0% found this document useful (0 votes)
116 views3 pages

Getting Started Using Eucalyptus 2.0: 1. Install Command-Line Tools

This document provides instructions for getting started using Eucalyptus 2.0, an open-source cloud computing platform. It outlines the key steps: 1) installing command line tools, 2) signing up for an account, 3) obtaining credentials to generate certificates, and 4) using Euca2ools commands to query the system, create keypairs, run VM instances, authorize security groups, allocate IPs, and log into instances. The goal is to familiarize users with frequently used commands to upload, run, and manage VMs on a Eucalyptus cloud.

Uploaded by

MANOJECE54
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views3 pages

Getting Started Using Eucalyptus 2.0: 1. Install Command-Line Tools

This document provides instructions for getting started using Eucalyptus 2.0, an open-source cloud computing platform. It outlines the key steps: 1) installing command line tools, 2) signing up for an account, 3) obtaining credentials to generate certificates, and 4) using Euca2ools commands to query the system, create keypairs, run VM instances, authorize security groups, allocate IPs, and log into instances. The goal is to familiarize users with frequently used commands to upload, run, and manage VMs on a Eucalyptus cloud.

Uploaded by

MANOJECE54
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Download Eucalyptus | Contact Us

LEARN

TEST DRIVE

DOWNLOAD

READ

PARTICIPATE

CONTACT

search....

Table of Contents
Introducing Eucalyptus 2.0 Eucalyptus Administrator's Guide (2.0) Eucalyptus User's Guide (2.0) Getting Started Using Eucalyptus 2.0 Euca2ools User Guide Interacting with Walrus (2.0) Interacting with Block Storage (2.0) Image Creator's Guide Known Issues Changelog

Getting Started Using Eucalyptus 2.0


These instructions walk you through the essential steps for using a Eucalyptus cloud. Those who have worked with Amazon's EC2 system will find most of these instructions familiar (in fact, you may continue using Amazon's command-line tools with Eucalyptus).

manojece54
Messages My account Create content Recent posts Log out

1. Install command-line tools


The instructions below rely on the euca2ools command-line tools distributed by the Eucalyptus Team. Please, install them if you haven't done so already.

2. Sign up
If you are using the Eucalyptus Community Cloud, use https://ecc.eucalyptus.com instead of your.cloud.server.

Subscribe
Subscribe
Subscribe to this page To Wiki Entry content To Wiki Entry content by steven.roback
The master checkboxes on the left turn the given subscription on or off. Depending on the setup of the site, you may have additional options for active subscriptions.

Load in your browser the Web page of the Eucalyptus cloud installation that you would like to use. Ask your system administrator for the URL if you don't know it. (The URL will be of the form https://your.cloud.server:8443/, where your.cloud.server is likely to be the frontend of the cluster.)

Save

Click the "Apply" link and fill out the form presented to you. You may not be able to use the system until the (human) administrator receives the notification of your application and approves it. The more information you supply the easier it may be for the administrator to make the decision.

Load the confirmation URL that you receive in the approval email message from the cloud administrator. Log in to the system with the login and password that you chose when filling out the application form.

3. Obtain Credentials
Once you have logged in, you will see the 'Generate Certificate' button under the 'Credentials' tab. Generating a certificate for your account is necessary before you can use Amazon's EC2 command-line tools for querying and controlling Eucalyptus instances. Currently, the Web interface to Eucalyptus is limited and, hence, the use of command-line tools is practically inevitable.

Click the button to generate the certificate and save it. You can keep these keys in a secure place on any host. The following command-line instructions apply to any Unixflavored machine with bash (not necessarily the cluster where Eucalyptus was installed). (See Amazon's Getting Started Guide for the similar instructions to use under Windows.) Unzip the keys using the following command and protect them from exposure. The zip-file contains two files with the .pem extension; these are your public and private keys. mkdir ~/.euca cd ~/.euca unzip name-of-the-key-zip.zip chmod 0700 ~/.euca chmod 0600 ~/.euca/* Finally, ensure that the environment variables necessary for euca2tools to work are set by sourcing the eucarc file: . ~/.euca/eucarc

4. Euca2ools Quick Start


You are now ready to begin uploading and running VM instances in your Eucalyptus cloud. This section provides a quickstart guide to help familiarize you with frequently used Euca2ools (Eucalyptus' EC2-compatible command line tools) commands. We begin by introducing Euca2ools query commands that enable you to view information about the status of resources, images, and instances. Next, we show you how to create "keypairs" that are used to authenticate user identity. Finally, we show you how to run (instantiate), log into, and terminate VM instances.

4.1 Querying the System


The following Euca2ools commands let you query the system to view information about uploaded images, running instances, available clusters (zones), and uploaded keypairs: euca-describe-images euca-describe-instances euca-describe-availability-zones euca-describe-keypairs

4.2 Creating Keypairs


Keypairs are used in Eucalyptus to authenticate a user's identity. Before running a VM instance, you must first create a keypair as follows: euca-add-keypair mykey | tee mykey.private A pair of keys are created; one public key, stored in Eucalyptus, and one private key stored in the file mykey.private and printed to standard output. The ssh client requires strict

permissions on private keys: chmod 0600 mykey.private

4.3 Running a VM Instance


You can now run instances that are accessible with the newly generated private key: euca-run-instances -k mykey -n <number of instances to start> <emi-id> euca-describe-instances

4.4 Authorizing Security Groups and Allocating IPs


If your administrator has configured Eucalyptus to provide security groups and elastic IPs, you may be required to allow logins to your instance, allocate a public IP (if you have not done so before, check 'euca-describe-addresses' as a reminder), and assign it to your running instance: Allow 'ssh' connections from the Internet: euca-authorize -P tcp -p 22 -s 0.0.0.0/0 default Allocate a public IP if you have not done so already: euca-allocate-address Associate an allocated IP with your running instance: euca-associate-address <IP from allocate> -i <instance ID> Once the instance is shown as 'Running', it will also show two IP addresses assigned to it.

4.5 Logging into a VM Instance


You can now log into it with the SSH key that you created: ssh -i mykey.private root@<accessible-instance-ip> To terminate instances, use: euca-terminate-instances <instance-id1> <instance-id2> ... <instance-idn

For more information on Euca2ools, see our Euca2ools User Guide. For more information on EC2 command line tools, see the EC2 Getting Started Guide. Please note that depending on the networking mode used to implement your Eucalyptus cloud, some command line tools may not be applicable (security groups/elastic IPs, etc.). For more information, consult your administrator or see Eucalyptus Network Configuration (2.0). Eucalyptus User's Guide (2.0) Printer-friendly version UP Euca2ools User Guide

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy