Products | Versions |
---|---|
TIBCO BusinessConnect | 6.4.0 |
You can deploy TIBCO BusinessConnect™ on Amazon Web Services (AWS), taking into account security, load balancing, and fault tolerance. As broadcasting and multicasting is not supported on AWS, the system uses Rendezvous Routing Daemon (RVRD) for communication.
The following image shows one of the architectures to deploy TIBCO BusinessConnect™ on AWS cloud (a jpeg file is attached for easier readability):
The deployment consists of Amazon Virtual Private Cloud (VPC) with public & private subnets, NAT gateway, Amazon Internet gateway, Amazon RDS database, and an Amazon load balancer.
TIBCO BusinessConnect™ can be deployed within VPC consisting of public and private subnets. VPC enables you to create subnets and configure communication rules within the subnets.
Public subnet contains components that must be accessible over the internet. In a BusinessConnect™ deployment, BusinessConnect™ Gateway Server is in the public subnet as it must be accessible over the internet.
With the public subnet, an Amazon EC2 security group is configured to open specific ports for communication.
A private subnet contains components that do not need direct access to the internet. BusinessConnect™ Interior Server and TIBCO Administrator is deployed in a private subnet.
The Interior Server might have some plug-ins that must connect over the internet. This can be facilitated by using a NAT gateway in the public subnet. In a private subnet, an Amazon EC2 security group is configured to open specific ports for communication.
For security purposes, BusinessConnect™ database must be accessible only within the VPC. A private subnet cannot connect over the internet using network address translation (NAT). However, an Amazon
EC2 security group is configured to open specific ports for communication.
NAT gateway facilitates the machines in a private subnet to connect over the internet. NAT performs the required IP translations.
IP addresses of the machines in a private subnet are never exposed, but the public IP address of the NAT gateway is visible.
Internet gateway on Amazon cloud enables the communication over the internet. The internet gateway is associated with a public subnet.
Amazon cloud does not support broadcasting or multicasting on the network.
To enable communication between Interior Server instances and TIBCO Administrator, and between Gateway Server instances and Interior Server instances , you must setup RVRD neighbour interfaces on each of these instances.
To facilitate communication between Private process and Interior Server instances, a TIBCO Enterprise Management Service (EMS) server is deployed in a private subnet.
Note: Amazon mandates that RDS database be deployed in a subnet group that has at least two subnets in different zones.
BusinessConnect™ consists of the following components:
Out of these components, one must have access to the Gateway Server over the internet. In other words, only Gateway Server directly serves requests over the internet.
Note: Alternatively, if you want to access TIBCO Administrator over internet you can deploy TIBCO Administrator in PublicSubnet.
You must create two Gateway Server instances inside PublicSubnet. Next, create two or more Interior Server instances and one TIBCO Administrator server instance, depending on the load and requirement in PrivateSubnetIS.
You must add the instances to the TIBCO Administrator domain so that it can be monitored from TIBCO Administrator UI. The detailed procedure to add the instances to the domain is available in Chapter 2, “Adding a Machine to a Domain” of the Domain Utility User’s Guide.
To access the guide, open the following URL and navigate to TIBCO Runtime Agent > Domain Utility User’s Guide.
Creating RDS database in a private subnet
Next, you must create a database server on Amazon cloud. For this configuration, we can create Amazon RDS for MySQL. Use the MySQL JDBC driver available on the MySQL website.
Using RDS dashboard on Amazon cloud, create a subnet group containing the two private subnets that you created earlier: PrivatSubnetNoInternet_ZONE1 and PrivatSubnetNoInternet_ZONE2. Then, start the MySQL instance and select the subnet group that you created earlier.
Make a note of the endpoint, user name, and password.
Amazon cloud does not support broadcasting or multicasting. By default, TIBCO Rendezvous® works on broadcasting and multicasting. To enable
Rendezvous® to work successfully, configure RVRD between different instances.
BusinessConnect™ setup needs RVRD communication between each of the following components:
On every EC2 instance, start RVRD and add neighbor interfaces, depending on the component with which the instance needs to communicate.
Further, the following subjects should be allowed:
To enable internet access, we must create an internet gateway. For more information, see http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Internet_Gateway.html.
Each subnet has the associated security group created for you. Security groups ensure security by allowing or disallowing the flow of traffic on particular ports and from IP addresses.
Configure the incoming ports for the security groups as per deployment requirements. Read more at http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
A load balancer is required to balance the load between different Gateway Server instances. Using EC2 load balancer dashboard, configure the load balancer to add Gateway Server instances. Load balancer has the endpoint URL, which a trading partner uses to communicate with BusinessConnect™.
Further EC2 load balancer can be configured to terminate SSL connection at load balancer. This ensures that the connection between BusinessConnect™ on AWS and Trading Partner is secured.