Can you mount AWS EFS from a HP-unix system? - amazon-web-services

We have an EFS server in our AWS account currently mounted on all our dev systems(RHEL 8.1) in the same VPC and it is working fine. Recently we received a request to mount this EFS server from a on premise server running on HP-unix. On-prem network and aws are connected via Direct connect. I have tried all usual setting changes like allowing on-prem IP range in EFS SG, allowing UDP-2049 in EFS SG etc. Nothing works.
Below is a sample error from HP-ux system:
#mount -F nfs3 -o nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2,noresvport X.X.X.X:/ /
mount: cannot access nfs3-specific mount command
While reading AWS documentation on EFS, I came across this statement: "Your on-premises server must have a Linux-based operating system. We recommend Linux kernel version 4.0 or later." (https://docs.aws.amazon.com/efs/latest/ug/how-it-works.html)
Is there a way to mount EFS on a HP-UX on-prem server connected via Direct connect to AWS?

Related

How to resolve Network Error -53 when trying to mount NFS File share?

So I'm trying to mount the file share I've created on AWS as per this guide : https://docs.aws.amazon.com/filegateway/latest/files3/GettingStartedAccessFileShare.html
So far I've created a gateway which is being hosted on Amazon EC2 instance. Afterwards I created the file share of type NFS and now I'm trying to mount it using this command:
mount –o nolock -o mtype=hard [GatewayVMIPAddress]:/[FileShareName] [WindowsDriveLetter]
However I keep getting this error: Network Error - 53 which is "the network path was not found".
So far I've tried adding/changing port requirements of my ec2 instance by adding what amazon support recommends https://docs.aws.amazon.com/storagegateway/latest/userguide/Requirements.html#networks
but still getting same error.
Not sure what else I can try? Any help?

Connection failure using EC2 Instance Connect (browser-based SSH connection)

Launching an AWS EC2 instance seems quite straightforward although when it comes to connecting to the newly launched instance things get sticky. The process for connecting to an instance proposed by such a tech giant is very counter-intuitive.
As a short reminder I should add that an "instance" is technically a virtual machine running on Amazon's Elastic Compute Cloud (EC2), for more info one could have a look at this link.
The ec2 instance referred to in this discussion is Ubuntu Server 20.04 LTS (HVM).
The instruction for working with EC2 Linux instances is given here.
AWS EC2 proposes three different ways of connecting to an instance:
EC2 Instance connect (browser-based SSH connection),
Session Manager
SSH Client
Now with regard to connecting to the above-mentioned instance there are only certain connections that establish correctly and the rest of the proposed methods fail, here is the list of connection successes and failures :
Ubuntu instance, security group source "Custom=0.0.0.0/0", Connection establishes using both EC2 Instance Connect (browser-based SSH connection) and SSH client.
Ubuntu instance, security group source "My IP=$IP", Connection establishes only using SSH client (terminal on Ubuntu and PuTTY on windows) and not using EC2 instance connect.
Both above cases have been tried on Ubuntu 20.04 and Windows 10 as local machine and the problem remains similar on both machines. I went through most of the failure cases discussed in the troubleshooting documents proposed here and verified them on my instance. Yet the problem persists. I should also add that I never tried "session manager" connection method although opening its tab already would give some info about "not installed" agents and features.
Any idea regarding this problem? Somebody out there facing the same issue?
From Docs
(Amazon EC2 console browser-based client) We recommend that your instance allows inbound SSH traffic from the recommended IP block published for the service.
Reason for this -> EC2 Instance Connect works by making an HTTPS connection between your web browser and the backend EC2 Instance Connect service on aws. Then, EC2 Instance Connect establishes a "mostly normal" SSH connection to the target instance in other words the request is going from backend ec2 instance connect and not your browser that is why it needs IP address from accepted ranges of that region .
Browser based EC2 Instance Connect uses specific IP ranges for browser-based SSH connections to your instance. These IP ranges differ between AWS Regions. To find the AWS IP address range for EC2 Instance Connect in a specific Region, use the following( just replace your region with your region) ( for Linux required curl and jq as prerequisite)
curl -s https://ip-ranges.amazonaws.com/ip-ranges.json| jq -r '.prefixes[] | select(.region=="Your region") | select(.service=="EC2_INSTANCE_CONNECT") | .ip_prefix'
whatever the value is returned just add up to your security rule and it will work.
Ubuntu instance, security group source "Custom=0.0.0.0/0", Connection establishes using both EC2 Instance Connect (browser-based SSH connection) and SSH client.
this works because 0.0.0.0/0 allows connection from all the IP ranges( which includes your region IP too).
for more details try reading this troubleshoot

Is it possible to map a EC2 drive to a local drive with a letter?

In one of our client scenario each laptop running a client software has to have a mapped S:\ drive.
Earlier they would map this S:\ drive to a drive in a Server on the same network like \\Server-name\$D
Now they are planning to move this server to EC2 in AWS. Is it possible to map the drive from EC2 server in local machine?
Local machine is in aclient network connected to AWS via VPN and DirectConnect.
In my research online (I am trying to map an Amazon EC2 drive to a local machine), I came to know that you can enable a VPN on EC2 server to make this happen. But I am looking for a inbuilt windows option as this is a as-is migration to AWS.

Connect to Neptune on AWS from local machine

I am trying to connect to Neptune DB in AWS Instance from my local machine in office, like connecting to RDS from office. Is it possible to connect Neptune db from local machine? Is Neptune db publicly available? Is there any way a developer can connect Neptune db from office?
Neptune does not support public endpoints (endpoints that are accessible from outside the VPC). However, there are few architectural options using which you can access your Neptune instance outside your VPC. All of them have the same theme: setup a proxy (EC2 machine, or ALB, or something similar, or a combination of these) that resides inside your VPC, and make that proxy accessible from outside your VPC.
It seems like you want to talk to your instance purely for development purposes. The easiest option for that would be to spin up an ALB, and create a target group that points to your instance's IP.
Brief Steps (These are intentionally not in detail, please refer to AWS Docs for detailed instructions):
dig +short <your cluster endpoint>
This would give you the current master's IP address.
Create an ALB (See AWS Docs on how to do this).
Make your ALB's target group point to the IP Address obtained for step #1. By the end of this step, you should have an ALB listening on PORT-A, that would forward requests to IP:PORT, where IP is your database IP (from Step 1) and PORT is your database port (default is 8182).
Create a security group that allows inbound traffic from everywhere. i.e. Inbound TCP rule for 0.0.0.0 on PORT-A.
Attach the security group to your ALB
Now from your developer boxes, you can connect to your ALB endpoint at PORT-A, which would internally forward the request to your Neptune instance.
Do checkout ALB docs for details around how you can create it and the concepts around it. If you need me to elaborate any of the steps, feel free to ask.
NOTE: This is not a recommended solution for a production setup. IP's used by Neptune instances are bound to change with failovers and host replacements. Use this solution only for testing purposes. If you want a similar setup for production, feel free to ask a question and we can discuss options.
As already mentioned you can't access directly outside your VPC.
The following link describes another solution using a SSH tunnel: connecting-to-aws-neptune-from-local-environment.
I find it much easier for testing and development purpose.
You can create the SSH tunnel with Putty as well.
Reference: https://github.com/M-Thirumal/aws-cloud-tutorial/blob/main/neptune/connect_from_local.md
Connect to AWS Neptune from the local system
There are many ways to connect to Amazon Neptune from outside of the VPC, such as setting up a load balancer or VPC peering.
Amazon Neptune DB clusters can only be created in an Amazon Virtual Private Cloud (VPC). One way to connect to Amazon Neptune from outside of the VPC is to set up an Amazon EC2 instance as a proxy server within the same VPC. With this approach, you will also want to set up an SSH tunnel to securely forward traffic to the VPC.
Part 1: Set up a EC2 proxy server.
Launch an Amazon EC2 instance located in the same region as your Neptune cluster. In terms of configuration, Ubuntu can be used. Since this is a proxy server, you can choose the lowest resource settings.
Make sure the EC2 instance is in the same VPC group as your Neptune cluster. To find the VPC group for your Neptune cluster, check the console under Neptune > Subnet groups. The instance's security group needs to be able to send and receive on port 22 for SSH and port 8182 for Neptune. See below for an example security group setup.
Lastly, make sure you save the key-pair file (.pem) and note the directory for use in the next step.
Part 2: Set up an SSH tunnel.
This step can vary depending on if you are running Windows or MacOS.
Modify your hosts file to map localhost to your Neptune endpoint.
Windows: Open the hosts file as an Administrator (C:\Windows\System32\drivers\etc\hosts)
MacOS: Open Terminal and type in the command: sudo nano /etc/hosts
Add the following line to the hosts file, replacing the text with your Neptune endpoint address.
127.0.0.1 localhost YourNeptuneEndpoint
Open Command Prompt as an Administrator for Windows or Terminal for MacOS and run the following command. For Windows, you may need to run SSH from C:\Users\YourUsername\
ssh -i path/to/keypairfilename.pem ec2-user#yourec2instanceendpoint -N -L 8182:YourNeptuneEndpoint:8182
The -N flag is set to prevent an interactive bash session with EC2 and to forward ports only. An initial successful connection will ask you if you want to continue connecting? Type yes and enter.
To test the success of your local graph-notebook connection to Amazon Neptune, open a browser and navigate to:
https://YourNeptuneEndpoint:8182/status
You should see a report, similar to the one below, indicating the status and details of your specific cluster:
{
"status": "healthy",
"startTime": "Wed Nov 04 23:24:44 UTC 2020",
"dbEngineVersion": "1.0.3.0.R1",
"role": "writer",
"gremlin": {
"version": "tinkerpop-3.4.3"
},
"sparql": {
"version": "sparql-1.1"
},
"labMode": {
"ObjectIndex": "disabled",
"DFEQueryEngine": "disabled",
"ReadWriteConflictDetection": "enabled"
}
}
Close Connection
When you're ready to close the connection, use Ctrl+D to exit.
Hi you can connect NeptuneDB by using gremlin console at your local machine.
USE THIS LINK to setup your local gremlin server, it works for me gremlin 3.3.2 version
Only you have to update the remote.yaml as per your url and port

Can Windows Server 2016 EC2 mount EFS?

I am new to AWS. I have seen numerous definitive answers saying Windows and AWS EFS can't work with each other. Is it still the case with Windows Server 2016?
Amazon now supports a fully managed native Microsoft Windows file system,look at Amazon FSx for Windows File Server
https://aws.amazon.com/fsx/windows/
Yes they can but it's some work.
Amazon clearly states that EFS + Windows is not supported. But that doesn't mean it isn't possible. CITI # University of Michigan made an NFSv4.1 client for Windows several years ago.
To use it with AWS EFS you have to comment out one definition so that it always uses OPEN4_SHARE_DENY_NONE for the share-deny value – AWS specifically states in its Unsupported Features page as disallowing any other value.
And then compile, sign and install. It's not a trivial process, but it's doable. I'm running EFS + Windows Server 2012 R2 on EC2.
More detail in an answer to a similar question: https://stackoverflow.com/a/46625030/137641
No. Windows servers cannot currently (as at June 2017) mount Amazon EFS volumes.
(I don't know if it will be available in future, but I inserted the date because it might be introduced in future.)
I did this the other way around, by using Samba to provide the Windows share, from Linux.
Create an AWS EC2 instance.
Mount the EFS on the EC2 instance (using mount point IP, ensure same security group)
Install Samba on EC2 instance
Create local Samba config entry for EC2 local mount point
Add security group inbound entry for "SMB" port for client IP.
Mount EC2 samba share on Windows
After that, I could successfully mount the EFS volume on Windows.