Abiquo 5.2

Skip to end of metadata
Go to start of metadata

Introduction to Abiquo and AWS

The Abiquo Amazon EC2 integration is a multi-cloud feature that enables our customers to add Amazon public cloud regions to the Abiquo platform as part of our agnostic public cloud management. With the Abiquo platform you will be able to offer a service that is a federation of Abiquo private clouds and the public cloud. Cloud tenants can deploy virtual resources in public cloud regions or in Abiquo datacenters using the same award-winning user interface.

You can control the use of public cloud resources in the same way as in the Abiquo Datacenter (quotas, limits, viewer roles, etc). And users can also work with Abiquo multi-cloud features such as workload automation with action plans and autoscaling in public cloud. And the platform also obtains price lists and billing data from the provider to use in features such as billing dashboards, cost estimates, budgets with action plans, and a single bill for each cloud tenant. And Abiquo supports reseller accounts in the AWS Partner Network for use with tenant hierarchies.

AWS public cloud regions

Administrators add Amazon regions to the platform as Abiquo public cloud regions. Abiquo manages public cloud regions using a set of the Abiquo Remote Services. The remote services used in a public cloud region can be shared with other datacenters or public cloud regions. Abiquo caches details of AMI templates but it does not store their disks, so no NFS repository is required for a public cloud region. Each Abiquo public cloud region corresponds to a single Region in Amazon EC2. Multiple cloud tenants can then access this region.

Diagram of private and public cloud providers managed by Abiquo with remote services

Tenants and AWS credentials

Each Abiquo enterprise using the Amazon public cloud region should have its own AWS account. Abiquo will validate your Amazon credentials (Access Key ID and Secret Access Key) with AWS. Each enterprise may register ONE set of credentials for the enterprise's AWS account. You cannot register another set of credentials for the same account in another enterprise. In the case of a tenant hierarchy, the reseller may register the credentials of their partner account. Then each customer will have a set of compute credentials. 

Diagram of tenant entities in Abiquo and AWS

An AWS account may also have access to pricing data. If you register pricing credentials, the platform can onboard public cloud price lists for use with features such as cost estimates for users, budgets, and billing. If you also enable programmatic billing in Amazon and register the S3 bucket where you are saving billing reports, the platform can display provider billing data on the dashboard. The platform can aggregate this data at the customer level for a set of related tenants, as well as at the reseller level.  

Some regions, such as those in China, may require separate credentials, and for these regions, the administrator must select a separate provider, for example, "AWS (China)"

Abiquo VDCs and VMs in Amazon

When users create a virtual datacenter in the public cloud region, Abiquo works with Amazon EC2 to create a Virtual Private Cloud (VPC). When users create VMs, the platform creates Amazon Instances. 

Diagram of Abiquo entities and AWS entities


For remote access to your VM, add your public key to your Abiquo user before you deploy a VM.  Add a firewall to your VM to allow access to the remote access port for SSH. The platform will create your VM using your RSA public key. To access the instance, you will need the corresponding RSA private key.

Manage Amazon Instances with Abiquo

Do not rename an Amazon instance in AWS or you will break the link between Abiquo and the VM. If the link is broken, you will not be able to manage the VM with Abiquo again. Do not delete the tags created by Abiquo.

If you need to manage your Abiquo Elastic IPs in Amazon, synchronize them to update changes in Abiquo or you may see unexpected results.




How Abiquo Creates a Virtual Private Cloud

Abiquo configures VPC networking Scenario 2 as described in the AWS documentation. See http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenario2.html


Diagram of how Abiquo creates a VPC in AWS with a NAT gateway


Abiquo creates VPCs with NAT support.

  • When creating a NAT gateway, Abiquo will reuse floating IPs that are not assigned to a VDC. 
  • Abiquo creates a route table that is equivalent to the AWS route table with the values of the Abiquo private network. 
  • You can use the AWS NAT instance for Internet access from the Abiquo virtual datacenter private network.

Abiquo creates VPCs with a public subnet.

  • By default, VMs in private networks will have internet access through the public subnet. So a VM can connect to the internet to download its configuration, for example, using Chef, without an Elastic IP.

You can acquire public IPs for your virtual datacenter and in AWS these will be Elastic IPs with public network addresses.

  • Abiquo users must attach Elastic IPs to VMs with a connection to the public subnet.

  • Note that AWS may charge for Elastic IPs when they are NOT in use, i.e. when they are not assigned to a VM or when the VM is not deployed in AWS.

  • Elastic IPs are defined in Abiquo as "floating IPs". Abiquo manages them like public IPs but they do not belong to any Abiquo network. 

Abiquo creates VPCs with a private subnet.

  • The private subnet is a private connect network.
  • The private subnet has an Internet gateway and access to the VPC from outside the cloud is through NAT or Elastic IPs via the public subnet.
  • Within your virtual datacenter, you can create more Abiquo private networks (subnets in your VPC), so you can deploy to different Availability Zones. 
  • The private subnets in the same availability zone as the public subnet will have internet access through the public subnet. 

When you create an Abiquo virtual datacenter in an AWS public datacenter, Abiquo creates a VPC with a minimum network size of /16 and a subnet of size /24 (or with the sizes defined by the user).

  • The default CIDR for the VPC and the subnet is 192.168.0.0, which is the default private network in Abiquo.
  • You can set a custom private network in Abiquo and this network will be used to create the VPC and subnet in Abiquo.
  • You can create multiple address spaces (called Abiquo address ranges) and Abiquo private networks in different availability zones in the same VPC.

AWS reserves IP addresses in your private networks.

  • Abiquo supports the AWS gateway address as the first address in a network.
  • AWS reserves the first four IP addresses and the last IP address of a VPC private connect network. 
  • For a network that is defined to start with address 0: 
    • The first available IP address will be address 4

    • The gateway address is address 1.

Abiquo supports multiple IP addresses per VM in the AWS integration.




Security groups

Abiquo firewall policies correspond to AWS Security Groups and Abiquo onboards security groups from Amazon VPCs. Abiquo registers the default security group of a VPC as the default firewall policy of the Abiquo virtual datacenter. This firewall policy allows all outbound traffic from VMs. Abiquo users can select another firewall policy as the default.  Remember that you must configure a firewall to allow remote access to your VMs in AWS.

See Manage Firewalls

Load balancers

Abiquo supports Classic load balancers. Abiquo allows VMs on different subnets to be connected to the same load balancer.

See AWS load balancers table



Related links for Abiquo and AWS