DO NOT SHARE THESE DOCS WITH CUSTOMERS!
This is an LA release that will only be provided to a select number of PLM-sanctioned customers (PDFs only). Contact PLM for details.
In this section:
Use this procedure to instantiate a Standalone SBC on Google Cloud.
The following restrictions exist in this release of SBC in the Google Cloud environment:
The steps to do a Manual install of a standalone SBC instance are as follows (refer to Configure VPC Networks for details):
Complete the following steps to instantiate a Standalone SBC instance in Google Cloud:
Click Management.
In the Metadata section, enter the following data using Key value "user-data". The following table describes the user-data.
Meta Data Format - Key = user-data
{ "CEName": "<CEName>", "ReverseNatPkt0" : "<True/False>", "ReverseNatPkt1" : "<True/False>", "SystemName": "<SystemName>", "SbcPersonalityType": "isbc", "AdminSshKey" : "public key value", "ThirdPartyCpuAlloc" : "0", "ThirdPartyMemAlloc" : "0" "Mgt0Prefix": "<prefix>", }
Meta Data Example - Key = user-data
{ "CEName": "vsbc1", "ReverseNatPkt0" : "False", "ReverseNatPkt1" : "False", "SystemName": "vsbcSystem", "SbcPersonalityType": "isbc", "AdminSshKey" : "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCJnrFMr/RXJD3rVLMLdkJBYau+lWQ+F55Xj+KjunVBtw/ zXURV38QIQ1zCw/GDO2CZTSyehUeiV0pi2moUs0ZiK6/TdWTzcOP3RCUhNI26sBFv/Tk5MdaojSqUc2NMpS/ c1ESCmaUMBv4F7PfeHt0f3PqpUsxvKeNQQuEZyXjFEwAUdbkCMEptgaroYwuEz4SpFCfNBh0obUSoX5FNiNO/ OyXcR8poVH0UhFim0Rdneo7VEH5FeqdkdGyZcTFs7A7aWpBRY3N8KUwklmNSWdDZ9// epEwgaF3m5U7XMd4M9zHURF1uQ/Nc+aiyVId9Mje2EU+nh6npaw/tEOPUiC1v", "ThirdPartyCpuAlloc" : "0", "ThirdPartyMemAlloc" : "0", "Mgt0Prefix": "24" }
The AdminSshKey text string is one continuous string with no line breaks. It is shown on several lines in order to fit the page.
Userdata Content Description | |||
Parameter | Length | Type/Format | Description |
---|---|---|---|
AdminSshKey | N/A | string | The public key value used to login to the instance as admin user. |
CEName | 64 | string | This specifies the actual CE name of the SBC instance. For more information, refer to System and Instance Naming in SBC SWe N:1 and Cloud-Based Systems. CEName Requirements:
|
Mgt0Prefix | 2 | digits | The prefix (for example, /24) of the MGT0 subnet. Note: Recommended prefix is 24. |
ReverseNatPkt0 / ReverseNatPkt1 | N/A | True/False | Reverse NAT flag for Pkt0 and Pkt1. Values:
|
SbcPersonalityType | 4 | string | The name of the SBC personality type for this instance. At this time only integrated SBC (isbc) is supported in AWS. |
SystemName | 26 | string | This specifies the actual system name of the SBC instance. For more information, refer to System and Instance Naming in SBC SWe N:1 and Cloud-Based Systems System Requirements:
|
ThirdPartyCpuAlloc | N/A | 0-? in vCPUs | Enter the number of CPUs to be reserved for use with third-party apps. Note: Default is 0 |
ThirdPartyMemAlloc | N/A | 0-? in MB | Enter the number of MB of memory to be reserved for use with third-party apps. Note: Default is 0 |
Click Networking.
Click default under Network interfaces. The default Network interface will expand.
Select the management VPC Network that you created earlier.
For Subnetwork select the management network that you created earlier.
Select Ephemeral (Automatic) for Primary internal IP.
Select an External IP for management based on that you created earlier.
Click Done.
Click Add network interface to add an interface for HA0.
Select the appropriate VPC Network that you created earlier.
For Subnetwork select the management network that you created earlier.
Select Ephemeral (Automatic) for Primary internal IP.
Click Done.
Repeat steps 1-5 for PKT0 and PKT1 networks.
Once completed, the Networking tab will be similar to this example:
In order to allow access to the instance by a linuxadmin user (for new SBC builds), you must add an SSH key to the Security tab, as follows:
<public-key-value> linuxadmin