This CloudFormation script will create the following:
- One Aviatrix Controller EC2 Instance (named AviatrixController).
- One Aviatrix Security Group (named AviatrixSecurityGroup).
- One Aviatrix Role for EC2 (named aviatrix-role-ec2) with corresponding role policy (named aviatrix-assume-role-policy). Click here for this policy details
- One Aviatrix Role for Apps (named aviatrix-role-app) with corresponding role policy (named aviatrix-app-policy) Click here for this policy details
- An existing VPC.
- A public subnet on that VPC.
- An internet gateway attached to the VPC.
- KeyPair.
- In order to use the Aviatrix Controller first you need to accept the terms and subscribe to it in the AWS Marketplace. Click here
Note: this script does NOT check that the subnet selected is on the same VPC selected, you need to make sure you are selecting the right combination.
Note 2: this script does NOT check that an Internet Gateway is created and attached to the VPC. If this is missing there will be no way to access the Aviatrix Controller.
-
Access your AWS Console.
-
Under Services -> Management Tools.
Select CloudFormation.
OR
Search for CloudFormation.
-
At the CloudFormation page, Select Create stack.
-
On the next screen, Select "Upload a template to Amazon S3".
Choose file -> AVIATRIX_CONTROLLER_CLOUDFORMATION.template
Note: the Aviatrix Controller CloudFormation template(s) can be found/downloaded from this project.
-
Click next.
-
On the Stack Name textbox, Name your Stack -> Something like AviatrixController
-
Select the following parameters:
- VPC
- Subnet
- KeyPair Name
- Controller Size selection
- Aviatrix IAMRole (select New if this is the first time you are launching Aviatrix Controller, i.e., no aviatrix-role-ec2 IAM role and associated security policies have been created.)
-
Click next
-
Especify your options/tags/permissions as per your policies, when in doubt just click next.
-
On the review page, scroll to the bottom and check the button that reads: I acknowledge that AWS CloudFormation might create IAM resources with custom names.
-
Click on Create.
-
Verify that the instance, roles and policies has been created and associated accordingly.
-
Enjoy! You are welcomed!
- There is no current automated way to check if the VPC/Subnet/IGW are all in place and correctly configured. Manual creation of those elements is required.