Deploying SPL servers on AWS requires the following prerequisites:
- Computer with internet access and Mission Planner or QGroundControl GCS installed.
- Amazon Web Services account.
- Activated RockBLOCK Mk2 or RockBLOCK 9603 Iridium satellite communication module, if ISBD channel will be used.
Use the AWS region with the lowest network latency for Amazon EC2 service. The latency could be measured from the GCS machine using http://cloudharmony.com/speedtest-latency-dns-for-aws tool.
Follow these steps to deploy UV Hub and UV Tracks servers on AWS:
- Open AWS Console and select the AWS region.
- Enter the RockBLOCK IMEI, Rock 7 user name and password, and other CloudFormation stack’s input parameters. Make sure that values of
MAVTypeinput parameters match your autopilot firmware.
- Complete the stack creation wizard and wait until the stack creation is completed. Once the stack creation is successfully completed, the stack output parameters will be available.
- Register URL specified by
RockBLOCKHandlerURLoutput parameter as delivery address in Rock 7 Core services for your RockBLOCK. Choose HTTP_POST as the delivery format.
- Use the IP address and port number specified by
RadioRoomClientURLoutput parameter to set
portconfiguration properties of [tcp] configuration section in radioroom.conf UV Radio Room configuration file.
- Connect the GCS to the autopilot using regular radio-telemetry or USB connection and save the on-board parameters to a file.
- Connect the GCS to the IP address and port number specified by
ShadowClientURLoutput parameter and upload the on-board parameters from the file to the vehicle. (This will update the parameters in the vehicle shadow.)
The CloudFormation template deploys UV Hub, UV Tracks, UV Shadow, and UV Cockpit Docker containers with Amazon ECS service using container images from Docker Hub.
By default ports 5760 and 5757 can be accessed from any client IP address. That is anybody who knows IP address of UV Hub server can connect to it and control your vehicle. To make these ports accessible just from your machine, Specify the client CIDR using
ClientCIDR stack’s input parameter, or after the stack is created, change the in-bound rules for ports 5760 and 5757 in the EC2 security group created by the stack. Determine the public IP address of the GCS machine (http://checkip.amazonaws.com/) and set the source IP address for the ports to
<IP address>/32. Make sure that the security group in-bound rules are updated whenever the clients IP addresses are changed.
Access to port 5080 is used for delivery of mobile originated messages from RockBLOCK. It should be restricted to originating IP addresses
126.96.36.199 of Rock 7 services.
Controlling access to port 5060 used by TCP/IP connections from UV Radio Room based on IP address ranges is not straightforward. Cellular internet providers typically use dynamic IP addresses those may be reassigned on reboots. To secure UV Radio Room to UV Hub TCP/IP communication it’s recommended to use VPN remote-access solutions (for example, see Software Remote-Access VPN).
UV Hub and UV Tracks servers logs are stored in /var/log/messages file on the EC2 instance.
To connect to the EC2 instance and view the logs:
- In AWS Console select EC2 service,
- Select “Instances” tab in the left-side tabs,
- Select the EC2 instances and click “Connect” button,
- In the “Connect to your instance” dialog box select “Session Manager” as connection method and click “Connect” button in the dialog box.
In the appeared Session Manager terminal enter:
sudo tail -n 100 /var/log/messages