...
- If you modify a security group, adding or removing rules, and the security group is already associated to the virtual machine, the changes will be available in real time
- If you want to add or remove a security group from a virtual machine, click on "Project → Compute → Compute → Instances", select the virtual machine and from the menu on the right, click on "Edit Security Group". So, add or remove the security groups to the instance.
Once your key pair and your security group are defined, proceed building the virtual machine.
- Click on "Project → Compute → Instances"
- Click on "Launch instance" button
- In the "Details" box, enter:
- the instance name
...
- number of instances you want to create with this configuration (default is 1)
- In the "Source" box, enter:
- the boot source for the instance. It can be an image, a bootable volume or a bootable volume snapshot.
- Images: we provide some default images (centos, ubuntu, etc.). For these default images, it is set a default user can login into the virtual machine using a key pair. Such a user can execute commands as root. The password of the user root is embedded. If you want to use your personal image, you can create it in the cloud environment click on "Project → Compute → Images", the "Create Image" and upload it.
- Note If you want to create a bootable volume from your instance, select "yes" in "Create New Volume" and select the size of such volume.
- the boot source for the instance. It can be an image, a bootable volume or a bootable volume snapshot.
- In the "Flavor" box, select the flavor you want to use, accordingly with the resources you have.
- NB: if you select to create a volume from your instance, the root disc of the virtual machine will have the size of the volume, not the size set in the flavor
- In the "Networks" box, enter the network internal to your project on which connect the virtual machine
- In the "Security Groups" box, select the security groups you want. Remember that you can always modify them after the virtual machine creation.
- In the "Key Pair" box, select the key pair you want to use for ssh login.
The boot process can be followed on the instances screen. Once the VM is in state ACTIVE, you will be able to open the console and follow the boot process.
To follow the installation, you can access the graphical console using the browser once the VM is in BUILD state.
The console is accessed by selecting the "Instance Details" for the machine and then click on the tab "Console".
8. Login to the virtual machine using ssh
After the association of a Floating IP to your virtual machine, you can login using the default user and key ( if you have used a native default image for cloud), or using another username (if you have used your personal image with a custom user defined in it). Suppose you have used the default ubuntu cloud image, you can login as:
$ ssh -i MyKey.pem ubuntu@<floating IP address>
Operations with an instance
...