This instance will be facing the team members for any Roost activity.
4.1 Launch Control Plane Instance
Create an EC2 instance with the steps mentioned below.
Launch EC2 instance
Choose Ubuntu 20 (ubuntu-focal-20.04) AMI
Instance Type as t3.medium
Security group to allow control-plane traffic from any source IP or just the private VPC/Subnets.
SSH (port 22)
HTTP (port 80)
HTTPS (port 443) and
Custom TCP Port 2502 (for Stun)
Root volume storage should be 20 GB or more.
Preferred separate EBS volume of 100GB
Enable Avoid Accidental Termination and disable EBS delete on termination
Add tags and key-pair and launch.
Download key-pair; change permissions to 0400
Review configuration and Launch Instance
Connect to EC2 using SSH once it is running
4.2 Mount EBS volume
Check the 100GB disk NAME
lsblk
Use the EBS disk name that is not mounted
sudo mkfs -t ext4 /dev/nvme1n1 sudo mkdir /var/tmp/Roost sudo mount /dev/nvme1n1 /var/tmp/Roost sudo chown `id -u`:`id -g` /var/tmp/Roost/ if [ ! -d /var/tmp/Roost ]; then sudo mkdir /var/tmp/Roost sudo chown `id -u`:`id -g` /var/tmp/Roost/ fi
4.3 Install SSL Certs
mkdir /var/tmp/Roost/certs; cd /var/tmp/Roost/certs # Copy your organisation SSL certs here # OR generate SSL certs
4.4 Roost Installation
Download Roost Installation Script
cd /var/tmp/Roost curl -L https://remote-roostprod.s3.us-west-1.amazonaws.com/roost-enterprise.sh -o roost-enterprise.sh chmod +x roost-enterprise.sh
Download config.json
curl -L https://remote-roostprod.s3.us-west-1.amazonaws.com/main-config.json -o config.json
Sample Config looks like the below
Replace the values to reflect for your organisation
Keep values empty of the client_id/secrets for the 3rd party that is not needed
Keep ENV_DATABASE detail unchanged if database is not external
Add JWT_SECRET
Recommend value of remote_console_proxy is same as enterprise_dns unless you want to start proxy elsewhere.
If your servers are behind Load Balancer user load_balancer : “true” for different configuration.
{ "enterprise_name": "MyCompany", "enterprise_logo": "https://mycompany.ai/logos/LOGO-mycompany.png", "enterprise_email_domain": "mycompany.io", "enterprise_dns": "mycompany.io", "remote_console_proxy": "mycompany.io" "admin_email": "admin@mycompany.io", "email_sender": "noreply@mycompany.io", "email_sender_pass": "", "load_balancer": "false", "enterprise_ssl_certificate_path": "/var/tmp/Roost/certs/server.cer", "enterprise_ssl_certificate_key_path": "/var/tmp/Roost/certs/server.key", "ENV_SERVER": { "DEFAULT_PORT": 3000, "JWT_SECRET": "32-character-secure-long-secret", "GOOGLE_CLIENT_ID": "", "GOOGLE_CLIENT_SECRET": "", "AZURE_CLIENT_ID": "", "AZURE_CLIENT_SECRET": "", "GITHUB_CLIENT_ID": "", "GITHUB_CLIENT_SECRET": "", "LINKEDIN_CLIENT_ID": "", "LINKEDIN_CLIENT_SECRET": "" }, "is_own_sql": "true", "ENV_DATABASE": { "MYSQL_HOST": "database-1-instance-1.region.rds.amazonaws.com", "MYSQL_PORT": 3306, "MYSQL_USERNAME": "MyUser", "MYSQL_PASSWORD": "MyPassword", "MYSQL_ROOT_PASSWORD": "AdminPassword" } }
Start Roost Control Plane Server
cd /var/tmp/Roost ./roost-enterprise.sh -i all -c config.json
Verifying the Roost.ai components
Connect to the public_ip/login using a browser
Use the 3rd party auth to connect to the control-plane
Next Steps:
Go to Admin Settings and
Enable cloud vendor of choice and provide default settings
Add the webconsole-proxy EC2 details in the “Configure EC2 Launcher”
Enable JumpHost and refresh the page
Go to JumpHost settings and add the webconsole-proxy EC2 details as 'default' jumpHost