FAQ – Cloud

Invisible

How do I access my OpenStack account?

Go to your Apps, then click on the Access Tab, where your credentials are stored.

Differences between ephemeral disks, images and volumes

OpenStack differs between Emphemeral DisksImages and Volumes
A volume is just a RBD (Rados Block Device) which resides in our Ceph cluster and can be coupled with your instances.
An image is an exact replica of the contents of the disks. 
An ephemeral disk is a temporary storage. Its data will be lost, when the instance which it is attached to is deleted.

Differences between "live migration" and "normal" migration

When you trigger a migration, an instance will be moved from one hypervisor to another.

Live migration refers to the migration while the instance up and running. Clients and applications will not be disconnected.

Normal migration will only work, when the instance was shut down before.

Please note, that you can’t migrate the instances on your own. You will therefore have to contact the support team for that.

Differences between creating a Snapshot for local SSD and Volume

  • Local SSD: At startup, the image can not be deleted as long as a VM is available. Snapshot is stored in compute/file/images.
  • Volume: A Volume can also be deleted if a VM is running on it. Volume is stored in compute/snapshots

How do I create my first VM?

  1. Create a VM the same way you done it before. Name the machine, choose a OS, select a Flavor (create a new Volume “NO” for SSD) and attach a SSH-Key.
  2. Add a Floating-IP from Dropdown Menu.
  3. Create a Security-Group on Network -> Security-Group.
  4. Head into Rule by “Manage Rule” and add a Rule.
  5. Use the predifined SSH-Rule and fill in your Network and Netmask.
  6. Go back to your VM through Dropdown Menu and select “Edit Security Group”.
  7. Add a Security-Group by hitting the + on the right side.

That’s it! Your machine will be available with the open service-definition on your public-floating ip.
To add more services, you can also reuse your existing security-group. Additionally you can edit the default-security-group, which is attached to all machines by default.

What are Floating IPs?

A Floating IP is an IP address that can be instantly moved from one instance to another.

The server itself doesn’t know about this IP, however all traffic will be automatically routed trough this IP to the server.

What are so called "Security Groups"?

When it comes to “Security Groups” then you should think about it as firewall rules/policies, which can for example limit the traffic to your instances. Furthermore you can create as many security groups as you need.

Additionally you can combine one or more rules to just one security group.

Security groups can always be attached/detached from a running instance, after all this has no penalty on your traffic.

How can I create a virtual machine with a volume as root disk?

While creating an instance, choose Yes under the Create New Volume Question (Launch Instance Dialog).

How can I connect to my VM from the internet?

Just add a Floating IP (description above) to your instance. This will allocate a new IP from our public network and route all incommig traffic to the instance where the IP is attached to.

Don’t forget to add a security group (to the server). By default a security group called default is attached, which as a result allows all traffic.

How can I create a Site-to-Site VPN?

First ensure that you know what subnet your network has. You can determine this if you open the Network Topology Overview.

Next go to VPN overview and create a IKE configuration and save your settings. (on some devices like Cisco or HP Router this is also known as Phase 1).

Then proceed with the IPSec configuration in the tab IPsec Policies (on some Devices like Cisco or HP Router this is known as Phase 2).

The next step is to create the Tunnel Service itself in VPN Services.

Define the subnets of remote and local sites. To do so add a endpoint in the Endpoint Groups tab.

Now create the site connection in the IPsec Site Connections. This task may fail if there is an error in the previous dialogs. If you’re stuck or struggling with this, go back to the previous step and check if there is something wrong.

OpenStack has at this time of writing a bug, because it ignores the dropdown decision of Endpoint Groups, which means you have to add the subnet manually in the textfield Remote peer Subnet(s).

Finally you will see an entry, which means the Tunnel is Up and ready to use.

Can I log into my running instances with a Dial-In-VPN?

No. OpenStack just supports Site-to-site IPSec VPNs at the moment.

How can I attach security groups to a running virtual machine?

Navigate to your instances menu on the left side. Then open the action menu for the instance you want to interact with. (Dropdown on the right side)

Hit the Edit Security Groups entry which will bring up a new dialog..

Here you can add your security groups to your instance. Finally, once you finished editing, just save your changes.

How can I add my SSH Key to a Virtual Machine?

The first time you create a virtual machine you are able to add one or more SSH Public Keys (also known as Key Pairs) to your instance. After creation it’s currently not possible to add another key to your instances, so be aware of that.

New keys can be added/created in the Compute/Keypairs tab.

Where do I get the product information about the GUI?

You will find a detailed user manual at the Horizon Docs.

How do I upload and manage images?

  1. Log in to the dashboard.
  2. Then select the appropriate project from the drop down menu at the top left.
  3. On the Project tab, open the Compute tab and click Images category.
  4. Finally click Create Image.

The Create An Image dialog box appears.

For further information about how you manage your images see the OpenStack Docs.

 

How can I use Red Hat Enterprise Linux Images?

It is not possible to provide you with Red Hat Enterprise Linux (RHEL) images. Consequently you can upload them yourself. See “How to upload and manage images”. In order to obtain the images you need a Red Hat account.