Dash Enterprise Administration
4.3.0
4.3.0
  • Changelog
  • Installation
    • Capacity Planning
      • Dash Enterprise Single Server
      • Dash Enterprise for Kubernetes
    • Before you install
    • Dash Enterprise Single Server
      • Installation on cloud provider
      • On-premise installation on own server
      • Fully offline installation
    • Dash Enterprise Kubernetes
      • Amazon Web Services resource prerequisites
      • Google Cloud Platform resource prerequisites
      • Microsoft Azure resource prerequisites
  • Configuration
    • Set up your Server Manager
    • Run preflight checks
    • Configure basic settings
    • Authentication settings
      • Built-in local authentication
      • LDAP authentication
      • SAML authentication
    • Dash Enterprise Kubernetes additional required configuration
    • Configure optional settings
    • Add SELinux permissions to mapped directories
    • Other options and customizations
    • Using Snapshots & Backups
    • Running and logging into Dash Enterprise
    • Next steps
  • Advanced Configuration
    • General troubleshooting and problem solving
      • Dash Enterprise Kubernetes
    • Load balancer configuration
    • Reverse proxy setup instructions
    • Docker storage driver requirements and considerations
    • Import an LDAPS certificate from Active Directory into Dash Enterprise
    • Transfer Dash Enterprise to a new server
    • Sync license changes
    • Change channels for an upgrade
    • Admin panel reference
    • Configure Dash Enterprise to use common SAML IdPs
      • Active Directory Federation Services (AD FS)
      • PingFederate
      • Okta
    • Configure Dash Enterprise to use common LDAP IdPs
      • Okta
  • Upgrade
    • Prepare for the upgrade
    • Upgrade
      • Dash Enterprise Single Server
      • Dash Enterprise for Kubernetes
    • After the upgrade
  • Advanced Troubleshooting
    • Dash Enterprise Architecture and Internals
    • Navigating the System
    • Navigating the Support Bundle
    • Getting Help and Reporting Issues
    • Troubleshooting Specific Issues
Powered by GitBook
On this page
  • Supported providers
  • Installation on Azure
  • Installation on Google Cloud Platform
  • Installation on Amazon Web Services
  • Associate an Elastic IP
  • Administration via SSH
  • Configuring a proxy

Was this helpful?

  1. Installation
  2. Dash Enterprise Single Server

Installation on cloud provider

PreviousDash Enterprise Single ServerNextOn-premise installation on own server

Last updated 2 years ago

Was this helpful?

This section applies to installing Dash Enterprise on a single server on a supported cloud provider. For installing the Kubernetes version of the software, see .

Supported providers

Currently we support a simplified installation on Amazon Web Services using an EC2 virtual server and a custom AMI (similar support for other cloud providers is in development). To install on a different cloud provider, simply provision a compute instance that meets our requirements, then follow the instructions in .

With the current release, your cloud instance must be able to access the Internet, either directly or via a proxy, to use our automated installation process. If your instance does not have Internet access, skip ahead to .

Installation on Azure

Provision a Linux VM equal to D4s v3 in size and compute power (or larger), then proceed to section .

Installation on Google Cloud Platform

Provision a Linux VM equal to n1-standard-8 in size and compute power (or larger), then proceed to section .

Installation on Amazon Web Services

Dash Enterprise can be installed by launching an Amazon Machine Image as follows:

1 - Log into your AWS console and visit the EC2 Management Console in the region of your choice; in this example, we have chosen the ca-central-1 region:

2 - Click Launch Instance

3 - At Step 1: Choose an Amazon Machine Image (AMI), select Community AMIs (circle 1) from the menu on the left, then enter plotly in the search box (circle 2):

4 - Ensure the ID of the AMI (circle 3) matches the ID in the below table for the region you’re using:

Region

AMI ID

eu-north-1

ami-0aab4d8355883a5a9

ap-south-1

ami-00cc0ab46b7646a92

eu-west-3

ami-0f4ceadcc59015700

eu-west-2

ami-00ccb082163e67523

eu-west-1

ami-0460cd3af1c0178aa

ap-northeast-3

ami-085ffb3f7bbb46ca2

ap-northeast-2

ami-07e9d94326b87f2f8

ap-northeast-1

ami-0238286d89f82a1db

sa-east-1

ami-0ccf5e9afa3348447

ca-central-1

ami-07fd50db448425f2c

ap-southeast-1

ami-0983d15b2fe791154

ap-southeast-2

ami-037da9aa3b38a8053

eu-central-1

ami-01a07f9ad5ae4fc25

us-east-1

ami-0e8ab704ccbc4922b

us-east-2

ami-088ea0bb20d655f2f

us-west-1

ami-0c6d0f2d9f3ad5618

us-west-2

ami-0c887bad5243ef62b

5 - After verifying the AMI ID, click Select to choose the AMI

6 - In Step 2: Choose an Instance Type, select an appropriate instance type and click Next: Configure Instance Details

  • t2.2xlarge is a good option, but you can choose a larger instance type if you want higher performance

7 - On Step 3: Configure Instance Details, set Auto-assign public IP to Disable, then click Next: Add Storage

8 - On Step 4: Add Storage, set the Size (GiB) of the root volume, then click Next: Add Tags

  • We recommend 2000 GiB

  • This number may be increased or decreased depending on the size of the active team, but should never be less than 200 GiB

  • We currently do not support splitting your server’s directory structure across multiple block devices; please add only one storage volume of the required size

9 - On Step 5: Add Tags, you may optionally add a Name tag of plotly-on-premise and any other tags you require for your organization purposes

  • When done, click Next: Configure Security Group

10 - On Step 6: Configure Security Group, select Create a new security group, give it a descriptive name such as plotly-on-premise, and configure entries as below:

  • The Custom TCP 3022 rule is only needed for Dash Enterprise; all others are required

  • To restrict access to Dash Enterprise to a single IP address (or range of IPs) replace the default Source values (0.0.0.0/0, ::/0) with the address or range

  • Once you have configured the security group, click Review and Launch

11 - On Step 7: Review Instance Launch, carefully review the information and especially confirm that the security groups match the ones shown below:

  • If any information is incorrect, use the Edit links to go back and correct it.

12 - After verifying, click Launch and choose a key pair you have access to, or create a new key pair and download it * This step is extremely important! Without this key pair, you will not be able to SSH into your server and the key pair is very difficult to reset.

13 - On the Launch Status screen, click View Instances at the bottom right

Associate an Elastic IP

To ensure your instance’s IP address does not change when the instance is rebooted or undergoes other maintenance, associate an Elastic IP address with the instance as follows:

1 - In your AWS console, select Elastic IPs from the menu on the left

2 - Select Allocate new address, leave the Scope set to VPC, then choose Allocate

3 - On the New address request succeeded screen, note the new address (in this case 52.60.140.183) and then click the address

4 - In the Elastic IPs screen, ensure your new IP address is selected, then click Actions > Associate address

5 - Click Select an instance and choose your new instance from the list

6 - Click the Associate button at the bottom right, then Close

Administration via SSH

To administer your instance via SSH, you may log in using the plotly username and the SSH key you selected or uploaded when launching your new instance.

Configuring a proxy

If your system requires a proxy to access the Internet,configure as follows:

2 - Run the Plotly installation script:

curl -sSL https://get.plot.ly | sudo bash

3 - When asked if your machine requires a proxy to access the internet, enter y and provide your proxy details when prompted

14 - Associate an Elastic IP with your instance (see )

Your instance is now ready for you to upload your license and configure Dash Enterprise. If your instance uses a proxy to access the Internet, see . Otherwise, skip to to continue.

1 - into the running instance

4 - Once this script is complete, proceed with the instructions in

If your proxy credentials are rotated periodically, Dash Enterprise can still use your proxy, but please for additional instructions.

Configuration
contact Plotly support
Associate an Elastic IP
Configuration
Configuring a proxy
SSH
Dash Enterprise Kubernetes installation using cloud provider's Kubernetes cluster
Dash Enterprise Single Server: On-Premise Installation on Own Server
Dash Enterprise Single Server: fully offline installation
On-premise installation on own server
On-premise installation on own server