Book Eucalyptus Beginners Guide2
Book Eucalyptus Beginners Guide2
Book Eucalyptus Beginners Guide2
• You can now remove the password of the “eucalyptus” account on the
Node:
2.3 Client1
The purpose of Client1 machine is to interact with the cloud setup, for
bundling and registering new Eucalyptus Machine Images (EMI)
2.3.1 Installation
• Boot the Desktop off the Ubuntu Desktop 10.04 CD and install. The
Desktop will be on the enterprise network and will obtain an IP ad-
dress through DHCP.
• Install KVM to help us install images on KVM platform and bundle
them:
$ cd .euca
$ unzip mycreds.zip
$ . ˜/.euca/eucarc
$ euca−describe−availability−zones verbose
$ euca−describe−availability−zones verbose
AVAILABILITYZONE myueccluster 192.168.10.121
AVAILABILITYZONE |− vm types free / max cpu ram disk
AVAILABILITYZONE |− m1.small 0016 / 0016 1 128 2
AVAILABILITYZONE |− c1.medium 0014 / 0014 1 256 5
AVAILABILITYZONE |− m1.large 0007 / 0007 2 512 10
AVAILABILITYZONE |− m1.xlarge 0003 / 0003 2 1024 20
AVAILABILITYZONE |− c1.xlarge 0001 / 0001 4 2048 20
• If you see the free/max VCPUs as 0 in the above list, it means the
node did not get registered automatically. Please use the following
on Server1 and approve when prompted to add 192.168.20.2 as the
Node Controller:
Web interface
https://192.168.10.121:8443/
You have already finished setting up the password for the admin user of
the web interface while working on Desktop1 in the chapter “Installation
& Configuration”.
A user trying to access the interface for the first time, will need to sign up
and would be able to use the interface after the account is approved by the
administrator. The approval of the account by the administrator results in
an email to the user.
1. Credentials
2. Images
3. Store
4. Users
5. Configuration
Web interface 15
6. Services
7. Extras
3.2 Credentials
You can change your account password, download the credentials (to be
used while bringing up instances etc.) and view the query interface creden-
tials (to be used with tools like euca2ools to query CC for information like
getting the list of images, instances etc.) here. Later chapters have more
detailed discussion about use of these credentials.
3.3 Images
You can see here a list of images that have been uploaded to the CLC. Each
entry contains information about the image such as its ID, meta information
like the Ids of associated kernel and ramdisk images etc. This information
comes in handy when you try to bring up instances using these images.
This is mostly a read-only listing, except that you can disable/enable each
of the images.
3.4 Store
The store tab lists new images available on the UEC image store of Canon-
ical. These are provided by Canonical and third-party providers such as
M/Gateway. You can install any of these images. Installation here refers
to the task of downloading and making it available for use on the local in-
stallation of UEC. After installation, the image should now show up under
the Images tab along with its kernel and ramdisk images.
3.5 Users
As an administrator, you can create as well as view and manage user ac-
counts here including enabling/disabling accounts and changing the pass-
words.
3.6 Configuration
You can view and manage information related to various components of
your UEC setup, such as CLC, CC, Walrus etc. You can also specify the
resource limits for different VM types such as m1.small, c1.medium etc.
More on this the chapter on “Instance management”
3.7 Services
A few pieces of commercial information about services from Canonical and
their partners for UEC.
3.8 Extras
You can find a list of Eucalyptus-certified Images and Eucalyptus-
compatible Tools like euca2ools.
Image management
Each of these images has its own ID that can be used while running the
instances. More on this in the chapter on “Managing Instances”
From the web interface of Eucalyptus, you can view a list of EMIs in the
“Store” tab of the web UI. These are the EMIs listed from Canonical or
partners. You can choose to download and install any of these images
directly from Canonical’s site.
Since most enterprise/individual users of Eucalyptus have a need for bring-
ing up instances based on custom images, image management plays a key
18 Image management
Bundling process differs between Linux and Windows images and we will
discuss the process in both cases in some detail below.
4.2.2 OS Installation
Download the iso file of the Linux distribution you want installed in the
image. The example below refers to creating a Jaunty Jackalope 64-bit
server image:
uecadmin@client1:˜$ wget
http://releases.ubuntu.com/karmic/ubuntu−9.04−server−amd64.iso
If your installation process requires more than 256MB of RAM change the
-m option, and if you need more processors available, you can use the “-c”
option.
The command above will boot a new KVM instance, with the disk image
you’ve created as the primary HDD and the iso as the first bootable device.
Also the “-nographic” option will not display any graphical output. You
can connect to the instance through VNC (use display number :0) and finish
the installation. For example:
At this point you can add all the packages you want to have installed,
update the installation, add users and any settings that need to be present
in your new UEC instances.
is assumed that the instance will use the above metadata service to retrieve
the public keys when running in these modes. You will need to facilitate
this by installing curl and adding a script that will run on each boot.
Install curl on the VM:
depmod −a
modprobe acpiphp
# simple attempt to get the user ssh key using the meta−data service
# assuming ?user? is the username of an account that has been created
mkdir −p /home/user/.ssh
echo >> /home/user/.ssh/authorized_keys
curl −m 10 −s
http://169.254.169.254/latest/meta−data/public−keys/0/openssh−key |
grep 'ssh−rsa' >> \
/home/user/.ssh/authorized_keys
echo ”AUTHORIZED_KEYS:”
echo ”∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗”
cat /home/user/.ssh/authorized_keys
echo ”∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗”