This
This section covers the following topics:
Prerequisites
Before you can build a VPN between an SL1 Software-as-a-Service (SaaS) environment and AWS, you must have the following prerequisites:
- An existing AWS account with an AWS region
- A connection to data centers in which you are planning to deploy SL1 Data Collectors
- A list of prefixes and subnets in which you are planning to deploy SL1 Data Collectors
Creating Private Connectivity for SaaS in AWS (Required)
To set up a VPN for SaaS on an existing AWS Transit Gateway or AWS Direct Connect account:
You might need to enable resource sharing within your AWS Organizations from your AWS management account.
- Log in to your AWS account as a Cloud Administrator.
- Select the AWS account on which your AWS Transit Gateway is running.
- Select the AWS Management Console associated with the role allowing administrative access.
- Select the appropriate AWS region.
- Navigate to Resource Access Manager.
- Click the button.
- In the Specify resource share details page, type a name for your resource share in the Name field.
- In the Select resource type drop-down, select Transit Gateways. A list of available Transit Gateways will appear. Select the checkbox for the Transit Gateway you want to share with ScienceLogic.
- Click Associate permissions page. Permissions are not modified for Transit Gateways, so click again. to go to the
- In the Choose principals that are allowed to access page, select Allow sharing with anyone.
- In the Principals drop-down, select AWS account and type the ScienceLogic-provided 12-digit number in the AWS account ID field.
- Click . Repeat these steps if ScienceLogic has provided multiple account numbers.
- Click Review and create page. Review the information you entered and then click the button. to go to the
When you have completed sharing your AWS resource, ScienceLogic will attach a single virtual private cloud (VPC) or multiple VPCs to your Transit Gateway.
If your Transit Gateway is not configured to automatically accept sharing requests, you must approve the request in your account. To do so:
- Log in to your AWS account as a Cloud Administrator.
- Select the AWS account on which your AWS Transit Gateway is running.
- Select the AWS Management Console associated with the Role allowing administrative access.
- Select the appropriate AWS region.
- Navigate to VPC.
- In the left navigation panel, click Transit Gateway Attachments.
- In the Transit gateway attachments page, you will see a list of your Transit Gateway attachments that are "pending acceptance".
- Select the checkbox for your Transit Gateway attachment, and then click the Accept. drop-down and select
Next, you must create the Transit Gateway route table for your VPC attachment. To do so:
- From your AWS Management Console, click VPC.
- In the left navigation panel, click Transit Gateway Route Tables.
- In the Transit gateway route tables page, click the button.
- Type a name for your Transit Gateway table in the Name tag field.
- In the Transit gateway ID drop-down, select your Transit Gateway.
- Click the button.
After creating your Transit Gateway route table, you must associate the route table with your VPC attachment by performing the following steps:
- From your AWS Management Console, click VPC.
- In the left navigation panel, click Transit Gateway Route Tables.
- In the Transit gateway route tables page, when the State of the route table transitions to Available, select the Associations tab.
You might have to refresh the Transit gateway route tables page to see the State change.
- Click Create association.
- Select the Transit Gateway attachment you want to associate with your VPC, and then click .
Finally, to allow traffic from your site-to-site VPN connection to be routed to the ScienceLogic workload VPC, you must add a propagation for the VPC attachment to the network services route table. To do so:
- From your AWS Management Console, click VPC.
- In the left navigation panel, click Transit Gateway Route Tables.
- In the Transit gateway route tables page, select the route table you use for routing traffic outside of AWS.
- Click the Actions drop-down and select Create propagation.
- Select the Transit Gateway attachment to propagate.
Configuring a Site-to-Site VPN (Optional)
An alternative option for configuring your VPN is to have ScienceLogic work with you to set up a site-to-site VPN, available as a premium service. If you would prefer to set up a VPN on your own, see the Setting Up a Virtual Private Network (VPN) (Optional) section.
This high-availability VPN option provides the following:
- Two customer gateway devices, or CGWs, in different geolocations, with the VPN tunnel terminating on the same Transit Gateway
- A private autonomous system number (ASN) in the 64512 to 65534 range. The default ASN is 65000.
For select customers, AWS will produce example configuration files to be applied your device(s).
Configuration provided in this method may not satisfy all of your requirements, but may be adjusted as needed.
Setting Up a Virtual Private Network (VPN) (Optional)
If you do not have connectivity from AWS to your on-premises environment, you will need to configure your VPN. If you have opted to have ScienceLogic set up your VPN, see the Configuring a Site-to-Site VPN (Optional) section.
Before you set up a VPN, you will need to determine the following:
- What is your desired topology—a single VPN connection or multiple VPN connections?
- What type of device are you planning to use for the VPN termination?
- Are there specific internal requirements or standards for setting up your VPN?
At a minimum, you will need to know the public IP address of your Customer Gateway to begin setup.
You will also need to determine the following VPN properties:
- IKE version: IKEv1 vs IKEv2
- Inside tunnel IP addresses
- Minimum encryption algorithms for phase 1 and phase 2
- Minimum integrity algorithms
- Allowed Diffie-Hellman (DH) group numbers
- See the AWS Tunnel options for your Site-to-Site VPN connection documentation for information on optional parameters
You will also need to determine your routing options:
- Static (single VPN only)
- Dynamic (BGP only)