Quilt is a versioned data portal for AWS. A Quilt instance is a private portal that runs in your virtual private cloud (VPC). Each instance consists of a password-protected web catalog on your domain, backend services, a secure server to manage user identities, and a Python API.
We encourage users to contact us before deploying Quilt. We will make sure that you have the latest version of Quilt, and walk you through the CloudFormation deployment.
We recommend that all users do one or more of the following:
​Schedule a Quilt engineer to guide you through the installation
​Join Quilt on Slack to ask questions and connect with other users
​Email Quilt​
You will need the following:
An AWS account
IAM Permissions to run the CloudFormation template (or Add products in Service Catalog). The AdministratorAccess
policy is sufficient. (Quilt creates and manages a VPC, containers, S3 buckets, a database, and more.) If you wish to create a service role for the installation, visit IAM > Roles > Create Role > AWS service > CloudFormation
in the AWS console. The following service role is equivalent to AdministratorAccess
:
{"Version": "2012-10-17","Statement": [{"Effect": "Allow","Action": "*","Resource": "*"}]}
The ability to create DNS entries, such as CNAME records, for your company's domain.
An SSL certificate in the same region as your Quilt instance to secure the domain where your users will access your Quilt instance. For example, to make your Quilt catalog available at https://quilt.mycompany.com
, you require a certificate for either *.mycompany.com
or for the following 3 domains: quilt.mycompany.com
, quilt-registry.mycompany.com
and quilt-s3-proxy.mycompany.com
in the AWS Certificate Manager. You may either create a new certificate, or import an existing certificate. The ARN for this certificate or set of certificates is required for use as the CertificateArnELB
CloudFormation parameter.
For maximum security, Quilt requires a region that supports AWS Fargate. As of this writing, all U.S. regions support Fargate.
An S3 Bucket for your team data. This may be a new or existing bucket. The bucket should not have any notifications attached to it (S3 Console > Bucket > Properties > Events). Quilt will need to install its own notifications. Installing Quilt will modify the following Bucket characteristics:
Permissions > CORS configuration (will be modified for secure web access)
Properties > Object-level logging (will be enabled)
Properties > Events (will add one notification)
Buckets in Quilt may choose to enable versioning or disable versioning. It is strongly recommended that you keep versioning either on or off during the entire lifetime of the bucket. Toggling versioning on and off incurs edge cases that may cause bugs with any state that Quilt stores in ElasticSearch due to inconsistent semantics of ObjectRemoved:DeleteMarkerCreated
.
A subdomain that is as yet not mapped in DNS where users will access Quilt on the web. For example quilt.mycompany.com
.
Available CloudTrail Trails in the region where you wish to host your stack (learn more).
An active subscription to Quilt Business on AWS Marketplace. Click Continue to Subscribe
on the Quilt Business Listing to subscribe then return to this page for installation instructions. The CloudFormation template and instructions on AWS Marketplace are infrequently updated and may be missing critical bugfixes.
You can install Quilt via AWS Marketplace. As indicated above, we recommend that you contact us first.
Email [email protected] with your AWS account ID to request access to Quilt through the AWS Service Catalog and to obtain a license key.
Click the service catalog link that you received from Quilt. Arrive at the Service Catalog. Click IMPORT, lower right.
​​
Navigate to Admin > Portfolios list > Imported Portfolios. Click Quilt Enterprise.
​​
On the Portfolio details page, click ADD USER, GROUP OR ROLE. Add any users, including yourself, whom you would like to be able to install Quilt.
​​
Click Products list, upper left. Click the menu to the left of Quilt CloudFormation Template. Click Launch product. (In the future, use the same menu to upgrade Quilt when a new version is released.)
​​
Continue to the CloudFormation section. Note: the following screenshots may differ slightly fromm what you see in Service Catalog.
Specify stack details in the form of a stack name and CloudFormation parameters. Refer to the descriptions displayed above each text box for further details. Service Catalog users require a license key. See Before you install Quilt for how to obtain a license key.
​​
If you wish to use a service role, specify it as follows:
​​
Service Catalog users, skip this step. Under Stack creation options, enable termination protection.
​​
This protects the stack from accidental deletion. Click Next.
Service Catalog users, skip this step. Check the box asking you to acknowledge that CloudFormation may create IAM roles, then click Create.
​​
CloudFormation takes about 30 minutes to create the resources for your stack. You may monitor progress under Events. Once the stack is complete, you will see CREATE_COMPLETE
as the Status for your CloudFormation stack.
​​
To finish the installation, you will want to view the stack Outputs.
​​
In a separate browser window, open the DNS settings for your domain. Create the following CNAME
records. Replace italics with the corresponding stack Outputs.
CNAME | Value |
QuiltWebHost Key | LoadBalancerDNSName |
RegistryHostName Key | LoadBalancerDNSName |
S3ProxyHost Key | LoadBalancerDNSName |
Quilt is now up and running. You can click on the QuiltWebHost value in Outputs and log in with your administrator password to invite users.
Once you have a Quilt stack running, you can upgrade it as follows. You will need a licensed CloudFormation template from Quilt.
Navigate to AWS Console > CloudFormation > Stacks
Select your Quilt stack
Click Update (upper right)
Choose Replace current template
Enter the Amazon S3 URL for your template
Click Next (several times) and proceed to apply the update
Your previous settings should carry over.
The default Quilt settings are adequate for most use cases. The following section covers advanced customization options.
You can enable users on your Google domain to sign in to Quilt. Refer to Google's instructions on OAuth2 user agents and create authorization credentials to identify your Quilt stack to Google's OAuth 2.0 server.
In the template menu (CloudFormation or Service Catalog), select Google under User authentication to Quilt. Enter the domain or domains of your Google apps account under SingleSignOnDomains. Enter the Client ID of the OAuth 2.0 credentials you created into the field labeled GoogleClientId
Go to Azure Portal > Active Directory > App Registrations
Click New Registration
Name the app, select the Supported account types
Set a Redirect URI from a "Single-page application" to
https://<QuiltWebHost>/oauth-callback
Once the application has been created you will need both its Application
(client) ID and Directory (tenant) ID
Your AzureBaseUrl
will be of the form
https://ENDPOINT/TENANT_ID
. In most cases ENDPOINT
is simply
login.microsoftonline.com
. Reference
​Microsoft identity platform and OpenID Connect protocol​
and
​National clouds​
for further details.
Go to App registrations > Your Quilt app > Authentication > Implicit grants
and hybrid flows, and check the box to issue ID tokens
Proceed to Enabling SSO​
Go to Okta > Admin > Applications
Click Add Application
Select type Web
Name the app Quilt
or something similar
Configure the app as shown below
Add <QuiltWebHost>
to Login redirect URIs
and
Initiate login URI
Copy the Client ID
to a safe place
Go to API > Authorization servers
You should see a default URI that looks something like this
https://<MY_COMPANY>.okta.com/oauth2/default
; copy it to a
safe place
Proceed to Enabling SSO​
Go to Administration : Applications > Custom Connectors
Click New Connector
Name the connector Quilt Connector or something similar
Set Sign on method
to OpenID Connect
Set Login URL
to https://<QuiltWebHost>/oauth-callback
Save
Go back to Applications > Custom Connectors
Click Add App to Connector
Save the app (be sure to save it for the Organization)
Go to Applications > Applications > Your new app > SSO
Click SSO. Copy the Client ID and Issuer URL V2 to a safe place.
Add Your new app to the users who need to access
Quilt
Proceed to Enabling SSO​
​
​
Now you can connect Quilt to your SSO provider. In the Quilt template (AWS Console > CloudFormation > Quilt stack > Update > Use current template > Next > Specify stack details), set the following parameters:
AuthType: Enabled
AuthClientId: Client ID
AuthBaseUrl: Issuer URL V2
These instructions document how to set up an existing role for use with Quilt. If the role you want to use doesn't exist yet, create it now.
Go to your Quilt stack in CloudFormation. Go to Outputs
, then find RegistryRoleARN
and copy its value. It should look something like this: arn:aws:iam::000000000000:role/stackname-ecsTaskExecutionRole
.
Go to the IAM console and navigate to Roles
. Select the role you want to use. Go to the Trust Relationships
tab for the role, and select Edit Trust Relationship
. The statement might look something like this:
{"Version": "2012-10-17","Statement": ["... one or more statements"]}
Add an object to the beginning of the Statement array with the following contents:
{"Effect": "Allow","Principal": {"AWS": "$YOUR_REGISTRY_ROLE_ARN"},"Action": "sts:AssumeRole"},
Note the comma after the object. Your trust relationship should now look something like this:
{"Version": "2012-10-17","Statement": [{"Effect": "Allow","Principal": {"AWS": "$YOUR_REGISTRY_ROLE_ARN"},"Action": "sts:AssumeRole"},"... whatever was here before"]}
You can now configure a Quilt Role with this role (using the Catalog's admin panel, or quilt3.admin.create_role
).