Evaluation Deployment Guide for AWS
Last updated
Last updated
Step 1: Launch the instance with the AMI provided by RagaAI
To initiate the process, please reach out to our team with the following details:
AWS Account ID
AWS Region
Step 2: Create a VPC if not present
Search for "VPC" in the top search bar and select VPC under the Networking & Content Delivery section
Click Create VPC
Select VPC and more and give a Name after checking select box Auto-generate
Keeping all other options default, scroll down and click Create VPC
After creation, you should be able to see the new VPC listed under Your VPCs
Step 3: Create a security group
Navigate to Security Groups via Search
Click on Create Security Group
Provide a name for the group, e.g., CatalystSecurityGroup
Provide a suitable description
Select The VPC created in previous step
Verify Outbound rules are already configures as in image below.
Add the following Inbound Rules:
Add Port 80 and 22 with TCP protocol and Accessible from anywhere
Optional: If you want to restrict access within your VPN, Add ports 22, 80 with the TCP protocol. In the destination, select "Custom" and enter your VPN's public IP. Users also need to add an inbound rule on same CIDR block of EC2 instace for port 80 in such situations.
Review your settings and click on Create Security Group
Remember to note the name of your security group for further steps
Step 4: Create an EC2 instance
Find the section for EC2 from the services search bar
Click on Launch Instance
Provide a name for the instance, e.g., Catalyst
Search the AMI name provided to you by navigating to My AMIs -> Shared with me -> <AMI Name shared>
Note: AMI Name can be different from what is shown in the above image
Select m7g.2xlarge from the list of instance types
Click Create New Key Pair and provide a name, e.g, catalystkey
Hit edit against network settings
Select the VPC created in previous step
Select the public subnet available as in above screenshot
Hit Select existing security group and select your group name noted earlier (CatalystSecurityGroup
)
Click Advanced details, in UserData section insert the token provided on mail.
Review your instance configuration and click “Launch Instance”.
Wait for at least 15 mins for the instance to be in running state.
Note the public IP of the machine. Access the portal via http://<public_ip>
It should render a login page
Please note that API should be available at
http://<ec2_ip>/api
This should be configured for running the experiments.
Note if we are restricting ips in the inbound rules in Step 3, At this point we must add one rule like below
Type - HTTP
Source - Custom and IP as the <ec2_ip>/32 like in below image
Please get login credentials on the mail