Link Search Menu Expand Document

Connect Sources

To connect a source to Elastio Tenant means to deploy Elastio to your AWS account. In order to deploy Elastio navigate either to the On Boarding or to the Sources page and press the “Link Source” button. Alternatively, you can set up your Tenant and after that you will be forwarded directly to the Cloud Installer flow. The flow will guide you through deploying the Elastio CloudFormation stack and Cloud Connector and allow you to connect sources to your dedicated space.

  • Enter your AWS account number into the input field in Step 1.

Figure 1: Enter your AWS account ID

Figure 1: Enter your AWS account ID

  • Select an AWS region to deploy the Elastio CloudFormation stack to. Click on the “Deploy CloudFormation Stack” link.

Figure 2: Deploy CloudFormation stack

Figure 2: Deploy CloudFormation stack

  • An AWS Console window will open in a new tab. Please do not make any changes to the default inputs.

  • Check the checkbox “I acknowledge that AWS CloudFormation might create IAM resources with custom names.”

Figure 3: Acknowledgement window

Figure 3: Acknowledgement window

  • Click the “Create Stack” button. Wait until the CloudFormation stack is deployed successfully. This might take a couple of minutes.

Figure 4: Create stack

Figure 4: Create stack

Note: For further details on the Cloud Connector security information, click here.

  • Once the stack creation is completed, go back to the Elastio Cloud Tenant. A list of available regions should appear in Step 3. Select the region(s), the VPC(s) and subnets you want to deploy to. A default VPC is pre-selected, but you can change it if you wish. The subnets selection is also important. Due to variable spot availability across availability zones it is recommended to select multiple subnets in several availability zones for each vault, if possible.

Figure 5: Select regions

Figure 5: Select regions

Note: The selected VPC can have either a public, or a private subnet, as well as a subnet in every Availability Zone within the region. Public subnets with an IGW require “auto-assign public IPv4 address” and allow Elastio to run smoothly. Though if you plan to use Elastio only within the VPC with a private subnet, you will need to create a private subnet with a NAT gateway. The instructions below will help you to configure it:

  1. Create a public NAT in the public subnet.
  2. Go to the private subnet route table and route 0.0.0.0/0 through the NAT.
  3. The public subnet route table should have a route 0.0.0.0/0 to IGW interface.

In this case the vault will only be accessed from within the private subnets. Performing backups and mounts from systems outside of the subnets will be possible only after setting up a VPN tunnel into the VPC with a network path from the VPN tunnel to the private subnets, where the vault is running.

Deploying the vault entirely in public subnets will allow the vault to be accessible over the Internet. So, performing backups, restores and mounts from outside of AWS (either from other clouds or from on-prem workstations) will become available. This is the most flexible configuration, but it might not be permitted depending upon each organization’s security policies.

  • On step 4 you can enable service usage statistics. Enabling service usage statistics allows Elastio to retrieve and analyze usage and spending data from the AWS Cost and Usage Reports (AWS CUR) from your AWS Billing Dashboard to estimate Elastio costs. Currently the “Metrics” section on a vault’s page (which can be accessed through the Sources page of your Elastio Tenant) displays storage and compute costs billing details.

Figure 6: Enable statistics

Figure 6: Enable statistics

  • Click the “Deploy” button.

Figure 7: Deploy Elastio

Figure 7: Deploy Elastio

  • You will be forwarded to the Jobs page, where you can monitor the progress.

Figure 8: Jobs page

Figure 8: Jobs page

Note: A default vault will be created for you when deploying the Cloud Connector to your account. You will be able to create additional vaults through the CLI or using your Elastio Tenant later.

Once you have deployed Elastio to your AWS account, you can go on and create your first protection policy.

Alternatively, you can install the Elastio CLI and back up your assets with it.