Skip to main content

Deploy EDGE on AWS

This section guides you through the steps to get the Anapaya EDGE appliance from the AWS Marketplace up and running.

Prerequisites

Before you can start, you need to have an AWS account. If you do not have one yet, create one on AWS. You also need to have a SCION access into the AWS cloud. If you do not have one yet, contact the Anapaya Customer Success team.

Installation

The Anapaya EDGE appliance is available on the AWS Marketplace, under the name "Anapaya EDGE". The appliance is available in many different regions. After subscribing to the product, you can launch it directly from the AWS Marketplace in your preferred region.

We recommend starting with a t3.medium or similar instance type, which is the smallest instance type that is supported by the appliance. You can always change the instance type later on if you want to increase performance.

warning

Make sure to select an SSH key pair that you have access to. You will need this key pair to connect to the appliance via SSH.

Cloud-Init

You can use cloud-init to further customize the appliance during the launch process, for example to set SSH keys for the anapaya user.

#cloud-config
users:
- name: anapaya
ssh_authorized_keys:
- ...

Refer to the cloud-init documentation for more examples and details.

warning

The Anapaya EDGE appliance will overwrite the SSH keys of the anapaya user as soon as the first configuration is applied. This means that the SSH keys you set in the cloud-init configuration will be removed. If you want to keep the SSH keys, you need to configure them in the appliance configuration during initial configuration.

VPC configuration

We recommend launching the appliance in a VPC that has at least three subnets:

  • One subnet for the management interface (can have Internet access)
  • One subnet for the SCION interface towards the SCION network (IP addressing details provided by your SCION access provider)
  • One subnet to connect the EDGE appliance to your applications
note

If configuring three subnets/interfaces is too complex for your setup, it is possible to use only two subnets and share the management interface with either the SCION or application traffic.

Security group configuration

If you want to access the appliance from the Internet via SSH, you need to configure the security group to allow incoming SSH connections. The appliance uses port 22 for SSH.

Connecting to the appliance

Once the appliance is launched, you can connect to it via SSH. The appliance uses the anapaya user for SSH access and the SSH key pair that you selected during the launch process.

Configuration

After connecting to the appliance, configure it using by following the steps in Setup

warning

The appliance is configured to use DHCP on initial launch. When you start changing the appliance configuration, you should first configure the interfaces section with the DHCP values for the management interface that were assigned by AWS. Otherwise, you might lose connectivity to the appliance.

NAT configuration

In some scenarios you might need to configure NAT on the appliance. Refer to the NAT section in the general configuration guide for more details.

Redundancy

Reach out to the Anapaya Customer Success team when you are interested in integrating Anapaya EDGE with AWS Cloud WAN.

To achieve redundancy, you can deploy two appliances in different Availability Zones and configure them as a cluster. Refer to the Cluster section in the general configuration guide for more details. For a redundant deployment in AWS, we recommend using the BGP integration of the Anapaya EDGE, which can be configured together with AWS Transit Gateway.

The diagrams below show different examples of how you can deploy the Anapaya EDGE appliance in the AWS cloud within and across regions. In the Single and Dual ISP scenarios, the EDGE appliances are run as part of a SCION Cluster in different Availability Zones. The third scenario is with Independent EDGEs in different regions, for more details on Independent EDGEs please check here. The EDGE appliances are connected to the SCION network via AWS Direct Connect, provided by the SCION Access Provider (ISP).

For inter-VPC connectivity, the EDGE appliances are attached to an AWS Transit Gateway, which enables routing between multiple VPCs. GRE tunnels are established from the EDGE appliances to the Transit Gateway, and BGP is used over these GRE tunnels to dynamically exchange routing information with the AWS network. We recommend using a separate VPC for the applications that use SCION connectivity and connecting it to the Transit VPC via the Transit Gateway.

info

For details on the GRE interface configuration please check the GRE section.

note

For more details on the AWS Transit Gateway deployments please check the AWS Documentation

A single SCION ISP can provide SCION connectivity to multiple EDGE appliances in an AWS VPC.

ISP
ISP
GRE Tunnel
GRE Tunnel
VPC Attachment
VPC Attachment
AWS Direct Connect
AWS Direct Connect
AWS Transit Gateway
AWS Transit Gateway
AWS VPC
AWS VPC
Anapaya EDGE
Anapaya EDGE
Anapaya CORE
Anapaya CORE
SCION Link
SCION Link
Customer in AWS
Customer in AWS
Transit VPC

Transit VPC
Availability Zone B
Availability Zone B
Availability Zone A
Availability Zone A
Application VPC
Application...
BGP Session
BGP Session
Connect Attachment
Connect Attachment
Text is not SVG - cannot display