Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

    • If you modify a security group, adding or removing rules, and the security group is already associated to the virtual machine, the changes will be available in real time
    • If you want to add or remove a security group from a virtual machine, click on "Project → Compute →  Compute →  Instances", select the virtual machine and from the menu on the right, click on "Edit Security Group". So, add or remove the security groups to the instance.

5. Launch an instance of Linux virtual machine

Once your key pair and your security group are defined, proceed building the virtual machine.

    • Click on "Project →  Compute → Instances"
    • Click on "Launch instance" button
    • In the "Details" box, enter:
      • the instance name

...

      • number of instances you want to create with this configuration (default is 1)
    • In the "Source" box, enter:
      • the boot source for the instance. It can be an image, a bootable volume or a bootable volume snapshot.  
        • Images: we provide some default images (centos, ubuntu, etc.).  For these default images, it is set a default user can login into the virtual machine using a key pair. Such a user can execute commands as root. The password of the user root is embedded.  If you want to use your personal image, you can create it in the cloud environment click on "Project → Compute → Images", the "Create Image" and upload it.
        • Note If you want to create a bootable volume from your instance, select  "yes" in "Create New Volume" and select the size of such volume.
    • In the "Flavor" box, select the flavor you want to use, accordingly with the resources you have.
        • NB: if you select to create a volume from your instance, the root disc of the virtual machine will have the size of the volume, not the size set in the flavor 
    • In the "Networks" box, enter the network internal to your project on which connect the virtual machine
    • In the "Security Groups" box, select the security groups you want. Remember that you can always modify them after the virtual machine creation.
    • In the "Key Pair" box, select the key pair you want to use for ssh login.

6. Follow the boot process

The boot process can be followed on the instances screen. Once the VM is in state ACTIVE, you will be able to open the console and follow the boot process. 

To follow the installation, you can access the graphical console using the browser once the VM is in BUILD state.

The console is accessed by selecting the "Instance Details" for the machine and then click on the tab "Console".

7. Associate a Floating IP (FIP) to the virtual machine

Where floating IPs are configured in a deployment, each project will have a limited number of floating IPs controlled by a quota. However these need to be allocated to the project from the central pool prior to their use.

To allocate a floating IP to a project, click on "Project → Network → Floating IPs", then click on the button "Allocate IP to project" on the right side of the dashboard page. Once allocated, a floating IP can be associated with running istances. Just click on "Associate" action on the right of the page. In the popup, select your virtual machine by the menu in "Port to be associated".
The inverse action, Dissociate Floating IP, is available from the "Instances" page.

8. Login to the virtual machine using ssh

After the association of a Floating IP to your virtual machine, you can login using the default user and key ( if you have used a native default image for cloud), or using another username (if you have used your personal image with a custom user defined in it). Suppose you have used the default ubuntu cloud image, you can login as:

$ ssh -i MyKey.pem ubuntu@<floating IP address> 

Operations with an instance

...