Top
PRIMECLUSTER Installation and Administration Guide4.6 Cloud Services
FUJITSU Software

A.1.3 Network Design

The following describes the network configuration required to operate smart workload recovery. Design the network based on the network configuration.

Note

Because the smart workload recovery feature creates an instance when you switch, the switch can be interrupted if your AWS environment runs out of AZ resources.

Because AZ resource exhaustion cannot be predicted in advance, we recommend that you design the following items with all availability zones in the region in mind, rather than limiting the switched to only one availability zone.

  • Subnet Design

  • Ensuring Connectivity with API Endpoints

  • Identifying Mount Targets for EFS

  • Network Inheritance

In the event of AZ resource exhaustion, it is necessary to take measures to add a new switching destination AZ in accordance with "A.3.2.3 Changing the settings of the switch destination AZ".

A.1.3.1 VPC and Subnet Design

Prepare a VPC and create a subnet for each AZ that you want to switch.

Configure your VPC to use DNS. When you create a VPC, you specify the following options. For more information, see the official AWS documentation.

Setting item

Value

DNS hostname

Enabled

DNS resolution

Enabled

Figure A.3 Creating Subnets per AZ

A.1.3.2 Ensuring Connectivity with API Endpoints

To access the API endpoint, deploy the AWS PrivateLink VPC endpoint in all AZ where you deploy cluster nodes.

CloudWatch Agent installed on your instance forwards metrics and logs to the Amazon CloudWatch API endpoint.

If you are creating a VPC endpoint for PrivateLink, specify the following options. For more information, see the official AWS documentation.

Setting item

Value

Description

Service name

monitoring

ec2

logs

Specifies the service that the CloudWatch agent uses.

Private DNS names enabled

Enable

Configure DNS for use.

Figure A.4 Ensuring Connectivity with AWS PrivateLink

A.1.3.3 Verifying EFS Mount Targets

To use EFS from an instance on a cluster node, you must have an EFS mount target on the subnet of all AZ where you deploy the cluster node.

Ensure that you have an EFS mount target for each EFS file system that is required to operate smart workload recovery. For information about EFS file systems required to operate smart workload recovery, see "A.1.4 Disk Design".

A.1.3.4 Network Takeover

Use ELB NLB or ALB for network takeover.

Switcher terminates the instance and launches the instance in a different AZ when failure occurs. At that time, we removed the instances in the target group and added the newly launched instances.

Client access NLB and ALB based on AWS specifications. In the event of a cluster node failure, the instance to which NLB or ALB is forwarded is automatically switched for continued access. For more information on how to access it, see the official AWS documentation.

Figure A.5 ELB Network takeover

An example of NLB is shown above, but it can also be configured with ALB. When configuring with ALB, configure the network, security groups, etc. appropriately to meet your security requirements.

The target group for an ELB or ALB must be an instance. When you create a target group, you specify the following options.

Setting item

Value

Target type

Instance

Note

When handling multiple instances for switching, separate ELBs (NLB or ALB) for each instance and set up network takeover for each instance.

A.1.3.5 Security Groups Design

Describes the security group rule settings.

In addition to the rules listed here, design your security group by adding rules according to your security requirements.

A.1.3.5.1 Rules for Instances

Design the security rules that you want to apply to the cluster nodes.

Add the rules required for the application to work, as well as the following rules.

Inbound rule

Allow access from NLB or ALB. For more information, see the official AWS documentation.

Outbound rule

Destination

Protocol

Port Range

Description

Security groups for VPC endpoints

tcp

443

Used by the CloudWatch Agent to access API endpoints.

Specify the "A.1.3.5.2 Rules That Apply to VPC Endpoints" security group as the destination.

Reserved IP address for Route 53 Resolver

tcp

53

Used to access DNS servers for AWS resources.

EFS mount target security group

tcp

2049

Use to access an EFS mount target.

A.1.3.5.2 Rules That Apply to VPC Endpoints

Design the security rules that you want to apply to your VPC endpoint.

Add the following rules to your security group.

Inbound rule

Destination

Protocol

Port Range

Description

Security groups that you configure for instances on cluster nodes

tcp

443

Allow access from instances on cluster nodes. Specify the "A.1.3.5.1 Rules for Instances" security group as the destination.

Outbound rule

None

A.1.3.5.3 Rules for EFS Mount Targets

Design the security rules to apply to mount targets for EFS.

Add the following rules to your security group.

Inbound rule

Destination

Protocol

Port Range

Description

Security groups that you configure for instances on cluster nodes

tcp

2049

Allow access from instances on cluster nodes. Specify the "A.1.3.5.1 Rules for Instances" security group as the destination.

Outbound rule

None

A.1.3.5.4 Rules for Blackhole Security Group

Blackhole security group is a security group that blocks all traffic. Blackhole security groups are used by switcher.

Create blackhole security group with the following rules.

Inbound rule

None

Outbound rule

None