End-to-End Process for Deploying Threat Defense Virtual Cluster on AWS
Template-based Deployment
The following flowchart illustrates the workflow for template-based deployment of the Threat Defense Virtual cluster on AWS.
Manual Deployment
The following flowchart illustrates the workflow for manual deployment of the Threat Defense Virtual cluster on AWS.
Workspace |
Steps |
|
---|---|---|
Local Host | Create day 0 configuration script. | |
AWS Console | Deploy Threat Defense Virtual instance. | |
AWS Console | Attach interfaces to instance. | |
AWS Console | Verify if nodes have joined cluster. | |
AWS Console | Create target group and GWLB; attach target group to the GWLB. | |
AWS Console | Register instances with the target group using data interface IP. | |
Management Center | Register control node. |