End-to-End Process for Deploying Threat Defense Virtual Cluster on AWS
Template-based Deployment
The following flowchart illustrates the workflow for template-based deployment of the Threat Defense Virtual cluster on AWS.
Workspace |
Steps |
|
---|---|---|
Local Host | Download templates and files from GitHub. | |
Local Host | Modify infrastructure.yaml and deploy_ngfw_cluster.yaml templates. | |
Local Host | Update the Configuration.json file with initial settings. | |
Linux Host | Create cluster_layer.zip file. | |
Local Host | Copy cluster_layer.zip file to the Lambda python files folder. | |
Local Host | Create cluster_manager.zip and cluster_lifecycle.zip files. | |
Local Host | Build zip files from Python files for Lambda functions and copy to target folder. | |
AWS Console | Deploy infrastructure.yaml template. | |
AWS Console | Upload cluster_layer.zip, cluster_lifecycle.zip, and cluster_manager.zip, to the S3 bucket. | |
AWS Console | Deploy deploy_ngfw_cluster.yaml template. | |
AWS Console | Log in and verify cluster deployment. |
Manual Deployment
The following flowchart illustrates the workflow for manual deployment of the Threat Defense Virtual cluster on AWS.
Workspace |
Steps |
|
---|---|---|
Local Host | Create day 0 configuration script. | |
AWS Console | Deploy Threat Defense Virtual instance. | |
AWS Console | Attach interfaces to instance. | |
AWS Console | Verify if nodes have joined cluster. | |
AWS Console | Create target group and GWLB; attach target group to the GWLB. | |
AWS Console | Register instances with the target group using data interface IP. | |
Management Center | Register control node. |