Getting started with Amazon Elastic VMware Service
Note
Amazon EVS is in public preview release and is subject to change.
Use this guide to get started with Amazon Elastic VMware Service (Amazon EVS). You’ll learn how to create an Amazon EVS environment with hosts within your own Amazon Virtual Private Cloud (VPC).
After you’re finished, you’ll have an Amazon EVS environment that you can use to migrate your VMware vSphere-based workloads to the AWS Cloud.
Important
To get started as simply and quickly as possible, this topic includes steps to create a VPC, and specifies minimum requirements for DNS server configuration and Amazon EVS environment creation.
Before creating these resources, we recommend that you plan out your IP address space and DNS record setup that meets your requirements.
You should also familiarize yourself with VCF 5.2.1 requirements.
For more information, see the VCF 5.2.1 release notes
Important
Amazon EVS only supports VCF version 5.2.1.x at this time.
Topics
Prerequisites
Before getting started, you must complete the Amazon EVS prerequisite tasks. For more information, see Setting up Amazon Elastic VMware Service.
Create a VPC with subnets and route tables
Note
The VPC, subnets, and Amazon EVS environment must all be created in the same account. Amazon EVS does not support cross-account sharing of VPC subnets or Amazon EVS environments.
-
Open the Amazon VPC console
. -
On the VPC dashboard, choose Create VPC.
-
For Resources to create, choose VPC and more.
-
Keep Name tag auto-generation selected to create Name tags for the VPC resources, or clear it to provide your own Name tags for the VPC resources.
-
For IPv4 CIDR block, enter an IPv4 CIDR block. A VPC must have an IPv4 CIDR block. Ensure that you create a VPC that is adequately sized to accommodate the Amazon EVS subnets. For more information, see Amazon EVS networking considerations
Note
Amazon EVS does not support IPv6 at this time.
-
Keep Tenancy as
Default
. With this option selected, EC2 instances that are launched into this VPC will use the tenancy attribute specified when the instances are launched. Amazon EVS launches bare metal EC2 instances on your behalf. -
For Number of Availability Zones (AZs), choose 1.
Note
Amazon EVS only supports Single-AZ deployments at this time.
-
Expand Customize AZs and choose the AZ for your subnets.
Note
You must deploy in an AWS Region where Amazon EVS is supported. For more information about Amazon EVS Region availability, see Amazon Elastic VMware Service endpoints and quotas.
-
(Optional) If you need internet connectivity, for Number of public subnets, choose 1.
-
For Number of private subnets, choose 1.
-
To choose the IP address ranges for your subnets, expand Customize subnets CIDR blocks.
Note
Amazon EVS VLAN subnets will also need to be created from this VPC CIDR space. Ensure that you leave enough space in the VPC CIDR block for the VLAN subnets that the service requires. For more information, see Amazon EVS networking considerations
-
(Optional) To grant internet access over IPv4 to resources, for NAT gateways, choose In 1 AZ. Note that there is a cost associated with NAT gateways. For more information, see Pricing for NAT gateways.
Note
Amazon EVS requires the use of a NAT gateway to enable outbound internet connectivity.
-
For VPC endpoints, choose None.
Note
Amazon EVS does not support gateway VPC endpoints for Amazon S3 at this time. To enable Amazon S3 connectivity, you must set up an interface VPC endpoint using AWS PrivateLink for Amazon S3. For more information, see AWS PrivateLink for Amazon S3 in the Amazon Simple Storage Service User Guide.
-
For DNS options, keep the defaults selected. Amazon EVS requires your VPC to have DNS resolution capability for all VCF components.
-
(Optional) To add a tag to your VPC, expand Additional tags, choose Add new tag, and enter a tag key and a tag value.
-
Choose Create VPC.
Note
During VPC creation, Amazon VPC automatically creates a main route table and implicitly associates subnets to it by default.
Configure the VPC main route table
Amazon EVS subnets are implicitly associated to your VPC’s main route table when they are created. To enable connectivity to dependent services such as DNS or on-premises systems for successful environment deployment, you must configure the main route table to allow traffic to these systems. For more information about managing subnet route tables, see Manage subnet route tables in the Amazon VPC User Guide.
After the Amazon EVS environment deploys, you can configure explicit route table associations to enable connectivity through a custom route table. For more information, see Replace the main route table in the Amazon VPC User Guide.
Important
Amazon EVS supports the use of a custom route table only after the Amazon EVS environment is created. Custom route tables should not be used during Amazon EVS environment creation, as this may result in connectivity issues.
Configure DNS and NTP servers using the VPC DHCP option set
Amazon EVS uses your VPC’s DHCP option set to retrieve the following:
-
Domain Name System (DNS) servers that are used to resolve host IP addresses.
-
Network Time Protocol (NTP) servers that are used to avoid time synchronization issues in the SDDC.
You can create a DHCP option set using the Amazon VPC console or AWS CLI. For more information, see Create a DHCP option set in the Amazon VPC User Guide.
To enable DNS connectivity for successful environment deployment, you must first configure the VPC’s main route table to allow DNS traffic. For more information, see Configure the VPC main route table.
DNS server configuration
You can enter IPv4 addresses of up to four Domain Name System (DNS) servers. You can use Route 53 as your DNS server provider, or you can provide your own custom DNS servers. For more information about configuring Route 53 as your DNS service for an existing domain, see Making Route 53 the DNS service for a domain that’s in use.
Note
Using both Route 53 and a custom Domain Name System (DNS) server may cause unexpected behavior.
Note
Amazon EVS does not support IPv6 at this time.
To successfully deploy an environment, your VPC’s DHCP option set must have the following DNS settings:
-
A primary DNS server IP address and a secondary DNS server IP address in the DHCP option set.
-
A DNS forward lookup zone with A records for each VCF management appliance and Amazon EVS host in your deployment as detailed in Create an Amazon EVS environment.
-
A reverse lookup zone with PTR records for each VCF management appliance and Amazon EVS host in your deployment as detailed in Create an Amazon EVS environment.
For more information about configuring DNS servers in a DHCP option set, see Create a DHCP option set.
Note
If you use custom DNS domain names defined in a private hosted zone in Route 53, or use private DNS with interface VPC endpoints (AWS PrivateLink), you must set both the enableDnsHostnames
and enableDnsSupport
attributes to true
.
For more information, see DNS attributes for your VPC.
NTP server configuration
NTP servers provide the time to your network. You can enter the IPv4 addresses of up to four Network Time Protocol (NTP) servers. For more information about configuring NTP servers in a DHCP option set, see Create a DHCP option set.
Note
Amazon EVS does not support IPv6 at this time.
You can specify the Amazon Time Sync Service at IPv4 address 169.254.169.123
.
By default, the Amazon EC2 instances that Amazon EVS deploys use the Amazon Time Sync Service at IPv4 address 169.254.169.123
.
For more information about NTP servers, see RFC 2123
(Optional) Configure on-premises network connectivity
You can configure connectivity for your on-premises data center to your AWS infrastructure using AWS Direct Connect with an associated transit gateway, or using an AWS Site-to-Site VPN attachment to a transit gateway. AWS Site-to-Site VPN creates an IPsec VPN connection to the transit gateway over the internet. AWS Direct Connect creates an IPsec VPN connection to the transit gateway over a private dedicated connection. After the Amazon EVS environment is created, you can use either option to connect your on-premises data center firewalls to the VMware NSX environment.
To enable connectivity to on-premises systems for successful environment deployment, you must configure the VPC’s main route table to allow traffic to these systems. For more information, see Configure the VPC main route table.
After the Amazon EVS environment is created, you must update the transit gateway route tables with the VPC CIDRs created within the Amazon EVS environment. For more information, see (Optional) Configure transit gateway route tables and Direct Connect prefixes for on-premises connectivity.
For more information about setting up an AWS Direct Connect connection, see AWS Direct Connect gateways and transit gateway associations. For more information about using AWS Site-to-Site VPN with AWS Transit Gateway, see AWS Site-to-Site VPN attachments in Amazon VPC Transit Gateways in the Amazon VPC Transit Gateway User Guide.
Note
Amazon EVS does not support connectivity via an AWS Direct Connect private virtual interface (VIF), or via an AWS Site-to-Site VPN connection that terminates directly into the underlay VPC.
Set up a VPC Route Server instance with endpoints and peers
Amazon EVS uses Amazon VPC Route Server to to enable BGP-based dynamic routing to your VPC underlay network. You must specify a route server that shares routes to at least two route server endpoints in the service access subnet. The peer ASN configured on the route server peers must match, and the peer IP addresses must be unique.
Important
When enabling Route Server propagation, ensure that all route tables being propagated have at least one explicit subnet association. BGP route advertisement fails if the route table does have an explicit subnet association.
For more information about setting up VPC Route Server, see the Route Server get started tutorial.
Note
For Route Server peer liveness detection, Amazon EVS only support the default BGP keepalive mechanism. Amazon EVS does not support multi-hop Bidirectional Forwarding Detection (BFD).
Note
We recommend that you enable persistent routes for the route server instance with a persist duration between 1-5 minutes. If enabled, routes will be preserved in the route server’s routing database even if all BGP sessions end. For more information, see Create a route server in the Amazon VPC User Guide.
Note
If you are using a NAT gateway or a transit gateway, ensure that your route server is configured correctly to propagate NSX routes to the VPC route table(s).
Create an Amazon EVS environment
Important
To get started as simply and quickly as possible, this topic includes steps to create an Amazon EVS environment with default settings. Before creating an environment, we recommend that you familiarize yourself with all settings and deploy an environment with the settings that meet your requirements. Environments can only be configured during initial environment creation. Environments cannot be modified after you’ve created them. For an overview of all possible Amazon EVS environment settings, see the Amazon EVS API Reference Guide.
Note
You environment ID will be available to Amazon EVS across all AWS Regions for VCF license compliance needs.
Note
Amazon EVS environments must be deployed into the same Region and Availability Zone as the VPC and VPC subnets.
Complete this step to create an Amazon EVS environment with hosts and VLAN subnets.
Verify Amazon EVS environment creation
Explicitly associate Amazon EVS VLAN subnets to a VPC route table
Explicitly associate each of the Amazon EVS VLAN subnets with a route table in your VPC. This route table is used to allow AWS resources to communicate with virtual machines on NSX network segments, running with Amazon EVS.
(Optional) Configure transit gateway route tables and Direct Connect prefixes for on-premises connectivity
If you are configuring on-premises network connectivity using AWS Direct Connect or AWS Site-to-Site VPN with a transit gateway, you must update the transit gateway route tables with the VPC CIDRs created within the Amazon EVS environment. For more information, see Transit gateway route tables in Amazon VPC Transit Gateways.
If you are using AWS Direct Connect, you may need to also update your Direct Connect prefixes to send and receive updated routes from the VPC. For more information, see Allows prefixes interactions for AWS Direct Connect gateways.
Create a network ACL to control Amazon EVS VLAN subnet traffic
Amazon EVS uses a network access control list (ACL) to control traffic to and from Amazon EVS VLAN subnets. You can use the default network ACL for your VPC, or you can create a custom network ACL for your VPC with rules that are similar to the rules for your security groups to add a layer of security to your VPC. For more information, see Create a network ACL for your VPC in the Amazon VPC User Guide.
Important
EC2 security groups do not function on elastic network interfaces that are attached to Amazon EVS VLAN subnets. To control traffic to and from Amazon EVS VLAN subnets, you must use a network access control list.
Retrieve VCF credentials and access VCF management appliances
Amazon EVS uses AWS Secrets Manager to create, encrypt, and store managed secrets in your account. These secrets contain the VCF credentials needed to install and access VCF management appliances such as vCenter Server, NSX, and SDDC Manager. For more information about retrieving secrets, see Get secrets from AWS Secrets Manager.
Note
Amazon EVS does not provide managed rotation of your secrets. We recommend that you rotate your secrets regularly on a set rotation window to ensure that secrets are not long-lived.
After you have retrieved your VCF credentials from AWS Secrets Manager, you can use them to log into your VCF management appliances.
For more information, see Log in to the SDDC Manager User Interface
Configure the EC2 Serial Console
By default, Amazon EVS enables the ESXi Shell on newly deployed Amazon EVS hosts. This configuration allows access to the Amazon EC2 instance’s serial port through the EC2 serial console, which you can use to troubleshoot boot, network configuration, and other issues. The serial console does not require your instance to have any networking capabilities. With the serial console, you can enter commands to a running EC2 instance as if your keyboard and monitor are directly attached to the instance’s serial port.
The EC2 serial console can be accessed using the EC2 console or the AWS CLI. For more information, see EC2 Serial Console for instances in the Amazon EC2 User Guide.
Note
The EC2 serial console is the only Amazon EVS supported mechanism to access the Direct Console User Interface (DCUI) to interact with an ESXi host locally.
Note
Amazon EVS disables remote SSH by default.
For more information about enabling SSH to access the remote ESXi Shell, see Remote ESXi Shell Access with SSH
Connect to the EC2 Serial Console
To connect to the EC2 serial console and use your chosen tool for troubleshooting, certain prerequisite tasks must be completed. For more information, see Prerequisites for the EC2 Serial Console and Connect to the EC2 Serial Console in the Amazon EC2 User Guide.
Note
To connect to the EC2 serial console, your EC2 instance state must be running
.
You can’t connect to the serial console if the instance is in the pending
, stopping
, stopped
, shutting-down
, or terminated
state.
For more information about instance state changes, see Amazon EC2 instance state change in the Amazon EC2 User Guide.
Configure access to the EC2 Serial Console
To configure access to the EC2 serial console, you or your administrator must grant serial console access at the account level and then configure IAM policies to grant access to your users. For Linux instances, you must also configure a password-based user on every instance so that your users can use the serial console for troubleshooting. For more information, see Configure access to the EC2 Serial Console in the Amazon EC2 User Guide.
Clean up
Follow these steps to delete the AWS resources that were created.
Delete the Amazon EVS hosts and environment
Follow these steps to delete the Amazon EVS hosts and environment. This action deletes the VMware VCF installation that runs in your Amazon EVS environment.
Note
To delete an Amazon EVS environment, you must first delete all hosts within the environment. An environment cannot be deleted if there are hosts associated with the environment.
Delete the VPC Route Server components
For steps to delete the Amazon VPC Route Server components that you created, see Route Server cleanup in the Amazon VPC User Guide.
Delete the network access control list (ACL)
For steps to delete a network access control list, see Delete a network ACL for your VPC in the Amazon VPC User Guide.
Delete elastic network interfaces
For steps to delete elastic network interfaces, see Delete a network interface in the Amazon EC2 User Guide.
Disassociate and delete subnet route tables
For steps to disassociate and delete subnet route tables, see Subnet route tables in the Amazon VPC User Guide.
Delete subnets
Delete the VPC subnets, including the service access subnet. For steps to delete VPC subnets, see Delete a subnet in the Amazon VPC User Guide.
Note
If you’re using Route 53 for DNS, remove the inbound endpoints before you attempt to delete the service access subnet. Otherwise, you will not be able to delete the service access subnet.
Note
Amazon EVS deletes the VLAN subnets on your behalf when the environment is deleted. Amazon EVS VLAN subnets can only be deleted when the environment is deleted.
Delete the VPC
For steps to delete the VPC, see Delete your VPC in the Amazon VPC User Guide.
Next steps
Migrate your workloads to Amazon EVS using VMware Hybrid Cloud Extension (VMware HCX). For more information, see Migrate workloads to Amazon EVS using VMware Hybrid Cloud Extension (VMware HCX).