Overview
Deploy Metlo on AWS using CloudFormation templates. Metlo provides two deployment options:- Metlo Manager - Main instance running all Metlo services
- Traffic Mirror Ingestor - Separate instance for processing VPC traffic mirroring
Prerequisites
- AWS account with appropriate permissions
- EC2 Key Pair for SSH access
- VPC with appropriate networking configuration
- For traffic mirroring: Subnet and availability zone details
Deployment Options
- Metlo Manager
- Traffic Mirror Ingestor
Deploy Metlo Manager
The Metlo Manager is the main instance that runs the complete Metlo platform including the web UI, backend API, and collector.Launch CloudFormation Stack
Click the button below or use the AWS Console:The deployment will create:
CloudFormation Template URL:
- EC2 instance (t3.large)
- Security group with required ports
- All Metlo services via Docker
Configure Parameters
Provide the following parameters:
- Stack Name: Name for your CloudFormation stack (e.g.,
Metlo-Manager) - VPC: Select the VPC where Metlo will be deployed
- EC2 Key Pair: Select key pair for SSH access
- License Key: Optional enterprise license key
Wait for Deployment
The CloudFormation stack will:
- Launch an EC2 instance with Metlo AMI
- Configure security groups (ports 22, 8081)
- Run the deployment script automatically
- Start all Metlo services
Instance Details
Recommended instance size for production workloads
Amazon Linux 2 with pre-installed Metlo deployment scripts
Security Group Configuration
The CloudFormation template creates a security group with:Inbound Rules:- Port 22 (SSH) - From 0.0.0.0/0
- Port 8081 (Collector) - From 0.0.0.0/0
- Ports 0-65535 (All traffic) - To 0.0.0.0/0
Supported Regions
Metlo provides AMIs in the following AWS regions:- Americas
- Europe
- Asia Pacific
- us-east-1 (N. Virginia)
- us-east-2 (Ohio)
- us-west-1 (N. California)
- us-west-2 (Oregon)
- ca-central-1 (Canada)
- sa-east-1 (São Paulo)
Post-Deployment Configuration
SSH Access
Connect to your instance using the key pair you specified:Management Commands
Once connected, use themetlo-deploy command:
Environment Variables
Configuration is stored in/opt/metlo/.env. Key variables:
Advanced Configuration
Custom CloudFormation Deployment
For more control, download and customize the CloudFormation templates:Using Custom AMI
To build your own Metlo AMI:- Launch a base Amazon Linux 2 instance
- Run the deployment script:
- Create an AMI from the configured instance
- Update the CloudFormation template with your AMI ID
Cost Estimation
Estimated monthly costs (us-east-1 region):
- Metlo Manager (t3.large): ~$60-70/month
- Traffic Mirror Ingestor (t3.small): ~$15-20/month
- Data Transfer: Varies based on traffic volume
- EBS Storage: ~$10/month for 50GB
Troubleshooting
CloudFormation stack creation fails
CloudFormation stack creation fails
- Verify your EC2 key pair exists in the selected region
- Ensure you have sufficient EC2 instance limits
- Check IAM permissions for CloudFormation and EC2
- Review CloudFormation Events tab for specific errors
Cannot access Metlo UI after deployment
Cannot access Metlo UI after deployment
- Wait 15-20 minutes for full initialization
- Check the EC2 instance is running
- Verify security group allows inbound traffic on port 8000
- SSH into the instance and check service status:
sudo metlo-deploy status
Traffic mirror data not appearing
Traffic mirror data not appearing
- Verify the Metlo Address parameter includes the correct port (8081)
- Check the API key is valid
- Ensure traffic mirror sessions are configured correctly
- Verify security group allows UDP 4789 from your VPC CIDR
- Check ingestor logs:
sudo journalctl -u metlo-traffic-mirror
High costs or unexpected charges
High costs or unexpected charges
- Review Data Transfer costs from VPC traffic mirroring
- Consider using VPC endpoints to reduce data transfer costs
- Scale down instance types for testing/development environments
- Set up billing alerts in AWS Cost Explorer
Next Steps
Configure Traffic Mirroring
Set up VPC traffic mirroring
Connect Data Sources
Configure other data source integrations
Security Policies
Configure detection and blocking rules
Environment Variables
Configure environment settings