The document describes setting up a two-node Oracle 12c RAC cluster on two Oracle Linux VMs hosted on Oracle VirtualBox. Key steps include:
1. Installing Oracle Linux on VirtualBox and preparing it for the Oracle installation. This includes installing VirtualBox additions, configuring storage and networks, and disabling unnecessary services.
2. Cloning the first node VM to create an identical second node and reconfiguring its storage, networking and hostname.
3. Configuring DNS and hosts files on both nodes to resolve virtual IPs, scan name, and establish connectivity.
4. Installing Oracle Grid Infrastructure for a cluster using the Oracle installer, configuring SCAN name, adding the second
CoreOS in anger : firing up wordpress across a 3 machine CoreOS cluster Shaun Domingo
In this talk at the Sydney CoreOS meetup, I took the audience through:
a) Installation of CoreOS using VirtualBox and Vagrant
b) Items to consider when containerising your platform
c) Deploying wordpress across a CoreOS cluster.
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski buildacloud
The document provides troubleshooting strategies for CloudStack installations, including network issues, security groups, host connectivity, virtual routers, templates, and log analysis. It discusses common problems such as VLAN misconfigurations, security group rules not being applied, hosts showing in the "avoid set", template preparation errors, and exceptions in the logs. It emphasizes analyzing logs at the management server, hypervisor, and job levels to find the root cause of failures.
This document provides an overview of troubleshooting CloudStack components including general troubleshooting techniques, secondary storage VMs, console proxy VMs, and virtual routers. It discusses examining log files, enabling debug logging, and using tools like MySQL Workbench. Examples are given for troubleshooting issues like insufficient capacity and calculating primary storage allocation. System VMs each have specific log files and services to check. The presentation aims to help support engineers effectively troubleshoot CloudStack environments.
The document discusses troubleshooting CloudStack. It covers troubleshooting for CloudStack developers and administrators. For developers, it discusses error codes, debugging tips, system virtual machine troubleshooting and port usage. For administrators, it discusses installation, configuration, log analysis, important parameters, best practices, reusing hypervisors and the CloudStack database. The document also provides references and information on getting involved in the CloudStack community.
Varnish is configured to improve site response time. The document provides instructions on setting up Varnish cache in front of a web server. It discusses requirements like routing all traffic through a firewall and caching content for 6 hours if the origin server is down. It also covers estimating cache size, installing Varnish and plugins to monitor performance, and ensuring Varnish automatically restarts.
Deploying VMware vCloud Hybrid Service with Puppet - PuppetConf 2013Puppet
The document discusses automating the deployment of a VMware vCloud Hybrid Service (vCHS) using Puppet. It describes using Puppet to deploy and configure the various vCHS components through their respective APIs, including vCenter, vShield, and vCloud Director. It addresses challenges in automating these components and proposes treating everything as a native Puppet resource, with a "transport" resource to handle connecting to the different component APIs over SSH or REST.
Introduction to Stacki at Atlanta Meetup February 2016StackIQ
An introduction to Stacki-the fastest bare metal Linux server provisioning tool from the Stacki Atlanta kickoff meetup on 2/23/16 at the Microsoft Innovation Center. Greg Bruno is the VP Engineering at StackIQ.
The document describes setting up a two-node Oracle 12c RAC cluster on two Oracle Linux VMs hosted on Oracle VirtualBox. Key steps include:
1. Installing Oracle Linux on VirtualBox and preparing it for the Oracle installation. This includes installing VirtualBox additions, configuring storage and networks, and disabling unnecessary services.
2. Cloning the first node VM to create an identical second node and reconfiguring its storage, networking and hostname.
3. Configuring DNS and hosts files on both nodes to resolve virtual IPs, scan name, and establish connectivity.
4. Installing Oracle Grid Infrastructure for a cluster using the Oracle installer, configuring SCAN name, adding the second
CoreOS in anger : firing up wordpress across a 3 machine CoreOS cluster Shaun Domingo
In this talk at the Sydney CoreOS meetup, I took the audience through:
a) Installation of CoreOS using VirtualBox and Vagrant
b) Items to consider when containerising your platform
c) Deploying wordpress across a CoreOS cluster.
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski buildacloud
The document provides troubleshooting strategies for CloudStack installations, including network issues, security groups, host connectivity, virtual routers, templates, and log analysis. It discusses common problems such as VLAN misconfigurations, security group rules not being applied, hosts showing in the "avoid set", template preparation errors, and exceptions in the logs. It emphasizes analyzing logs at the management server, hypervisor, and job levels to find the root cause of failures.
This document provides an overview of troubleshooting CloudStack components including general troubleshooting techniques, secondary storage VMs, console proxy VMs, and virtual routers. It discusses examining log files, enabling debug logging, and using tools like MySQL Workbench. Examples are given for troubleshooting issues like insufficient capacity and calculating primary storage allocation. System VMs each have specific log files and services to check. The presentation aims to help support engineers effectively troubleshoot CloudStack environments.
The document discusses troubleshooting CloudStack. It covers troubleshooting for CloudStack developers and administrators. For developers, it discusses error codes, debugging tips, system virtual machine troubleshooting and port usage. For administrators, it discusses installation, configuration, log analysis, important parameters, best practices, reusing hypervisors and the CloudStack database. The document also provides references and information on getting involved in the CloudStack community.
Varnish is configured to improve site response time. The document provides instructions on setting up Varnish cache in front of a web server. It discusses requirements like routing all traffic through a firewall and caching content for 6 hours if the origin server is down. It also covers estimating cache size, installing Varnish and plugins to monitor performance, and ensuring Varnish automatically restarts.
Deploying VMware vCloud Hybrid Service with Puppet - PuppetConf 2013Puppet
The document discusses automating the deployment of a VMware vCloud Hybrid Service (vCHS) using Puppet. It describes using Puppet to deploy and configure the various vCHS components through their respective APIs, including vCenter, vShield, and vCloud Director. It addresses challenges in automating these components and proposes treating everything as a native Puppet resource, with a "transport" resource to handle connecting to the different component APIs over SSH or REST.
Introduction to Stacki at Atlanta Meetup February 2016StackIQ
An introduction to Stacki-the fastest bare metal Linux server provisioning tool from the Stacki Atlanta kickoff meetup on 2/23/16 at the Microsoft Innovation Center. Greg Bruno is the VP Engineering at StackIQ.
This document is a log file from March 10, 2013 that details the startup process of the Algodoo v2.0.1 physics simulation software on Windows. It documents the creation of directories, loading of files and resources, initialization of subsystems and the graphical interface, and launching of the default "Quick tour" scene. The log shows the software attaching to the CPU, initializing OpenGL graphics capabilities, and completing the startup process in under 14 seconds to begin the main simulation loop.
Whats new in Cloudstack 4.11 - behind the headlinesShapeBlue
ShapeBlue is a company that specializes in deploying the Apache CloudStack cloud infrastructure software. The document discusses ShapeBlue and its VP of Technology, Paul Angus. It provides details on Paul's experience and areas of expertise, which include being a global authority on CloudStack and cloud infrastructure design. It also lists some of ShapeBlue's customers, which include large companies like Autodesk, SAP, and British Telecom.
Wicked is a network configuration infrastructure that incorporates existing frameworks into a unified architecture. It provides a DBUS interface for network configuration and aims to handle increasingly complex network configurations while conflicting as little as possible with existing infrastructure. Wicked supports functionality from openSUSE 12.2 and later, including configuring devices, addresses, bonding, bridging and more. It consists of the wickedd server, wicked client commands, and other components like dhcp and auto clients.
This document discusses managing OpenStack clouds beyond initial installation. It covers topics like:
- Using a development/test cluster to reproduce problems and test upgrades.
- Choosing a configuration management system like Chef or Puppet to manage the OpenStack deployment.
- Developing tools for troubleshooting, administration, monitoring, and specialized tasks.
- Examples of tools for troubleshooting different components like hypervisors, VMs, networking, and backing storage.
JavaOne 2014: Taming the Cloud Database with jcloudszshoylev
This document provides information and instructions for setting up a project using Apache jclouds to create a database in the cloud. It discusses initializing the necessary APIs from jclouds to interact with cloud database services, and provides code samples for creating a database user, database instance, and connecting to the database to test it. The document also discusses next steps like contributing to jclouds examples projects and documentation.
Automatic deployment on .NET web stack (Minsk .NET meetup 12.02.14)Is Antipov
This document discusses automatic deployment of .NET applications. It describes building and packaging code, using transformations to manage configurations for different environments, deploying via tools like Web Deploy, updating databases, and triggering the process from a continuous integration server. The goal is to automate deployment and eliminate errors from manual processes.
Cloud-init is a set of services that handles early initialization and configuration of virtual machines. It retrieves user-data and metadata from cloud providers to customize VMs during boot. Cloud-init runs in stages, starting with network setup and continuing through configuration and finalization. It supports various data sources like CloudStack and ConfigDrive and runs modules specified in /etc/cloud/cloud.cfg to perform tasks like package installation, user management, and more.
The document provides steps to install Microsoft SQL Server on Linux. It begins with downloading the repository configuration file and then running commands to install SQL Server. The SQL Server service is then started and its status is checked. Issues are encountered when trying to install the SQL Server tools due to conflicts with the unixODBC package. Workarounds are demonstrated to address the issue by removing unixODBC and importing an additional key.
Taming the Cloud Database with Apache jclouds, ApacheCon Europe 2014zshoylev
This document discusses setting up and using Apache jclouds, an open source multi-cloud library, to create and manage cloud databases. It provides code snippets for initializing the jclouds API, creating a database instance on a cloud provider like Rackspace, and polling the instance status until it is ready. The document also outlines the jclouds architecture and abstractions for cloud database services like Trove, and explains how to add support for new providers.
This document provides an overview of agile network deployment using automation tools. It discusses how traditional network deployment can take weeks but automation tools like Cumulus VX, Vagrant, and topology simulation can accelerate deployment to minutes. A reference topology is demonstrated that can be deployed on a server to build an entire virtual network for testing configurations and automation.
(SDD419) Amazon EC2 Networking Deep Dive and Best Practices | AWS re:Invent 2014Amazon Web Services
Amazon EC2 instances give customers a variety of high-bandwidth networking choices. In this session, we discuss how to choose among Amazon EC2 networking technologies and examine how to get the best performance out of Amazon EC2 enhanced networking and cluster networking. We also share best practices and useful tips for success.
IT Infrastructure Through The Public Network Challenges And SolutionsMartin Jackson
Identifying the challenges that companies face when they wish to adopt Infrastructure as a Service like those from Amazon and Rackspace and possible solutions to those problems. This presentation seeks to provide insight and possible solutions, covering the areas of security, availability, cloud standards, interoperability, vendor lock in and performance management.
The document summarizes an agenda for a Belgian Puppet Users Group meeting about MCollective. The agenda includes an overview of orchestration and MCollective, hands-on setup of MCollective, the MCollective command line tool, MCollective agents, and future plans. It also provides details about installing and configuring MCollective clients, servers, and the ActiveMQ middleware.
Varnish is a modern, open source HTTP accelerator that provides fast, efficient web caching. It is state-of-the-art, scales well in high traffic environments, and is used by many top websites. Varnish avoids expensive operations and has efficient object purging and eviction. It provides comprehensive logging, management, and real-time statistics collection.
This document proposes using RPM packages to deploy Java applications to Red Hat Linux systems in a more automated and standardized way. Currently, deployment is a manual multi-step process that is slow, error-prone, and requires detailed application knowledge. The proposal suggests using Maven and Jenkins to build Java applications into RPM packages. These packages can then be installed, upgraded, and rolled back easily using common Linux tools like YUM. This approach simplifies deployment, improves speed, enables easy auditing of versions, and allows for faster rollbacks compared to the current process.
Solaris Zones (native & lxbranded) ~ A techXpress GuideAbhishek Kumar
Solaris Zones (native & lxbranded) ~ A techXpress Guide ~ Creating & Managing Solaris Zones; Mirroring an existing Linux Setup to a Zone; Setting up SVN, CIFS over a Zone
This presentation compares CloudMASTER cloud computing certifications to other IT certifications and explains why CloudMASTER should be you next career step.
This document is a log file from March 10, 2013 that details the startup process of the Algodoo v2.0.1 physics simulation software on Windows. It documents the creation of directories, loading of files and resources, initialization of subsystems and the graphical interface, and launching of the default "Quick tour" scene. The log shows the software attaching to the CPU, initializing OpenGL graphics capabilities, and completing the startup process in under 14 seconds to begin the main simulation loop.
Whats new in Cloudstack 4.11 - behind the headlinesShapeBlue
ShapeBlue is a company that specializes in deploying the Apache CloudStack cloud infrastructure software. The document discusses ShapeBlue and its VP of Technology, Paul Angus. It provides details on Paul's experience and areas of expertise, which include being a global authority on CloudStack and cloud infrastructure design. It also lists some of ShapeBlue's customers, which include large companies like Autodesk, SAP, and British Telecom.
Wicked is a network configuration infrastructure that incorporates existing frameworks into a unified architecture. It provides a DBUS interface for network configuration and aims to handle increasingly complex network configurations while conflicting as little as possible with existing infrastructure. Wicked supports functionality from openSUSE 12.2 and later, including configuring devices, addresses, bonding, bridging and more. It consists of the wickedd server, wicked client commands, and other components like dhcp and auto clients.
This document discusses managing OpenStack clouds beyond initial installation. It covers topics like:
- Using a development/test cluster to reproduce problems and test upgrades.
- Choosing a configuration management system like Chef or Puppet to manage the OpenStack deployment.
- Developing tools for troubleshooting, administration, monitoring, and specialized tasks.
- Examples of tools for troubleshooting different components like hypervisors, VMs, networking, and backing storage.
JavaOne 2014: Taming the Cloud Database with jcloudszshoylev
This document provides information and instructions for setting up a project using Apache jclouds to create a database in the cloud. It discusses initializing the necessary APIs from jclouds to interact with cloud database services, and provides code samples for creating a database user, database instance, and connecting to the database to test it. The document also discusses next steps like contributing to jclouds examples projects and documentation.
Automatic deployment on .NET web stack (Minsk .NET meetup 12.02.14)Is Antipov
This document discusses automatic deployment of .NET applications. It describes building and packaging code, using transformations to manage configurations for different environments, deploying via tools like Web Deploy, updating databases, and triggering the process from a continuous integration server. The goal is to automate deployment and eliminate errors from manual processes.
Cloud-init is a set of services that handles early initialization and configuration of virtual machines. It retrieves user-data and metadata from cloud providers to customize VMs during boot. Cloud-init runs in stages, starting with network setup and continuing through configuration and finalization. It supports various data sources like CloudStack and ConfigDrive and runs modules specified in /etc/cloud/cloud.cfg to perform tasks like package installation, user management, and more.
The document provides steps to install Microsoft SQL Server on Linux. It begins with downloading the repository configuration file and then running commands to install SQL Server. The SQL Server service is then started and its status is checked. Issues are encountered when trying to install the SQL Server tools due to conflicts with the unixODBC package. Workarounds are demonstrated to address the issue by removing unixODBC and importing an additional key.
Taming the Cloud Database with Apache jclouds, ApacheCon Europe 2014zshoylev
This document discusses setting up and using Apache jclouds, an open source multi-cloud library, to create and manage cloud databases. It provides code snippets for initializing the jclouds API, creating a database instance on a cloud provider like Rackspace, and polling the instance status until it is ready. The document also outlines the jclouds architecture and abstractions for cloud database services like Trove, and explains how to add support for new providers.
This document provides an overview of agile network deployment using automation tools. It discusses how traditional network deployment can take weeks but automation tools like Cumulus VX, Vagrant, and topology simulation can accelerate deployment to minutes. A reference topology is demonstrated that can be deployed on a server to build an entire virtual network for testing configurations and automation.
(SDD419) Amazon EC2 Networking Deep Dive and Best Practices | AWS re:Invent 2014Amazon Web Services
Amazon EC2 instances give customers a variety of high-bandwidth networking choices. In this session, we discuss how to choose among Amazon EC2 networking technologies and examine how to get the best performance out of Amazon EC2 enhanced networking and cluster networking. We also share best practices and useful tips for success.
IT Infrastructure Through The Public Network Challenges And SolutionsMartin Jackson
Identifying the challenges that companies face when they wish to adopt Infrastructure as a Service like those from Amazon and Rackspace and possible solutions to those problems. This presentation seeks to provide insight and possible solutions, covering the areas of security, availability, cloud standards, interoperability, vendor lock in and performance management.
The document summarizes an agenda for a Belgian Puppet Users Group meeting about MCollective. The agenda includes an overview of orchestration and MCollective, hands-on setup of MCollective, the MCollective command line tool, MCollective agents, and future plans. It also provides details about installing and configuring MCollective clients, servers, and the ActiveMQ middleware.
Varnish is a modern, open source HTTP accelerator that provides fast, efficient web caching. It is state-of-the-art, scales well in high traffic environments, and is used by many top websites. Varnish avoids expensive operations and has efficient object purging and eviction. It provides comprehensive logging, management, and real-time statistics collection.
This document proposes using RPM packages to deploy Java applications to Red Hat Linux systems in a more automated and standardized way. Currently, deployment is a manual multi-step process that is slow, error-prone, and requires detailed application knowledge. The proposal suggests using Maven and Jenkins to build Java applications into RPM packages. These packages can then be installed, upgraded, and rolled back easily using common Linux tools like YUM. This approach simplifies deployment, improves speed, enables easy auditing of versions, and allows for faster rollbacks compared to the current process.
Solaris Zones (native & lxbranded) ~ A techXpress GuideAbhishek Kumar
Solaris Zones (native & lxbranded) ~ A techXpress Guide ~ Creating & Managing Solaris Zones; Mirroring an existing Linux Setup to a Zone; Setting up SVN, CIFS over a Zone
This presentation compares CloudMASTER cloud computing certifications to other IT certifications and explains why CloudMASTER should be you next career step.
Data insight summit 2016 excel and power bi better togetherAviv Ezrachi
In the 2016 Data insight summit we announced 2 new features getting Power BI and Excel closer together, Analyze in Excel and the Power BI publisher add-in for Excel. Now you can upload your data to the cloud and consume it with either Power BI cloud based interactive reports or Excel desktop Pivot Tables
(2286) World Orphan Drug Congress USA 2016 A4 32 Page Brochure 1.5 SCREEN SPREADPinky Fadullon
This document provides information about the 6th Annual Global Orphan Drug Conference and Expo taking place April 21-22, 2016 in Washington D.C. The conference will bring together stakeholders in the orphan drug industry including pharmaceutical companies, patient advocacy groups, regulators, payers, and investors. It will include keynote sessions, workshops on topics like market forecasting and commercialization, and networking opportunities. A pre-conference day of workshops is scheduled for April 20th.
Hércules era hijo del dios Zeus y de una mortal. Desde niño demostró su gran fuerza al matar serpientes enviadas para matarlo. Más adelante completó los Doce Trabajos impuestos por el rey Euristeo, incluyendo matar al León de Nemea y la Hidra de Lerna, y capturar al Toro de Creta y al perro guardián del infierno Cerbero.
Jorge Guillén fue un poeta español nacido en 1893. Publicó varias obras a lo largo de su vida, incluyendo Cántico en 1928, que amplió en varias ediciones. Ocupó cargos académicos en universidades de España, Francia y el Reino Unido. Tras la Guerra Civil estuvo preso y luego se exilió en Estados Unidos, donde enseñó en varias universidades hasta regresar a España en 1975. Recibió varios premios importantes como el Miguel de Cervantes.
The document discusses different forms of database normalization:
1) 1NF, 2NF, 3NF, BCNF normalize relations to eliminate certain types of functional dependencies that cause updating anomalies.
2) BCNF is a stronger version of 3NF where every determinant must be a candidate key.
3) 4NF eliminates multi-valued dependencies by separating relations with more than one multi-valued attribute.
5NF breaks relations into the smallest possible tables to avoid data redundancy.
JupyterHub - A "Thing Explainer" OverviewCarol Willing
JupyterHub allows each user in a group to have their own Jupyter notebook server. It has three main parts: the hub, which manages authentication and spawns single-user notebook servers; a user database to store user information; and an authenticator to verify users' identities. When a user logs in, the hub's spawner creates a dedicated notebook server for that user. JupyterHub is useful for shared computing resources like classrooms, workshops, or research groups.
Lipids are water-insoluble organic compounds that include fats, oils, steroids, and waxes. They provide energy, carry fat-soluble vitamins, act as electrical and thermal insulators, and are components of cell membranes. Lipids are classified as simple, complex, or derived. Dietary lipids like triglycerides and phospholipids must be hydrolyzed by lingual, gastric, and pancreatic lipases into fatty acids and monoacylglycerols before intestinal absorption. Bile salts emulsify the products of digestion into micelles to facilitate uptake by intestinal cells. Absorbed lipids are packaged into chylomicrons and enter the lymphatic system and blood.
El mito narra que Agamenón prometió sacrificar a su hija Ifigenia a la diosa Artemis para calmar su ira y permitir que la flota griega zarpara hacia Troya. Ifigenia fue llevada al altar, pero Artemis tuvo piedad de ella en el último momento y la sustituyó por una cierva. Ifigenia fue trasladada a otra tierra lejos de su familia.
This document provides a summary and translation of a Bulgarian short story titled "Baked Pumpkin" by Elin Pelin. It discusses the story's plot, which is about a man named Dushko who is embarrassed by his rural origins. When his boss mentions that people from villages like baked pumpkins, Dushko refuses one to pretend he is not from a village. However, he dreams of baked pumpkins chasing him. The document then provides an analysis of nouns in the story and explanations of Bulgarian grammar concepts like definite articles, gender and number.
The document discusses deploying Hadoop in the cloud. Some key benefits of using Hadoop in the cloud include scalability, automated failover of replicated data, and cost efficiency through distributed processing and storage. Microsoft's Azure HDInsight offering provides a fully managed Hadoop and Spark service in the cloud that allows clusters to be provisioned in minutes and is optimized for analytics workloads. The Cortana Intelligence Suite integrates big data technologies like HDInsight with machine learning and data processing tools.
Verizon's Beth Cohen explains the process of creating the OpenStack Architecture Guide, as delivered to the Boston OpenStack Meetup September 10, 2014.
Peraturan ini mengatur tentang pedoman pelaksanaan musyawarah desa untuk menentukan hal-hal strategis seperti penataan desa, rencana investasi, dan kejadian luar biasa. Musyawarah desa diselenggarakan oleh Badan Permusyawaratan Desa secara partisipatif, demokratis, dan transparan dengan melibatkan unsur masyarakat. Keputusan ditetapkan melalui mufakat atau voting dan dituangkan dalam berita acara s
Couch to OpenStack: Neutron (Quantum) - August 13, 2013 Featuring Sean WinnTrevor Roberts Jr.
Tuesday, August 13th session of the vBrownBag OpenStack Sack Lunch Series: Couch to OpenStack. With Sean Winn's help, we cover Neutron, the OpenStack Networking Service formerly known as Quantum. Neutron configures network access and services for your OpenStack instances. Credit to Ken Pepple for the OpenStack Project Diagram, and to Dan Wendlandt and the VMware Team for the workflow used in the lab
Weird things we've seen with OpenStack NeutronNick Jones
A presentation given at the Manchester OpenStack Meetup, talking through some of the odd things we've hit up against in our time as a public OpenStack operator using Neuton with OpenvSwitch.
Tuesday, July 30th session of the vBrownBag OpenStack Sack Lunch Series: Couch to OpenStack. We cover Nova, the Compute Service that deploys and runs VMs.
This document provides an overview of SmartOS, an open source operating system designed for cloud computing. It discusses getting started with SmartOS through USB or PXE boot, managing disks and storage with ZFS, working with virtual machine images and creating VMs using imgadm and vmadm, and configuring networks with dladm including link aggregation. The document is intended as a primer on SmartOS and covers the basic administration tasks for getting up and running with the platform.
Kumira.io a Dhaka, Bangladesh based cloud infrastructure startup provided knowledge transfer and handover session today for DevOps and System Engineers at CoKreates Limited office. Kumira.io recently architected, installed, and configured OpenStack cloud operating system in National Data Center of Bangladesh Computer Council (BCC) for Bangladesh e-Government ERP Project (GRP).
This document provides instructions for setting up a TrinityCore private server on Linux. It discusses downloading and compiling TrinityCore source code, configuring the required MySQL databases, and basic server configuration. Key steps include installing prerequisites like build tools and libraries, cloning the TrinityCore source repository, running cmake to configure the build, importing SQL files to set up the auth, characters, and world databases, and editing the realmlist table to point clients to the server.
What will we cover: Hypervisor choices; KVM background; Installation and configuration – high level covering what you already find in the installation guides; Dive a bit deeper into networking – since this is where we see people sometimes getting stuck; Cover storage options and the need for clustered file systems; Management and troubleshooting.
In this presentation, I am going to briefly talk about 'what cloud is' and highlight the various types of cloud (IaaS, PaaS, SaaS). The bulk of the talk will be about using the fog gem using IaaS. I will discuss fog concepts (collections, models, requests, services, providers) and supporting these with actual examples using fog
This workshop was given in Vancouver B.C. in May 2015 at the OpenStack Summit
In this interactive workshop, the Designate team will walk attendees through the installation and configuration of Designate on a virtual machine. Attendees will leave with an understanding of the various components of Designate, including the new services such as the MiniDNS and Pool Manager, and with a working single-VM install on their laptops.
Attendees will learn:
Designate Architecture 101
How to Install and Configure Designate
How to perform day to day Designate operations tasks
End user usage of the API, CLI and Horizon UI
Tips and Tricks for using Designate
Contributing to Designate 101
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Yury Velikanov
The document provides instructions for setting up a two-node Oracle 12c RAC environment within Oracle VirtualBox on a Windows laptop. The main steps include:
1. Configuring VirtualBox with a host-only network and installing Oracle Linux 6 on the first virtual machine.
2. Creating shared virtual disks for the ASM storage and installing Oracle Grid Infrastructure.
3. Cloning the first virtual machine to create the second node, and installing the Oracle 12c database software.
This allows users to test an Oracle 12c RAC sandbox environment locally without requiring additional physical hardware.
1. The document discusses OpenStack networking-sfc and flow analysis. It provides details on setting up an OpenStack environment with networking-sfc, including creating ports, virtual networks, and VMs for a service function chaining scenario. 2. Flow analysis is shown for the br-int and br-tun bridges, including resubmitting packets between tables based on port numbers or MAC address. 3. Key steps shown include installing networking-sfc, creating a virtual router, generating ports for each VM, and booting VMs with dual interfaces for the service function VMs.
NanoQplus Installation Guide - for WindowsJongsoo Jeong
This document provides instructions for installing NanoQplus2 and running a test application on sensor nodes. It describes downloading the necessary software, installing compilers like WinAVR and Cygwin, connecting sensor nodes, and configuring applications. The test application prints messages over the UART and its successful output is shown. The summary focuses on the high-level steps while keeping within the 3 sentence limit.
Varnish is an HTTP accelerator that acts as a reverse proxy and cache. It is very fast due to being open source and outsourcing tasks to kernel functions. It relies on a massively multithreaded architecture that is partly event driven. It maps the cache store into memory using mmap and writes directly from mapped memory for maximum performance. Logging includes all request headers. Wikia uses Varnish across 4 datacenters with rapid cache invalidations and a RabbitMQ queue to handle invalidations. SSDs and tuning help optimize performance.
Overview of Docker 1.11 features(Covers Docker release summary till 1.11, runc/containerd, dns load balancing ipv6 service discovery, labels, macvlan/ipvlan)
Compute 101 - OpenStack Summit Vancouver 2015Stephen Gordon
OpenStack Compute (Nova), has been a core component of OpenStack since the original Austin release in 2010. In the intervening years development has proceeded at a rapid pace adding support for new virtualization technologies and exposing additional features. Learn how Compute fits into the OpenStack architecture, and how it interacts with other OpenStack components and the hypervisors it manages.
Cumulus Linux supports great networking, what’s next? Matt Peterson (@dorkmatt) our resident expert from the office of the CTO shares his previous experience, his views on devops, and how Cumulus Networks makes it easier to manage networks with ONIE, ZTP and no CLI! “Devops is a lifestyle, shared responsibility”. With Linux as the networks OS, “it’s all just one apt-get away!”
Palestra realizada por Toronto Garcez aka torontux durante a 3a. edição da Nullbyte Security Conference em 26 de novembro de 2016.
Resumo:
O objetivo da apresentação é demonstrar de forma prática, o passo-a-passo para criar uma botnet com roteadores wi-fi e/ou embarcados em geral. Será demonstrado o desenvolvimento de um comando e controle e a utilização de firmwares "backdorados" para tornar dispositivos em bots.
This document outlines steps to build a cloud in 4 hours using Apache CloudStack and Citrix XenServer. It discusses installing Oracle VirtualBox, Citrix XenServer, CentOS, CloudStack, and configuring MySQL, NFS, firewall rules. Key steps include downloading templates, seeding the SystemVM template, configuring zones/pods/clusters/hosts, and creating VMs to test the cloud infrastructure. Resources for further exploration are provided.
Installing oracle grid infrastructure and database 12c r1Voeurng Sovann
This document provides instructions for installing Oracle Grid Infrastructure and Oracle Database 12c R1 on a standalone Linux server. It describes how to:
1. Configure the server with required packages, users, groups, and directories for the Oracle software.
2. Install Oracle Grid Infrastructure 12c R1 using the Oracle Universal Installer and configure an ASM disk group and instance.
3. Install Oracle Database 12c R1 software, and use DBCA to create a database called "asmdb" that uses the ASM disk groups for storage and is accessible by the listener called "LISTENER_ASM".
The document discusses QEMU and adding a new device to it. It begins with an introduction to QEMU and its uses. It then discusses setting up a development environment, compiling QEMU, and examples of existing devices. The main part explains how to add a new "Devix" device by creating source files, registering the device type, initializing PCI configuration, and registering memory regions. It demonstrates basic functionality like interrupts and I/O access callbacks. The goal is to introduce developing new emulated devices for QEMU.
Similar to Manchester OpenStack Meetup: I have an OpenStack Cloud, now what? OpenStack 101 (20)
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Manchester OpenStack Meetup: I have an OpenStack Cloud, now what? OpenStack 101
1. You have an OpenStack cloud,
now what?
Manchester OpenStack Meetup
D a t e : 1 9 t h J a n u a r y 2 0 1 6
2. 2
/me
Kevin Jackson, age 37 ¾
I do OpenStack stuff at Rackspace
When not doing OpenStack stuff for
Rackspace, I spend my time in
airports
I accidentally wrote a few OpenStack
books
3. 3
How to use OpenStack:
Connec ting to your environment
U ploading images
C r eating netw or k s
Sec ur ity
Booting ins tanc es
Ac c es s ing ins tanc es
C r eating and attac hing volumes
Other s tuff
D r ink beer / eat piz z a / mak e c offee
12. 12
The clients
• python-novaclient, python-glanceclient, python-neutronclient etc = API v2.0
– Many clients doing a specific job
• python-openstackclient = API v3
– One client to rule them all
13. 13
The clients
• To use them, you set environment variables in your Unix/Linux shell, typically
storing them in a file for easy reference – e.g. “openrc”
• If using OSAD
– Shell onto a Controller
– lxc-ls
– lxc-attach blah-utility_container-blah
– source openrc
• You’d really copy/create and openrc local to you – but the above is damn good
starting point.
16. 16
Uploading Images
• Glance is the Image Service
– Catalog of images that can be used in your OpenStack cloud environment
• We can either
– Tell Glance: go look http://here for images on a web server
– Download images then upload them from a convenient location
– Upload (copy-from) a remote location
17. 17
Uploading Images
• Using a remotely located image
– Essentially Glance doesn’t store the image, it just points to where Nova should grab
it from
glance image-create
--name "cirros-image"
--disk-format qcow2
--container-format bare
--location http://download.cirros-cloud.net/0.3.4/cirros-
0.3.4-x86_64-disk.img
--is-public
18. 18
Uploading Images
• Copy from (Download from net / upload to Glance)
– Glance downloads and stores the image on the disks you’ve specified in the Glance
configs
glance image-create
--name "cirros-image"
--disk-format qcow2
--container-format bare
--copy-from http://download.cirros-cloud.net/0.3.4/cirros-
0.3.4-x86_64-disk.img
--is-public
19. 19
Uploading Images
• Local upload
– Glance stores the image on the disks you’ve specified in the Glance configs but you
have the image on your client ready for uploading
glance image-create
--name "cirros-image"
--disk-format qcow2
--container-format bare
--file ./cirros-0.3.4-x86_64-disk.img
--is-public
21. 21
Creating networks
• Neutron is pretty powerful. And dangerous. And fun. And dangerous.
• Create public provider networks (job of an Admin)
• Create private tenant networks (users / developers) - go knock yourself out
• Create routers (Admin or users)
• Networks can be flat, tunnel overlay (GRE and VXLAN) or VLAN
• Neutron is not magic. You still need to know what you’re doing.
22. 22
• Provider Network
• Routed network that typically has
a gateway of your firewall/router
– This will be the “Floating IP
Network” and is the network you’d
use to access the instances
• An L3 Router
• Private Tenant Network
• Typically an overlay, could be
VLAN
• Users don’t get to decide the type
• Admin users do get this choice
Creating networks
23. 23
Creating networks
• Let’s create the Provider network
– Remember – this is like a real network. Highly likely of type VLAN (it needs to talk to
something real, like a Firewall or a LB, depending on what’s doing the upstream
routing). That firewall or LB will be on the same VLAN and subnet.
– This is the Admin’s job and is typically created usually once
neutron net-create publicNet
--shared --provider:network_type vlan
--provider:physical_network vlan
--provider:segmentation_id 1333
--router:external
24. 24
Creating networks
Created a new network:
+---------------------------+--------------------------------------+
| Field | Value |
+---------------------------+--------------------------------------+
| admin_state_up | True |
| id | 1e36b6e1-f0ab-473f-acce-ac27e4d2cb77 |
| mtu | 0 |
| name | publicNet |
| provider:network_type | vlan |
| provider:physical_network | vlan |
| provider:segmentation_id | 1333 |
| router:external | True |
| shared | True |
| status | ACTIVE |
| subnets | |
| tenant_id | 45d6c98a4e914c31961572522345b619 |
+---------------------------+--------------------------------------+
25. 25
Creating networks
• Let’s create the Provider subnet
– We now have to lay down a subnet
neutron subnet-create publicNet 192.168.134.0/24
--name publicSubnet
--allocation-pool start=192.168.134.3,end=192.168.134.254
--gateway 192.168.134.1
--dns-nameserver 83.138.151.80 --dns-nameserver 83.138.151.81
27. 27
Creating networks
• Let’s add the router
– Allows us to join the dots between publicNet and internalNet
– Creates it in the tenant you live in
• As an administrator, you can create routers in other people’s tenants
neutron router-create myRouter
28. 28
Creating networks
Created a new router:
+-----------------------+--------------------------------------+
| Field | Value |
+-----------------------+--------------------------------------+
| admin_state_up | True |
| distributed | False |
| external_gateway_info | |
| ha | False |
| id | ad49f99a-6e5e-458b-8c42-add4571fbad4 |
| name | myRouter |
| routes | |
| status | ACTIVE |
| tenant_id | 45d6c98a4e914c31961572522345b619 |
+-----------------------+--------------------------------------+
29. 29
Creating networks
• Now add the northbound network of the router
– AKA, set the Gateway network
– In other words – the router goes: if I don’t have the local route info, send it
upstream.
– Remember:
• neutron net-create … --router:external
• neutron subnet-create … --gateway 192.168.134.1
neutron router-gateway-set myRouter 1e36b6e1-f0ab-473f-acce-
ac27e4d2cb77
30. 30
Creating networks
• Now let’s create a private network called internalNet
• User “shouldn’t care” what type it is – defined by the Administrator
neutron net-create internalNet
31. 31
Creating networks
Created a new network:
+---------------------------+--------------------------------------+
| Field | Value |
+---------------------------+--------------------------------------+
| admin_state_up | True |
| id | 1b61d50a-8830-44a6-a94d-d06aeb12031c |
| mtu | 0 |
| name | internalNet |
| provider:network_type | vxlan |
| provider:physical_network | |
| provider:segmentation_id | 37 |
| router:external | False |
| shared | False |
| status | ACTIVE |
| subnets | |
| tenant_id | 45d6c98a4e914c31961572522345b619 |
+---------------------------+--------------------------------------+
32. 32
Creating networks
• Now add the subnet
neutron subnet-create
--name internalSubnet internalNet 10.0.1.0/24
--dns-nameserver 83.138.151.80 --dns-nameserver 83.138.151.81
42. 42
Access + Security
• Create a new Security Group
• Add rules like SSH and ICMP to new Security Group
• When we boot, we specify this new Security Group
• Also worth noting, rules can be updated on the fly after an instance has booted.
43. 43
Access + Security
• Create a new Security Group
– There are two APIs: neutron or nova
– nova api interfaces to neutron, and syntax simpler
– neutron api more extensive, allows egress rules too
nova secgroup-create myRules "My OpenStack Rules”
44. 44
Access + Security
• Add rulez to the groupz
nova secgroup-add-rule myRules tcp 22 22 0.0.0.0/0
nova secgroup-add-rule myRules icmp -1 -1 0.0.0.0/0
46. 46
Access + Security
• Keys
– Used for SSH access to Linux instances
– (Optionally) Used for accessing generated password information for RDP access to
Windows machines
– Two choices
• Create a new key
• Import existing key
47. 47
Access + Security
• Creating a new key the OpenStack way
nova keypair-add myKey > myKey_rsa
# Download/keep the new private key safe somewhere
# Keep it RO for your user only
chmod 0600 myKey_rsa
48. 48
Access + Security
• Importing an existing public key
nova keypair-add --pub-key myKey.pub myKey
50. 50
Booting instances
• To boot an image we needed to
– Have some images
– Create our networks
– Have a appropriate security rules in place
51. 51
Booting instances
• Instances are booted with at least the following parameters
– Flavor type (m1.small, m1.large, something.yourdefined.flavor)
– Image (Ubuntu, Windows, etc)
– Security Group or Groups
– Key (optional for Windows)
– Network/Networks info (attach at least one nic)
– Name
52. 52
Booting instances
• Instances are booted with at least the following parameters
– Flavor type (m1.small, m1.large, something.yourdefined.flavor)
– Image (Ubuntu, Windows, etc)
– Security Group or Groups
– Key (optional for Windows)
– Network/Networks info (attach at least one nic)
– Name
53. 53
Booting instances
• Boot from command line
nova boot
--flavor m1.small
--image 0cbf2deb-f65f-4c19-bd53-8e590c3b76ab
--key_name kevinj
--security-groups myRules
--nic net-id=1b61d50a-8830-44a6-a94d-d06aeb12031c
kevinj1
54. 54
Listing running instances
• Listing instances
nova list
+--------------------------------------+---------+--------+------------+-------------+-----------------------+
| ID | Name | Status | Task State | Power State | Networks |+--------
------------------------------+---------+--------+------------+-------------+-----------------------+
| ec51a24e-8cf2-4f7d-90c3-9c8e68ee4c3a | kevinj1 | ACTIVE | - | Running | internalNet=10.0.1.10 |
+--------------------------------------+---------+--------+------------+-------------+-----------------------+
57. 57
Accessing instances behind L3 Router
• Disclaimer:
– You will typically set up the network in one of 3 ways
– Direct access to tenant networks
o tenant networks [private ones] touch something physical
– Physical router -> L3 Router -> tenant network
o Normal client networking, routed via something physical [e.g. firewall], routes to L3 Router
– Assign Floating IP [NAT to instance through L3 Router]
o Most expected “out of the box” experience
o Instance on private tenant network inaccessible directly, assign Floating IP to access
59. 59
Accessing instances behind L3 Router
• Assigning a Floating IP
– The nova way!
– First create a Floating IP
• Pops the IP address off the publicNet network and marks it as available
nova floating-ip-create publicNet
+----------------+-----------+----------+-----------+
| Ip | Server Id | Fixed Ip | Pool |
+----------------+-----------+----------+-----------+
| 192.168.134.12 | | - | publicNet |
+----------------+-----------+----------+-----------+
60. 60
Accessing instances behind L3 Router
• Assign the floating IP to the instance
nova add-floating-ip kevinj1 192.168.134.12
nova list
+--------------------------------------+---------+--------+------------+-------------+---------------------------------------+
| ID | Name | Status | Task State | Power State | Networks |
+--------------------------------------+---------+--------+------------+-------------+---------------------------------------+
| ec51a24e-8cf2-4f7d-90c3-9c8e68ee4c3a | kevinj1 | ACTIVE | - | Running | internalNet=10.0.1.10, 192.168.134.12 |
+--------------------------------------+---------+--------+------------+-------------+---------------------------------------+
61. 61
Accessing instances behind L3 Router
• List what Floating Ips are available and which are in use
nova floating-ip-list
+----------------+-----------+-----------+-----------+
| Ip | Server Id | Fixed Ip | Pool |
+----------------+-----------+-----------+-----------+
| 192.168.134.12 | | 10.0.1.10 | publicNet |
| 192.168.134.7 | | - | publicNet |
| 192.168.134.11 | | - | publicNet |
| 192.168.134.8 | | - | publicNet |
| 192.168.134.13 | | - | publicNet |
+----------------+-----------+-----------+-----------+
62. 62
Accessing instances behind L3 Router
• Now we can use the floating IP to access our instance!
ssh -i .ssh/kevinj ubuntu@192.168.134.12
The authenticity of host '192.168.134.12 (192.168.134.12)' can't be
established.
RSA key fingerprint is
12:cd:36:2c:bb:67:36:ed:1f:04:66:68:d1:26:c7:29.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.134.12' (RSA) to the list of
known hosts.
Welcome to Ubuntu 14.04.3 LTS (GNU/Linux 3.13.0-74-generic x86_64)
64. 64
Cinder Block Storage
• Creating block storage
– Persistent storage for your instances
– Store data on here that you care about
cinder create --display-name myVolume 5
66. 66
Cinder Block Storage
• Attach the volume to our running instance
– Attach as /dev/vdb
– Treat it as a USB disk
cinder list
+--------------------------------------+-----------+--------------+------+-------------+----------+-------------+
| ID | Status | Display Name | Size | Volume Type | Bootable | Attached to |
+--------------------------------------+-----------+--------------+------+-------------+----------+-------------+
| 7b6bdf0f-1462-4888-9811-b44058614230 | available | myVolume | 5 | None | false | |
+--------------------------------------+-----------+--------------+------+-------------+----------+-------------+
67. 67
Cinder Block Storage
• Attach the volume to our running instance
– Attach as /dev/vdb
– Treat it as a USB disk
nova volume-attach kevinj1 7b6bdf0f-1462-4888-9811-b44058614230 /dev/vdb
+----------+--------------------------------------+
| Property | Value |
+----------+--------------------------------------+
| device | /dev/vdb |
| id | 7b6bdf0f-1462-4888-9811-b44058614230 |
| serverId | 3c2f10ec-d7d9-47b5-8731-4b741e8fe45b |
| volumeId | 7b6bdf0f-1462-4888-9811-b44058614230 |
+----------+--------------------------------------+
68. 68
Cinder Block Storage
• Log into your instance / orchestration
– Format (once, if necessary!)
– Mount
lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
vda 253:0 0 2.2G 0 disk
`-vda1 253:1 0 2.2G 0 part /
vdb 253:16 0 5G 0 disk
mkfs.ext4 /dev/vdb
69. 69
Cinder Block Storage
• Log into your instance / orchestration
– Format (once, if necessary!)
– Mount
mount /dev/vdb /mnt
df
Filesystem 1K-blocks Used Available Use% Mounted on
udev 245944 12 245932 1% /dev
tmpfs 50180 336 49844 1% /run
/dev/disk/by-label/cloudimg-rootfs 2235200 795196 1317008 38% /
none 4 0 4 0% /sys/fs/cgroup
none 5120 0 5120 0% /run/lock
none 250892 0 250892 0% /run/shm
none 102400 0 102400 0% /run/user
/dev/vdb 5029504 10232 4740744 1% /mnt