7.1

Table Of Contents
The AWS Power User role does not allow management of AWS Identity and Access Management (IAM)
users and groups. For management of IAM users and groups, you must be congured with AWS Full
Access Administrator credentials.
vRealize Automation requires access keys for endpoint credentials and does not support user names
and passwords. To obtain the access key needed to create the Amazon endpoint, the Power User must
either request a key from a user who has AWS Full Access Administrator credentials or be additionally
congured with the AWS Full Access Administrator policy.
For information about enabling policies and roles, see the AWS Identity and Access Management (IAM) section
of Amazon Web Services product documentation.
Allow Amazon AWS to Communicate with the Software Bootstrap Agent and
Guest Agent
If you intend to provision application blueprints that contain Software, or if you want the ability to further
customize provisioned machines by using the guest agent, you must enable connectivity between your
Amazon AWS environment, where your machines are provisioned, and your vRealize Automation
environment, where the agents download packages and receive instructions.
When you use vRealize Automation to provision Amazon AWS machines with the vRealize Automation
guest agent and Software bootstrap agent, you must set up network-to-Amazon VPC connectivity so your
provisioned machines can communicate back to vRealize Automation to customize your machines.
For more information about Amazon AWS VPC connectivity options, see the Amazon AWS documentation.
Using Optional Amazon Features
vRealize Automation supports several Amazon features, including Amazon Virtual Private Cloud, elastic
load balancers, elastic IP addresses, and elastic block storage.
Using Amazon Security Groups
Specify at least one security group when creating an Amazon reservation. Each available region requires at
least one specied security group.
A security group acts as a rewall to control access to a machine. Every region includes at least the default
security group. Administrators can use the Amazon Web Services Management Console to create additional
security groups, congure ports for Microsoft Remote Desktop Protocol or SSH, and set up a virtual private
network for an Amazon VPN.
When you create an Amazon reservation or congure a machine component in the blueprint, you can
choose from the list of security groups that are available to the specied Amazon account region. Security
groups are imported during data collection.
For information about creating and using security groups in Amazon Web Services, see Amazon
documentation.
Understanding Amazon Web Service Regions
Each Amazon Web Services account is represented by a cloud endpoint. When you create an
Amazon Elastic Cloud Computing endpoint in vRealize Automation, regions are collected as compute
resources. After the IaaS administrator selects compute resources for a business group, inventory and state
data collections occur automatically.
Inventory data collection, which occurs automatically once a day, collects data about what is on a compute
resource, such as the following data:
n
Elastic IP addresses
n
Elastic load balancers
Configuring vRealize Automation
18 VMware, Inc.