virtual machines on our cloud (and of course, for you to have those machines located in Kenya). This tutorial walks you through the basics of setting up your first instance.
This article illustrates how to spin up both persistent and ephemeral instances
from the dashboard.
A Persistent instance uses a block storage volume for it's root file system. This allows the operating system files (and related user data) to survive termination of the associated instance.
An Ephemeral instance is the direct opposite of a Persistent instance. It's root volume will be destroyed once the instance is terminated!
Ephemeral instances are mostly useful for one-off/short-lived applications whereas persistent instances will be preferable for longterm applications.
- Active login session
- Sufficient resource quota
- Open the launch Instance modal from either:-
In the "Launch Instance" modal form, provide an Instance Name and Flavor.
To launch an ephemeral instance, select "Boot from image" as your Instance Boot Source and choose your preferred image Image.
NB. If you opened the Launch Instance modal from the images panel, the last two options will already have been set
To launch a persistent instance, select "Boot from image (creates a new volume)" as your Instance Boot Source, choose your preferred image and enter a device size for your new block volume. Do not check the
Delete on Terminate:check-box lest you defeat the purpose of your persistent instance.
Switch to the "Access & Security" tab and select the appropriate ssh key from the Key Pair dropdown. The selected key will be added to the default user's ssh
Authorized_Keysfile for key based authentication. If the drop down has no keys listed, click the
+and follow the import keypair guide.
After launch, you probably want to assign a public IP to your instance.
Depending on the progress of your new VM's creation, manage your floating IP associations by clicking "Associate IP":-
Clicking "Associate IP" button in the VM's actions column if the VM is still spawning. (see below)
Selecting the "Associate IP" option of the "more" drop down menu in the actions collumn if the VM has successfully spun up.(see below)
On the popup dialog, you can either select an existing IP (if available)
from the drop down or allocate a new one from the
public-net pool by clicking
+ button to the right of the drop down.
If both IP address assignment and spin up was successful, it should now be possible to ssh into your VM using "ssh [USER]@[Public IP]" where:-
[Public IP] is the public ip you associated with your instance and [USER] is the default image user provided by distro you chose.....which will be:-
- ubuntu (for ubuntu)
- debian (for debian)
- cloud-user (for CentOS 6.5)
- centos (for CentOS 7)
- coreos (for CoreOS Alpha)
Hence if you spun up a CentOS image and you assigned an ip 188.8.131.52, you should
access your instance by
ssh email@example.com, provided you have the required
security group rules in place. (See the security groups section below)
If you're having problems accessing your instance, you may want to have a look at this great ssh troubleshooting article
A note on Security Groups
Security groups are sets of IP filter rules that are applied to an instance's networking. By default, for new accounts, the default security group denies access to port 22 from 0.0.0.0/0.
If you wish to ssh into your instance you should tweak the "Security Groups" to allow ingress SSH access on port 22 of the VM. This action is only done once for every new account.
- Go to Security Groups (
Access & Security).
- Click on
Manage Rulesbutton under Actions section for the security group
defaultlocated below the
Create/Delete Security Groupbutton on the right side of the dashboard.
- Under the section
Manage Security Group Rules:default, select button
Add Ruleon the top right corner of the dashboard.
- As shown in the image above, select (
At this point you should be capable of accessing your instances via ssh on port 22.
If you would like to open up a different port, feel free to adapt the steps by
selecting a different protocol from the
Rule: drop down or selecting a custom
rule on the same for a custom port.