Acronis Cyber Infrastructure 3.
Copyright Statement Copyright ©Acronis International GmbH, 2002-2019. All rights reserved. ”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH. ”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Instant Restore”, and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
Contents 1. About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Logging in to the Self-Service Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3. Managing Users and Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1 Creating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.
.7 Managing SSH Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CHAPTER 1 About This Guide This guide is intended for domain administrators and project members and explains how to manage project users and compute resources using the self-service panel.
CHAPTER 2 Logging in to the Self-Service Panel To log in to the self-service panel, do the following: 1. Visit the panel’s IP address on port 8800. 2. Enter your domain name (case sensitive) as well as user name and password. Alternatively, if you are given the link to the self-service panel for a specific domain, you will only need to provide the user name and password.
CHAPTER 3 Managing Users and Projects A user can be assigned one of the following roles: • A domain administrator can manage virtual objects in all projects within the assigned domain as well as project and user assignment in the self-service panel. • A project member acts as a project administrator in a specific domain in the self-service panel. A project member can be assigned to different projects and can manage virtual objects in them. You can create, view, and edit users on the All users tab.
Chapter 3. Managing Users and Projects 5. Click Create. 3.2 Assigning Users to Projects Domain administrators can manage project members’ assignment on the All projects and All users screens. To assign a user to a project, do one of the following: • On the All projects screen: 1. Click the project to which you want to assign users (not the project name). 2. On the project panel, click Assign members. 3. In the Assign members window, choose one or multiple users to assign to the project.
Chapter 3. Managing Users and Projects • On the All users screen: 1. Click the user account with the Project member role whom you want to assign to the project. 2. On the user panel, click Assign to project. 3. On the Assign user to projects window, select one or multiple projects and click Assign. To unassign a user from a project, do one of the following: • On the All projects screen: 1. Click the project to unassign users from. 2. On the project panel, open the Members tab.
Chapter 3. Managing Users and Projects 3. Click the cross icon next to a user you want to unassign. • On the All users tab: 1. Click the user to unassign from the project. 2. On the user panel, open the Projects tab. 3. Click the cross icon next to the project from which you want to unassign the user.
Chapter 3. Managing Users and Projects 3.3 Viewing Project Quotas Each project is allocated a certain amount of compute resources by means of quotas. To view quotas of a project, open PROJECTS, click the desired project in the list, and switch to the Quotas tab.
CHAPTER 4 Managing Compute Resources 4.1 Managing Virtual Machines Each virtual machine (VM) is an independent system with an independent set of virtual hardware. Its main features are the following: • A virtual machine resembles and works like a regular computer. It has its own virtual hardware. Software applications can run in virtual machines without any modifications or adjustment. • Virtual machine configuration can be changed easily, e.g., by adding new virtual disks or memory.
Chapter 4. Managing Compute Resources 4.1.1 Supported Guest Operating Systems The following guest operating systems have been tested and are supported in virtual machines: Table 4.1.1.
Chapter 4. Managing Compute Resources • a boot volume template, or • a boot volume Note: To obtain a boot volume, create a volume as described in Managing Volumes (page 21), attach it to a VM, install an operating system in it, then delete the VM. • One or more virtual networks (see Managing Private Virtual Networks (page 27)) • An SSH key (see Managing SSH Keys (page 37)) Note: You can specify an SSH key only when creating VMs from a template or boot volume.
Chapter 4. Managing Compute Resources 2. Specify a name for the new VM. 3. In Deploy from, choose Volume if you have a boot volume or want to create one. Otherwise, choose Image. 4. Depending on your choice, click the pencil icon in the Volumes or Image section and do one of the following: • In the Images window, select the ISO image or template and click Done.
Chapter 4. Managing Compute Resources • In the Volumes window, do one of the following: • If you have prepared a volume with an installed guest OS, click Attach, find and select the volume, and click Done. 5. Optionally, in the Volumes window, click Add or Attach to create or attach any other volumes you need. To select a volume as bootable, place it first in the list by clicking the up arrow button next to it. 6. In the Flavor window, choose a flavor and click Done.
Chapter 4. Managing Compute Resources 7. In the network window, click Add, select a virtual network interface and click Add. It will appear in the Network interfaces list. You can edit additional parameters of newly added network interfaces, like IP and MAC addresses and spoofing protection. To do this, click interface’s ellipsis icon, then Edit, and set parameters in the Edit network interface window.
Chapter 4. Managing Compute Resources You will not be able to edit these parameters later. Instead, you will be able to delete the old network interface and replace it with a new one. Click Done. 8.
Chapter 4. Managing Compute Resources • An SSH key to be injected into the VM. To do it, select an SSH key in the Select an SSH key window, and click Done. Note: To be able to connect to the VM via SSH, make sure the VM template or boot volume has cloud-init and OpenSSH installed (see the “Creating SSH-Enabled Templates” section in the Administrator’s Command Line Guide). • User data to customize the VM after launch.
Chapter 4. Managing Compute Resources Note: For the guest OS to be customizable, make sure the VM template or boot volume has cloud-init installed. 9. Back in the Create virtual machine window, click Deploy to create and boot the VM. 10. If you are deploying the VM from an ISO image (not a boot volume template or a volume with a pre-installed guest OS), select the VM, click Console, and install the guest OS using the built-in VNC console. 11.
Chapter 4. Managing Compute Resources • For Windows templates, enter the username that you specified during Cloudbase-Init installation. • For VMs customized with user data, enter the username specified in the script. For example: # ssh myuser@10.10.10.10 4.1.3 Virtual Machine Actions Overview After you create a virtual machine, you can manage it using the actions available for its current state. To see the full list of available actions, click the ellipsis button next to a VM or on top of its panel.
Chapter 4. Managing Compute Resources Examining console logs may be useful in troubleshooting failed virtual machines. • Reset state resets the VM stuck in a failed or transitional state to its last stable state: active, shut down or shelved. • Delete removes a VM from the compute cluster. 4.1.4 Enabling Logging inside Virtual Machines VM’s console log will contain log messages only if the TTY1 and TTYS0 logging levels are enabled inside the VM. For example, you can enable them as follows in Linux VMs: 1.
Chapter 4. Managing Compute Resources 3. Confirm the changes and restart the system. 4.1.5 Reconfiguring and Monitoring Virtual Machines To monitor virtual machine’s CPU, storage, and network usage, select the VM and open the Monitoring tab. To reconfigure a VM, select it and, on the Overview tab, click the pencil icon next to a parameter you need to change.
Chapter 4. Managing Compute Resources 3. Click Done to start uploading the image. Upload progress will be shown in the bottom right corner. To create a volume from an uploaded image, click the desired image then click Create volume. In the pop-up window that opens, specify volume name, size and choose a storage policy. Click Create.
Chapter 4. Managing Compute Resources To download or remove an image, click the ellipsis button next to it and click the desired action. For information on how to create Linux templates, see the “Creating Linux Templates” section of the Administrator’s Command Line Guide. 4.3 Managing Volumes A volume in Acronis Cyber Infrastructure is a virtual disk drive that can be attached to a VM. The integrity of data in volumes is protected by a redundancy mode specified in a storage policy.
Chapter 4. Managing Compute Resources 2. In the Create volume window, specify a volume name and size in gigabytes, select a storage policy, and click Add. To edit a volume, select it and click the pencil icon next to a parameter you need to change. Note the following restrictions: • You cannot shrink volumes. • To extend volumes that are in use, stop the VM first. • You cannot change the volume redundancy type. To remove a volume, click its ellipsis button then click Delete.
Chapter 4. Managing Compute Resources 3. In the Clone volume window that opens, specify a volume name, size, and storage policy. Click Clone.
Chapter 4. Managing Compute Resources 4.3.3 Attaching and Detaching Volumes To add a writable virtual disk drive to a VM, attach a volume to it. To do this: 1. On the Volumes screen, click the ellipsis button next to an unused volume and click Attach in the context menu. 2. In the Attach volume window, select the VM from the drop-down list and click Done. To detach a volume, do the following: 1. Click the ellipsis button next to the volume that is in use. 2. If the VM is not running, click Detach.
Chapter 4. Managing Compute Resources 3. In the Create image window, enter an image name and click Create. The new image will appear on the IMAGES tab. 4.3.5 Managing Volume Snapshots You can save the current state of a VM file system or user data by creating a snapshot of a volume. A snapshot of a boot volume may be useful, for example, before updating VM software. If anything goes wrong, you will be able to revert the VM to a working state at any time.
Chapter 4. Managing Compute Resources Note: To create a consistent snapshot of a running VM’s volume, make sure the guest tools are installed in the VM. QEMU guest agent included in the guest tools image automatically quiesces the filesystem during snapshotting. For the instructions on installing the guest tools, see the section “Installing Guest Tools” in the Administrator’s Command Line Guide. Once the snapshot is created, you can see and manage it on the Snapshots tab on the volume panel.
Chapter 4. Managing Compute Resources To see the full list of available actions, click the ellipsis button next to a snapshot. Actions include: • Create volume creates a new volume from the snapshot. • Create image creates a template image from the snapshot. • Revert to snapshot discards all changes that have been made to the volume since the snapshot was taken. This action is available only for VMs with the “Shut down” and “Shelved offloaded” statuses.
Chapter 4. Managing Compute Resources • Custom DNS servers. You can specify DNS servers that will be used by VMs. These servers will be delivered to virtual machines via the built-in DHCP server. With IP address management disabled: • VMs connected to a network will be able to obtain IP addresses from DHCP servers in that network. • Spoofing protection will be disabled for all VM network ports. Each VM network interface will accept all traffic, even frames addressed to other network interfaces.
Chapter 4. Managing Compute Resources 4. In the Summary section, review the configuration and click Create virtual network. To view and edit parameters of a virtual network, click it on the Networks screen. On the virtual network panel, you can change the virtual network name, gateway, DHCP settings, allocation pools, and DNS servers.
Chapter 4. Managing Compute Resources To do this, click the pencil icon, enter a new value, and click the check mark icon to confirm. To delete a virtual network, click the ellipsis icon next to it and Delete. To remove multiple virtual networks at once, select them and click Delete. Before deleting a virtual network, make sure no VMs are connected to it. 4.
Chapter 4. Managing Compute Resources the selected private networks by default. 4. Optionally, select or deselect the SNAT checkbox to enable or disable SNAT, respectively, on the external gateway of the router. With SNAT enabled, the router replaces VM private IP addresses with the public IP address of its external gateway. 4. Click Create. To edit a router name, click the ellipsis icon next to it and Rename. To remove a virtual router, click the ellipsis icon next to it and Delete.
Chapter 4. Managing Compute Resources 4.5.1 Managing Router Interfaces You can add an external router interface as follows: Note: To change an external gateway, remove the existing one first. 1. On Routers screen, click the router name to open the list of its interfaces. 2. Click Add. 3. In the Add interface window, do the following: 1. Choose External gateway. 2. From the Network drop-down menu, select a public network to connect to the router.
Chapter 4. Managing Compute Resources 4. Click Add. To edit the external gateway parameters, click the ellipsis icon next to it and Edit. In the Edit interface window, you can change the external gateway IP address and enable or disable SNAT on it. To save your changes, click Save. You can add an internal router interface as follows: 1. On Routers screen, click the router name to open the list of its interfaces. 2. Click Add. 3.
Chapter 4. Managing Compute Resources 4. Click Add. To remove a router interface, click the ellipsis icon next to it and Delete. To remove multiple interfaces at once, select them and click Delete. 4.5.2 Managing Static Routes You can also configure static routes of a router by manually adding entries into its routing table. This can be useful, for example, if you do not need a mutual connection between two private networks and want only one private network to be accessible from the other.
Chapter 4. Managing Compute Resources the IP address 10.94.129.74. To be able to access vm2 from vm1, you need to add a static route for router1, specifying the CIDR of private2, that is 192.168.30.0/24, as the destination subnet and the external gateway IP address of router2, that is 10.94.129.74, as the next hop IP address. In this case, when an IP packet for 192.168.30.10 reaches router1, it will be forwarded to router2 and then to vm2. To create a static route for a router, do the following: 1.
Chapter 4. Managing Compute Resources 4. Click Add. To edit a static route, click the ellipsis icon next to it and Edit. In the Edit static route window, change the desired parameters and click Save. To remove a static route, click the ellipsis icon next to it and Delete. To remove multiple routes at once, select them and click Delete. 4.
Chapter 4. Managing Compute Resources 3. Click Add. A floating IP address can be re-assigned to another virtual machine. Do the following: 1. Click the ellipsis icon next to the floating IP address and then click Unassign. 2. Once the VM name disappears in the Assigned to column, click the ellipsis icon again and choose Assign. 3. In the Assign floating IP address window, select a VM network interface with a fixed private IP address. 4. Click Assign.
Chapter 4. Managing Compute Resources Before using the SSH keys feature, make sure the following requirements are met: • The cloud-init utility is installed in a VM template or boot volume. • OpenSSH Server is installed in a Windows template or boot volume. For the instructions on preparing templates or boot volumes, see the “Creating SSH-Enabled Templates” section of the Administrator’s Command Line Guide. To add a public key, do the following: 1.
Chapter 4. Managing Compute Resources To delete one or more keys, select them and click Delete. Note: If a key has been injected into one or more VMs, it will remain inside those VMs even if you delete it from the admin panel.