Veritas InfoScale™ 8.0.1 Solutions in Cloud Environments

Last Published:
Product(s): InfoScale & Storage Foundation (8.0.1)
Platform: Windows
  1. Overview and preparation
    1.  
      Overview of InfoScale solutions in cloud environments
    2.  
      InfoScale agents for monitoring resources in cloud environments
    3.  
      Preparing for InfoScale installations in cloud environments
    4.  
      Installing the AWS CLI package
    5.  
      VPC security groups example
  2. Configurations for Amazon Web Services - Windows
    1. Replication configurations in AWS - Windows
      1.  
        Replication from on-premises to AWS - Windows
      2.  
        Replication across AZs in an AWS region - Windows
      3.  
        Replication across AWS regions - Windows
    2. HA and DR configurations in AWS - Windows
      1.  
        Failover within a subnet of an AWS AZ using virtual private IP - Windows
      2.  
        Failover across AWS subnets using overlay IP - Windows
      3.  
        Public access to InfoScale cluster nodes in AWS using Elastic IP - Windows
      4.  
        DR from on-premises to AWS and across AWS regions or VPCs - Windows
      5.  
        DR from on-premises to AWS - Windows
  3. Configurations for Microsoft Azure - Windows
    1. Replication configurations in Azure - Windows
      1.  
        Replication from on-premises to Azure - Windows
      2.  
        Replication within an Azure region - Windows
      3.  
        Replication across Azure regions - Windows
    2. HA and DR configurations in Azure - Windows
      1.  
        Failover within an Azure subnet using private IP - Windows
      2.  
        Failover across Azure subnets using overlay IP - Windows
      3.  
        Public access to cluster nodes in Azure using public IP - Windows
      4.  
        DR from on-premises to Azure and across Azure regions or VNets - Windows
  4. Replication to and across cloud environments
    1.  
      Data replication in supported cloud environments
    2.  
      Supported replication scenarios
    3.  
      Setting up replication across AWS and Azure environments

VPC security groups example

A security group acts as a virtual firewall for the instance to control inbound and outbound traffic. Therefore, you must make sure that in cluster configuration, ports are enabled in the security groups so that the VMs can communicate with each others.

Consider an example with two VMs that uses two subnets:

Subnet 1: 172.17.1.0/24

Subnet 2: 172.17.2.0/24

With this setup, the following table describes the inbound rules for a security group.

Inbound rules



 Type                   Protocol     Port range           Source

 

ALL UDP                  UDP         0-65535             172.17.1.0/24
All UDP                  UDP         0-65535             172.17.2.0/24

This table indicates that the inbound traffic is allowed between the instances that are assigned to the security group.