Deploy Director AMIs
Overview
You can use the Director Amazon Machine Images (AMIs) to launch the following instances in the Amazon Web Services (AWS) platform:
Fabric Server
API Server
LPSM
This guide helps you access and deploy the Director AMIs in your AWS space.
Installation Sequence of Director AMIs
To install the Director AMIs:
Install the Fabric Server. To learn more, see the Installation of Fabric Server section.
Install the API Server. To learn more, see the Installation of API Server section.
Install LPSM. To learn more, see the Install Director LPSM section.
Version Compatibility for Director AMIs
To properly configure the Director AMIs, the versions of Fabric Server, API Server, LPSM and Logpoint must be compatible with each other, as listed below:
API Server
Fabric Server
LPSM
Director Console
Logpoint
v2.9.1
v2.9.1
v2.9.0
v2.9.1
v7.4.0 and later
v2.8.0
v2.8.0
v2.8.0
v2.8.0
v7.3.0 and later
v2.6.1
v2.6.1
v2.6.0
v2.6.0
v7.1.0 and later
v2.5.0
v2.5.0
v2.5.0
v2.5.0
v7.0.0 and later
v2.3.0
v2.3.0
v2.3.0
v2.3.0
v6.11.0 and later
v2.2.0
v2.2.0
v2.2.0
v2.2.0
v6.10.0 and later
v2.0.0
v2.0.0
v2.0.0
v2.0.0
v6.9.0 - 7.0.2
Director Installation
To install Fabric Server, see Installation of Fabric Server.
To install API Server, see Installation of API Server.
Director Upgrade
To upgrade Director patches, see Upgrade Director.
Change Network Information
To change network information, see Changing the Network Information.
Configure Public IP for Fabric Servers
To configure public IP for Fabric Servers, see Configuring Public IP for Fabric Servers.
Access the AWS Account Number
While we provide AWS-specific instructions in this guide, it’s important to be aware that the AWS interface may change over time. To ensure you have the most up-to-date information and to navigate any potential changes in the AWS interface, we recommend referring to the official AWS documentation or AWS Support resources.
Access the AWS Account Number
Log in to AWS Management Console.
Click the Support in the top-right corner.

Click Support Center.
Your Account number is in the top-left corner.

Select the Deployment Region
Select the Deployment Region
Log in to AWS Management Console.
In the top-right corner, find your deployment region in the list and select it.

Receive the Director AMIs
Contact the Logpoint Sales team and provide your AWS Account Number and Deployment Region to receive the:
Fabric Server AMI
API Server AMI
LPSM AMI
Deploy the Director AMIs
Deploy in the following order:
Fabric Server AMI
API Server AMI
LPSM AMI
You must deploy the Fabric Server AMI and install the Fabric applications before deploying the API Server AMI.
You must plan the IP addresses for the AMIs before configuring security groups.
Zpool related SNMP and diagnostic metrics are unavailable for the Director AMIs.
If you are deploying the Fabric Server AMI in cluster mode or scaling the Fabric Server instances, you must create a route table. A route table ensures the network traffic is directed correctly. To learn how, go to Creating a Route Table.
Configure Security Groups
Log in to AWS Management Console.
In All services, find and select EC2.

In Network & Security, find and select Security Groups.

Click Create security group.

Enter a Security group name and a Description. You cannot edit them once you create the security group.
Search and select the security group’s VPC (Virtual Private Cloud).
Add rule for Inbound rules and Outbound rules for the Director AMIs:
a. Inbound Rules:
Type
Protocol
Port range
Source (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the Fabric Server from the specified sources.
Custom TCP
TCP
22
CIDR blocks or IP addresses
Connect to the Fabric Server using SSH from the API Server, LPSM, user’s machine, and Logpoint instances.
Custom UDP
UDP
1194
CIDR blocks or IP addresses of the API Server, LPSM, and Logpoint instances
Communicate with the Fabric Server.
Inbound Rules for a Fabric Server in Standalone Mode
Type
Protocol
Port range
Source (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the Fabric Server from the specified sources.
Custom TCP
TCP
22
CIDR blocks or IP addresses
Connect to the Fabric Server using SSH from the API Server, LPSM, user’s machine, and Logpoint instances.
Custom UDP
UDP
1194
CIDR blocks or IP addresses of API Server, LPSM, and Logpoint instances
Communicate with the Fabric Server.
Custom TCP
TCP
88, 464, 749, 750, 754, 2181, 2121, 8485, 9000, 10004, 10006, 50020, 50475, 51070, 2888, 3888
CIDR blocks or IP addresses
Communicate with the Fabric Server instance from other Fabric Server instances.
Custom UDP
UDP
88, 464, 750
CIDR blocks or IP addresses
Establish a connection to the Fabric Server instance from other Fabric Server instances.
Inbound Rules for Fabric Server Instances in Cluster Mode

Type
Protocol
Port range
Source (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the clients (API Server, LPSM, and Logpoint instances) from the specified sources.
Custom TCP
TCP
22
CIDR blocks or IP addresses
Connect to the clients (API Server, LPSM, and Logpoint instances) using SSH from the user machine and the Fabric Server.
Custom TCP
TCP
443
User machines’ IP addresses
Use clients’ (API Server, LPSM, and Logpoint instances) web services.
Inbound Rules for the API Server, LPSM, and Logpoint Instances in Standalone Mode and Cluster Mode
b. Outbound Rules:
Type
Protocol
Port range
Destination (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the specified sources from the Fabric Server.
Custom UDP
UDP
123
CIDR blocks or IP addresses
Connect to the NTP server.
Custom UDP
UDP
53
CIDR blocks or IP addresses
Connect to the DNS server.
Custom UDP
UDP
1193
Logpoint support’s IP address
Connect to Logpoint support.
All traffic
All
All
CIDR blocks or IP addresses of clients - API Server, LPSM, and Logpoint instances
Connect to API Server, LPSM, and Logpoint instances.
Outbound Rules for a Fabric Server Instance in Standalone Mode
Type
Protocol
Port range
Destination (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the specified sources from the Fabric Server instances.
Custom UDP
UDP
123
CIDR blocks or IP addresses
Connect to the NTP server.
Custom UDP
UDP
53
CIDR blocks or IP addresses
Connect to the DNS server.
Custom UDP
UDP
1193
Logpoint support’s IP address
Connect to Logpoint support.
All traffic
All
All
CIDR blocks or IP addresses of clients - API Server, LPSM, and Logpoint instances
Connect to API Server, LPSM, and Logpoint instances.
Custom TCP
TCP
88, 464, 749, 750, 754, 2181, 2121, 8485, 9000, 10004, 10006, 50020, 50475, 51070, 2888, 3888
CIDR blocks or IP addresses
Communicate with other Fabric Server instances.
Custom UDP
UDP
88, 464, 750
CIDR blocks or IP addresses
Establish a connection with other Fabric Server instances from this instance.
Outbound Rules for Fabric Server Instances in Cluster Mode
Type
Protocol
Port range
Destination (Custom)
Description
All ICMP - IPv4
ICMP
All
CIDR blocks, security groups, IP addresses, or prefix lists
Ping the clients from the specified sources.
Custom UDP
UDP
123
CIDR blocks or IP addresses
Connect to the NTP server.
Custom UDP
UDP
53
CIDR blocks or IP addresses
Connect to the DNS server.
Custom UDP
UDP
1193
CIDR block or IP address of the Fabric Server
Establish a connection to the Fabric Server.
Outbound Rules for the API Server, LPSM, and Logpoint Instances in Standalone Mode and Cluster Mode
Select an AMI and Launch the Instances
Log in to AWS Management Console.
In All services, find and select EC2.

In Images, select AMIs.
Select Private images in the drop-down next to the search bar.

Find the relevant AMI in the list and right-click it.
Click Copy AMI.

In Copy AMI:
Select the Destination region.
Enter a Name and a Description.
Select Encrypt target EBS snapshots and select a Master Key to encrypt the target snapshots.
Click Copy AMI.
Select Owned by me from the drop-down next to the search bar.
Select the AMI and click Launch. You are redirected to the Launch instance wizard. To launch AMI without enabling EBS encryption, select Private Images from the drop-down, select the AMI, and click Launch.

Select a suitable Instance Type from the list.
Type
vCPUs
Memory (GiB)
t2.xlarge
4
16
Type
vCPUs
Memory (GiB)
t2.large
2
8
Click Next: Configure Instance Details.

Enter the Number of instances to launch.
Select the Network where you want to launch the AMI, also known as Amazon Virtual Private Cloud (VPC).
You can also Create new VPC.
Select a Subnet for the AMI.
You can also Create new subnet.
Select Auto-assign Public IP. AWS provides public IPv4 addresses to the instances in the default subnet.
Select a Shutdown behavior. Select:
Stop to stop the instance at shut down.
Terminate to delete the instance at shut down.
Enable termination protection if you want to protect the instances from accidental termination.
To learn what the other configurations options do, go to the AWS documentation.
Click Next: Add Storage.

Enter the Size (GiB) and select the Volume Type for your instance. You need at least 100 GiB for the Fabric Server and API Server instances and 80 GiB for the Logpoint and LPSM instances.
Click Next: Add Tags.

Click Add Tag to add a tag to your instances, volumes, and network interfaces. Tags improve your search or filter results.
Click Next: Configure Security Group.

In Assign a security group, select Select an existing security group.
Select the security group created earlier. For details, go to Configuring Security Groups.
Click Review and Launch.
Review the configurations and click Launch Instances.
Select Create a new key pair from the drop-down. You need a key pair to establish an SSH connection with the Director setup.

If you already have an RSA key pair, select Choose an existing key pair.

Select RSA Key pair type.
Enter a key pair name and click Download Key Pair.
Click Launch Instances. You can click the instance ID to view the launch status.
If you have any issues, contact the Logpoint support team. They will need your Director support connection details to fix the issue.
Access Director AMIs
Access the Fabric Server Instance
Log in to AWS Management Console.
In All services, find and select EC2.
Click the Instances drop-down on the left and select Instances.
If you deploy the Fabric Server instances in cluster mode, you must stop the source/destination check. To stop the source/destination check:
Right-click the Fabric Server instance and select
Networking >> Change source/destination check.
Select Stop and click Save.
Select the Fabric Server instance and note the IPv4 address (Public IPv4 address or the Private IPv4 address) used in the security groups.
Open the command prompt in your local machine and browse to the folder where you have downloaded the key pair.
Execute the following command:
Example:
Establish an SSH connection with the Fabric Server using the following command:
Example:
To learn how to install the Fabric Server instance in standalone or cluster modes, go to the Installation of Fabric Server section.
Create a Route Table
Log in to the Fabric Server Console.
Execute the
ifconfig tun0command.Note the value of the
inet addrparameter. You need this value to know the Fabric Server’s tunnel network address.Calculate the tunnel network address using the value of
inet addr- change the last octate ofinet addrto 0 and set the subnet mask to 24.Example:
Log in to AWS Management Console.
In All services, find and select EC2.
Click the Instances drop-down on the left and select Instances.
Click the Instance ID of your instance.
Click the VPC ID.
Your route table and the Fabric Server instances must be in the same VPC.
Find the Main route table column and click the route table ID.

Click the Routes tab and click Edit routes.

Click Add route to add a new route.

Enter a Fabric Server instance’s tunnel network address as the Destination and its instance ID as the Target.
Click Save changes.
Access the API Server Instance
Deploy the Fabric Server instance and install the Fabric applications before accessing the API Server instance. To learn how, see the Installation of Fabric Server section.
Log in to AWS Management Console.
In All Services, find and select EC2.
In Instances, select Instances.
Select the API Server instance and note the IPv4 address (Public IPv4 address or the Private IPv4 address) used in the security groups.
Open the command prompt in your local machine and browse to the folder where you have downloaded the key pair.
Execute the following command:
Example:
Establish an SSH connection with the API Server using the following command:
Example:
For details, go to the Installation of API Server section.
Access Director Console
Install the API Server before accessing Director Console. For details, go to the Installation of API Server section.
Log in to AWS Management Console.
In All services, find and select EC2.
In Instances, select Instances.
Select the API Server instance and note the IPv4 address (Public IPv4 address or the Private IPv4 address) used in the security groups.
Enter the IPv4 address in your web browser and connect to Director Console.
Example:
Log in to Director Console using the following credentials:
We recommend you change the password immediately after the first login.
Upload a Director license. For details, go to the Uploading a Director License section.
Access LPSM
Log in to AWS Management Console.
In All services, find and select EC2.
In Instances, select Instances.
Select the LPSM instance and note the IPv4 address (Public IPv4 address or the Private IPv4 address) used in the security groups.
Enter the IPv4 address in your web browser and connect to LPSM.
Example:
Log in to LPSM using the following credentials:
We recommend you change the password immediately after the first login.
Go to
System >> System Settings >> Generalin LPSM and set the IPv4 address of the LPSM instance as its Server Alias.
Do not use the change-ip command to change LPSM’s IP addresses, gateway, and netmask. AWS environment does not allow these changes after launching the instances.
Director AMIs Commands
The following commands are exposed to the Director AMIs:
growpart
Use the growpart command to extend the partition of the root volume.
resize2fs
Use the resize2fs command to resize the ext4 file systems.
Before extending a file system containing valuable data, create a snapshot of the volume if you need to roll back your changes.
For other commands, see the Director Fabric Commands, LPSM Commands, and Director Console Commands guides.
Last updated
Was this helpful?