supports the number of IP addresses supported by the AWS hardware profile (instance type). See http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html#AvailableIpPerENI

If the user adds multiple IPs in the same subnet, Abiquo adds them to the same elastic network interface. And if the IPs are in a different subnet, Abiquo adds them to a different elastic network interface. For information about Elastic Network Interfaces, see http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html

How Abiquo Creates a Virtual Private Cloud

Unable to render {include} The included page could not be found.

AWS Features

This table describes AWS features offered in the public cloud integration as well as Abiquo features that add important multi-cloud functionality.

See AWS integration for full details of the Abiquo Amazon Web Services integration.

AWS feature

Support

Comments

Partner accounts

(tick)

Add a partner account for each hierarchy of tenants

All regions

(tick)

Amazon may require separate credentials for groups of regions.
For example, for regions in China the user will need separate credentials and they should select the appropriate provider, such as Amazon (CHINA).

Hardware profiles

(tick)

Onboard hardware profile families and types

Pricing

(tick)

Onboard prices for hardware profiles, manage a markup, and use prices in estimates, usage metering, and billing

Billing dashboard

(tick)

Obtain and display the provider billing data including the latest bills and estimated bill.
See Hybrid for examples, and for configuration instructions see Display cloud provider billing data

Billing

(tick)

Incorporate AWS billing data into a single bill for the multi-cloud platform




Configure and remove VMs

(tick)

When you create a VM, select the hardware profile

Reconfigure VMs

(tick)


Power on VM

(tick)


Power off VM

(tick)


Reset VM

-


Pause and resume VM

-


Storage

(tick)

  • Volumes are EBS disks. Users can onboard and create volumes, and attach them to VMs as auxiliary disks

  • You can onboard a VM with delete on termination disks

  • EBS Encryption is supported

See Abiquo and AWS storage

Take a VM snapshot

(tick)

The VM must be powered off in Abiquo, although the actual VM is not powered off.  
You can only create an instance (private EBS image) from a VM using an EBS image.

Remote access

(tick)

Open a console window to access your VM using your SSH key registered in Abiquo

Create and delete networks

(tick)

Users can specify the network address space, and create private and public subnets

Create and delete VPNs

(tick)

From private cloud (NSX-T) to AWS

Create and delete VPCs

(tick)


Create and manage firewall policies

(tick)

AWS security groups

Use Chef

(tick)

Enterprise Chef or your own server

Use Chef attributes

(tick)


VM bootstrap scripts

(tick)

Users can work with shell scripts or cloud-init to automate VM configuration  

VM variables

(tick)

The variables are stored on the VM filesystem in ~/vm-variables.rc

Load balancing

(tick)

Abiquo supports Classic load balancers and Application load balancers

Import and synchronize

(tick)

  • To onboard resources, the public cloud region must be created in AWS and enterprise must have credentials registered

  • Entities that you can onboard and synchronize: VPCs, VMs, networks, firewalls, load balancers

VM monitoring and metrics

(tick)

With Abiquo monitoring and metrics server

Deploy AMI from AWS marketplace

-

Abiquo cannot deploy an AMI from the AWS marketplace because Abiquo cannot display the EULA to the end user.
However, you can deploy in the Amazon cloud native interface and onboard in the platform.

Import VM template
from private cloud datacenter

(tick)

Use compatible templates prepared according to provider instructions. See VM Template Mobility

Automated actions

(tick)

Abiquo can run action plans on VMs

Autoscaling

(tick)

Abiquo can automatically clone VMs or undeploy VMs to match your changing application needs

AWS Synchronization

Unable to render {include} The included page could not be found.

Unable to render {include} The included page could not be found.

AWS Firewalls

See Manage Firewalls

AWS Load balancers

Abiquo supports AWS load balancers.

To configure the integration:

  • Set Abiquo Configuration Properties#amazon for the healthy threshold of machines in AWS in the abiquo.properties file. 
  • The Load balancer UI options can be configured in the client-config-custom.json file. See Configure Abiquo UI
  • The specifications of the load balancer integration are described in the following table.

Unable to render {include} The included page could not be found.

See Manage Load Balancers

Manage load balancers using the API

The following resources can be used to manage load balancers in the API:

Unable to render {children}. Page not found: LoadBalancerResource.

There are also methods related to managing load balancers in the following resources: 

  • No labels