Note |
---|
To fully use this screen, you must have the following permissions assigned to your account: Read Workload(s) Write Workload Read Virtual Machine Stats Read Virtual Machine(s) Write Virtual Machine Scale Virtual Machine Read Location(s) Read Virtual Data Centers Read Tasks Write Tasks Read Storage Read product catalog Read Network IP Read Network NAT Read Entity Metadata Read Log Management Plan Selection Write Orders Read Orders Read Notification(s)
|
Note |
---|
The Virtual Machine screen also displays: |
Anchor |
---|
| Review-available-virtual-machines |
---|
| Review-available-virtual-machines |
---|
|
Available Virtual Machines
...
Anchor |
---|
| Review-Virtual-Machines |
---|
| Review-Virtual-Machines |
---|
|
Review Virtual Machines...
The Virtual Machines screen provides a high-level view of all of your virtual machines.
...
Column | Description |
---|
Name | This column displays the name of the virtual machine. |
Primary IP | This column displays the primary IP address associated with the instance. |
Type | This column display the type of instance. More common types are VM and Log Relay. |
Date Created | This column displays the date the virtual machine was created in AMP. |
State | The security status of the instance, in relation to the installed agent. There are three states: Unprotected indicates the agent is not installed in the instance. Needs Attention indicates that the agent is installed, but has not properly communicated (heartbeated) with Armor. OK indicates that the agent is installed and has communicated (hearbeated) with Armor.
|
Power | This column displays the power status of the virtual machine: A green icon indicates that the virtual machine is powered on. A red icon indicates that the virtual machine is powered off. An orange icon indicates that the virtual machine is in a different (inconsistent) power state than the other virtual machines in the same vApp. An infinite loop icon indicates that the virtual machine is pending installation.
|
Tags | This column displays any tags that have been added to the virtual machine on the Tags + Notes screen. |
...
In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
Click Virtual Machines.
Locate and select the desired instance.
Overview
This section displays detailed information for the virtual machine.
Field | Description |
---|
Type | This entry displays the type of instance, specific to the offerings offered by your public cloud provider, such as EC2 instance for AWS. |
Provider | This entry displays Armor's private cloud, the provider for the instance. |
Instance ID | This entry displays the ID associated with the virtual machine. |
Instance State | This entry displays the security status of the virtual machine. |
Region | This entry displays the data center that hosts the virtual machine. |
Availability Zone | This entry displays the available zone within the specified region. |
Workload | This entry displays the workload associated with the virtual machine. |
Storage | This entry displays the disk storage amount. |
Original OS Version | This entry displays the original operating system for the virtual machine. |
Current OS Version | This entry displays the current operating system for the instance or virtual machine. |
Public IPS | This entry displays the public IP address(es) associated with the virtual machine. |
Primary Private IP | This entry displays the private IP address associated with the virtual machine. |
Sub-Agent Health Table
This section displays the sub-agent health related to your Armor-protected virtual machines.
...
Anchor |
---|
| Review-Sub-Agent-Health-for-a-Virtual-Machine |
---|
| Review-Sub-Agent-Health-for-a-Virtual-Machine |
---|
|
Review Sub-Agent Health Details for a Virtual Machine
...
For each of your virtual machines, you can view sub-agent health details. You can use this information to troubleshoot agents that may be in a bad state.
In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
Click Virtual Machines.
Locate and select the desired instance.
Locate and hover over the sub-agent that you want to view.
Click the name of the desired sub-agent. Or, click the vertical ellipses, then click View Details.
On the left-side of the screen, select the sub-agent that you want to view.
The information that displays on the right-side of the screen will change based on the sub-agent that is selected.
...
SECTION | DESCRIPTION |
---|
Trend to Armor Sync | Trend Host ID Status Last Communication
Armor Host ID Status Last Communication
Steps to Remediate |
Connectivity | This section displays the script(s) to check connectivity, along with steps to remediate. |
Errors | This section displays any known errors, along with steps to remediate. |
Vulnerability Scanning
Review specific information and troubleshooting steps for the Vulnerability Scanning service.
SECTION | DESCRIPTION |
---|
Registered | This section displays the following information for the Armor agent that is registered: Agent ID Asset ID Status Steps to Remediate
|
Scan Import | This section displays the following scan import information for the Armor agent: Report Date Expected Window Status Steps to Remediate
|
Connectivity | This section displays the script(s) to check connectivity, along with steps to remediate. |
Last Scan Time | This section displays the following information regarding the most recent scan: Scan Time Expected Window Status Steps to Remediate
|
...
Expand |
---|
title | Create a Virtual Machine with a New Workload |
---|
|
Anchor |
---|
| Create-a-virtual-machine-with-a-new-workload |
---|
| Create-a-virtual-machine-with-a-new-workload |
---|
| Create a Virtual Machine with a New Workload Insert excerpt |
---|
| Workloads |
---|
| Workloads |
---|
name | Create a workload with a new virtual machine |
---|
nopanel | true |
---|
|
Note |
---|
After you create a virtual machine, Armor recommends that you: Create a firewall rule By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
Download the SSL/VPN client.
|
|
Expand |
---|
title | Create a Virtual Machine with an Existing Workload |
---|
|
Anchor |
---|
| Create-a-virtual-machine-with-an-existing-workload |
---|
| Create-a-virtual-machine-with-an-existing-workload |
---|
| Create a Virtual Machine with an Existing Workload Note |
---|
If you create a virtual machine with an existing workload, then your Location and Virtual Data Center will be automatically selected. |
In the Armor Management Portal, in the left-side navigation, click Infrastructure. Click Virtual Machines. Hover over the plus ( + ) icon, and then click the virtual machine icon. Locate and select the desired operating system and operating system version. Select the desired virtual machine based on your CPU and memory needs (GB).
You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show More Options to see every virtual machine offering. Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
In Name, enter a descriptive name for your virtual machine. In Workload, select an existing workload. In In Workload Tier, select an existing tier. Under Access Credentials, note your username to access the virtual machine. In Password, enter a secure password to use to access the virtual machine. (Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk. On the right-side menu, review the pricing information, and then click Purchase. When you order a virtual machine, you are also ordering Intelligence Security Model (ISM ) for the virtual machine. Based on the number of virtual machines that you order, the price of ISM may change.
To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Note |
---|
After you create a virtual machine, Armor recommends that you: Create a firewall rule By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
Download the SSL/VPN client.
|
|
Anchor |
---|
| Edit-a-Virtual-Machine |
---|
| Edit-a-Virtual-Machine |
---|
|
Edit a Virtual Machine
...
Virtual Machine Templates
...