Quick Start Guide: Installing Conduit on Amazon Web Service (AWS)

This guide assumes experience configuring AWS EC2 instances.
For support, contact our Conduit support via email at support@bpcs.com to schedule time for one of our architects to assist in the deployment.

Prerequisites

  1. You have an EC2 instance available within AWS. For instructions on creating an EC2 instance, check out this article. The EC2 instance needs to meet the following minimum requirements:
    1. 4 cores
    2. 16G of RAM
    3. Ubuntu Linux 16.04 LTS
  2. Authorize inbound traffic for ports 80, 443 and 10002. For instructions on authorizing inbound traffic, check out this article. You can limit access to the IP's that will access Conduit.

Installation

  1. Upload the Conduit .tar file and shell script to a folder on the EC2 instance.
  2. With the script files loaded onto the VM, ensure that the deployment script (.sh file) is an executable (if not: $ chmod +x <filename>)
  3. Run the deployment script as root ./conduit-transformless-install.sh ($ sudo ./conduit-transformless-install.sh)
  4. When prompted, enter the fully qualified domain name (FQDN) for the EC2 instance. Example: ec2-74-728-49-824.us-west-2.compute.amazonaws.com.
  5. When prompted, enter a name, email and password for the initial Conduit administrator account.
  6. Once the script completes, open a web browser and navigate to the FQDN entered in Step 4. The FQDN entered in the browser should begin with https://




7. Login with the administrator credentials you entered in Step 3.



License Configuration

A valid license key, issued by Blueprint, is required in order to utilize Conduit.

  1. In Conduit, go to the Settings (click the Admin Username at top right of screen and you will find Settings).
  2. Copy the generated License Token.
  3. Email the license token to support@bpcs.com. You will receive your license key.


Ready to Build!

Now you are ready to start creating connectors! Check out the Connectors page for guidance on how to begin.

You can also begin to configure your authentication methods and user groups. Managing Users and Security will help get you there.