FUJITSU Cloud Service K5 IaaS Service Portal User Guide

Size: px
Start display at page:

Download "FUJITSU Cloud Service K5 IaaS Service Portal User Guide"

Transcription

1 FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 2.8 FUJITSU LIMITED

2 Preface Purpose of This Document This guide describes the operating procedures of the IaaS Service Portal for the services provided by FUJITSU Cloud Service K5. You are recommended to also refer to the following related manuals. - IaaS Features Handbook - IaaS API References - IaaS Limitations and cautions Compliance with Export Control Regulations When exporting this document or providing it to a third party, check the export control laws and regulations of your country and the U.S. and take necessary procedures. Notices The contents of this manual are subject to change without notice. The contents of this manual shall not be reproduced without express written permission from FUJITSU LIMITED. FUJITSU LIMITED shall bear no responsibility for any claims of violation of a third party's patent or other rights arising from the use of the data described in this document. i

3 Document history Version Date Edited places Description 2.0 April 4, 2017 Whole Initial Release 2.1 April 21, 2017 Ch. 11 and 13 Added descriptions. 2.2 May 19, 2017 Whole Modification of section number Ch. 6 Addition of Confirm and Cancel Resize/Migrate menu. Ch. 10 Addition of storage type in the Table15. Addition of storage action (Connect and Disconnect Storage) 2.3 May 31, 2017 Ch. 10 Update of Table 15 and Table 16 Ch. 12 Table 20 Addition of the link to Subnet Detail Ch Addition of Delete action in the Port. Ch.12.5 Addition of Subnet 2.4 June 30, 2017 Ch. 23 Addition of the API execution function 2.5 July 18, 2017 Ch. 16 Addition of functions for creation/editing/deletion of the following firewall features. - Firewalls - Firewall policies - Firewall rules August 1, 2017 Ch. 2 Updated Figure 1 Ch. 3 Overall correction focusing on Paging and Update button function addition Ch. 6 Added explanation of required entry items in "6.3.1 How to Create Virtual Server" 2.6 September 1, 2017 Ch. 19 Added VPN Service 2.7 September 28, 2017 Ch. 24 Added Operation Log ii

4 2.8 December 13, 2017 Ch. 1 Ch. 11 Ch. 27 Modified the OpenStack Foundation trademark information Added Object Storage Added Virtual Server Import and Export iii

5 Contents Preface... i Document history... ii Chapter 1 Introduction IaaS Service Portal Overview IaaS Service Portal Recommended Environment Essential Information for the use of K5 IaaS Service Portal... 1 Chapter 2 Overall Structure GUI Structure... 3 Chapter 3 Common Operations Description System Area Common Operations Display Area Common Operations... 5 Chapter 4 Login How to Login... 6 Chapter 5 Top Alarm Select Alarm Alarm History Graph Service Usage Select Graph of Service Usage Graph Ranking Resource Usage Chapter 6 Virtual Server Virtual Servers List Action Virtual Server Details Action Create Virtual Server How to Create Virtual Server iv

6 6.4 Edit Virtual Server How to Edit Virtual Server Resize Virtual Server How to Resize Virtual Server Chapter 7 Key Pair Key Pair List Key Pair Creation How to Create a Key Pair Key Pair Import How to import the key pair Key Pair Details Key Pair Deletion How to delete a key pair Chapter 8 Image Image List Action Image Details Chapter 9 Schedule Schedule List Create Schedule How to Create Schedule Schedule Details Schedule Deletion How to delete Schedule Chapter 10 Storage Storage List Action Storage Details Create Storage How to Create Storage Edit Storage How to Edit Storage Disconnect Storage Connect Storage Create Snapshot How to Create Snapshot v

7 Chapter 11 Object Storage Function Overview Usage Methods of Object Storage Create a Container Create an Object Download an Object Import a VM Image Advisory Notes Restrictions On Use Chapter 12 Snapshot Snapshot List Screen Action Snapshot Details Screen Edit Snapshot Screen Chapter 13 Virtual Network Virtual Network List Action Virtual Network Details Action for Subnet Action for Port Create Virtual Network How to Create Virtual Network Edit Virtual Network How to Edit Virtual Network Add Subnet Chapter 14 Virtual Router Virtual router list Action Virtual Router Overview Action Virtual Router Creation How to create a virtual router Add interface Gateway Settings Chapter 15 Security Group Security Group List vi

8 About Operation Security Group Creation How to create a security group Security Group Details Manage Security Group Rules How to Transfer to the Rule Management Screen Addition of Rules How to Add Rules Export Rules How to Export Rules The security group rule list is downloaded in the JSON format.import Rules How to Import Rules Deletion of Rules How to Delete Rules Editing a Security Group How to Edit a Security Group Deletion of Security Group How to Delete a Security Group Chapter 16 Global IP Global IP List Action Reserved Global IP Allocate Global IP Deallocate Global IP Release Global IP Chapter 17 Firewall Function Overview Firewall List Screen Firewall Creation Procedure Firewall Rule Sorting Operation Advisory Notes Chapter 18 Load Balancer Load Balancer List Action Load Balancer Details Create Load Balancer vii

9 How to Create Load Balancer Add Subnet How to Add Subnet Delete Subnet How to Delete Subnet Add Listener How to Add Listener Delete Listener How to Delete Listener Add Virtual Server How to Add Virtual Server Delete Virtual Server How to Delete Virtual Server Create Session Persistence Policy How to Create Session Persistence Policy Create SorryServer Policy How to Create SorryServer policy Create/Delete Policy How to Create/Delete Policy Set Health Check Information How to Set Health Check Information Set Security Group How to Set Security Group Set Cipher Suite How to Set Cipher Suite Chapter 19 DNS DNS Zone List About Operation DNS Zone Registration How to Register DNS Zone Record List About Operation Record Details Record Registration How to register records Editing Records viii

10 How to edit records Record Deletion How to delete records DNS Zone Deletion How to delete DNS zone Chapter 20 VPN Service Function Overview Usage Method of SSL-VPN Connections Advisory Notes Chapter 21 Database Virtual Server Database Virtual Server List About Operation Database Virtual Server Creation How to create database virtual server Database Virtual Server Details Database Virtual Server Startup How to start up Database Virtual Server Database Virtual Server Stop How to stop database virtual server Database Virtual Server Reboot How to reboot the database virtual server Database Virtual Server Deletion How to delete the database virtual server DB Parameter Group Details How to Check DB Parameter Group Database Log List How to see log Database Log Details Chapter 22 Stack Stack List Stack Details Create Stack How to Create Stack Edit Stack Chapter 23 Monitoring Monitoring Target Resource List ix

11 How to display target resource list Resource Audit Information Graph How to change the displayed content of the graph Graph Operation Chapter 24 Alarm Alarm List About Operations Alarm Creation How to create an alarm Alarm Details Action setting How to set an alarm History of Alarm How to display the history of alarm Alarm Deletion How to delete an alarm Chapter 25 Operation Log Function Overview Usage Method of Operation Logs Advisory Notes Chapter 26 API Execution Function Overview Usage Example Information Necessary for API Execution Endpoint List Example of Virtual Server List Acquisition Example of Virtual Server Creation Chapter 27 VM Import and Export Function Overview Usage Example VM Import VM Export Advisory Notes x

12 Chapter 1 Introduction 1.1 IaaS Service Portal Overview IaaS Service Portal IaaS Service Portal is a GUI application for using FUJITSU Cloud Service K5 IaaS (K5 IaaS or IaaS) service. On the IaaS Service Portal, you can operate on some of the IaaS resources Recommended Environment The recommended environment for the integrated service portal is as follows. Table 1 Screen Resolution Screen Resolution Essential Information for the use of K5 IaaS Service Portal The basic information on using K5 IaaS service portal is shown below. Abbreviation in the present document In this document, product names are written as follows. Table 2 Abbreviation Formal Name Abbreviation FUJITSU Cloud Service K5 IaaS K5 IaaS or IaaS Microsoft Windows Server 2012 SE R2 Windows 2012 R2 Windows Microsoft Windows Server 2008 SE R2 Windows 2008 R2 Microsoft Windows Server 2008 EE R2 Red Hat Enterprise Linux 6.8(for Intel64) RHEL6.8 Linux Red Hat Enterprise Linux 7.2(for Intel64) RHEL7.2 Community Enterprise Operating System 6.8 CentOS 6.8 CentOS Community Enterprise Operating System 7.2 CentOS 7.2 Red Hat Update Infrastructure RHUI Windows Server Update Services WSUS VMware vsphere VMware vsphere VMware VMware ESX ESX 1

13 VMware ESXi VMware vcenter Server VMware vsphere Client VMware Tools ESXi vcenter Server vsphere Client VMware Tools Trademarks Microsoft, Windows, Windows Server, or names and product names of other Microsoft products are registered trademarks or trademarks of the US Microsoft Corporation in the United States and other countries. Java is a registered trademark of Oracle Corporation and its subsidiaries in the United States and other countries. Xeon is a trademark of Intel Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds in the United States and other countries. Red Hat, Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries. Ubuntu is a registered trademark of Canonical Ltd.. The OpenStack Word Mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries and is used with the OpenStack Foundation's permission. VMware and VMware product names are trademarks or registered trademarks of VMware, Inc. in the United States and other countries. SAP and SAP logo, SAP R/3, mysap.com, mysap Business Suite, and other SAP products are trademarks or registered trademarks of SAP AG in Germany and other countries. In addition, the company name and product name described in this document are trademarks or registered trademarks of each company. 2

14 Chapter 2 Overall Structure 2.1 GUI Structure GUI of K5 IaaS service portal is configured as follows. Table 3 Area Name No. Name Details 1 System Area Displays a service name, a user name, etc. 2 Side Bar Select a resource and display it in the display area. 3 Display Area Display information on the selected resource. Figure 1 Service Portal 3

15 Chapter 3 Common Operations 3.1 Description This section explains the common operations of the IaaS Service Portal window System Area Common Operations Figure 2 System Area Common Operations Switch Language Selecting a language from the pull-down menu enables switching of the display language between Japanese and English. Switch Region Selecting a region name from the pull-down menu enables switching of regions. 4

16 3.1.2 Display Area Common Operations Figure 3 Display Area Common Operations Switch Side Bar Display Switches between display/non-display of the side bar. When the side bar is not displayed, the display area is enlarged. Switch Project Selecting a project name from the pull-down menu enables switching of projects. There are cases when it is not possible to switch projects, such as when resources are being created. Update Button Clicking this button updates (refreshes) the information in the Display Area. There are cases where updating of information is not possible, such as when resources are being created. Add Resource Clicking this displays the Add Resource window. Filter The items displayed in a list can be filtered using an entered string. Paging This enables division of a list into multiple pages when there are many records. The following operations switch the page. Changing the number of pages. Clicking the previous or next page button. 5

17 Chapter 4 Login 4.1 How to Login Enter contract number, user name and password, then press Login button. Figure 4 Login In case there are input error of the contract number, user name or password, following error message is displayed. 1 Figure 5 Login with an error message 1 From a security point of view, if login fails five times consecutively, you can not log in for 30 minutes. 6

18 Chapter 5 Top 5.1 Alarm Figure 6 Top Figure 7 Alarm 7

19 5.1.1 Select Alarm Select an alarm whose graph you want to display from alarm list. Figure 8 Select Alarm Alarm History Table 4 Items of Alarm No Item Name Description 1 Insufficient Number of alarms with insufficient condition settings 2 Action Succeeded Number of successful alarms 3 Action Failed Number of failed alarms Figure 9 Result of Alarm Collection Most of data that are highly likely to be conditional settings as meaningless alarms are distributed to Insufficient. 8

20 5.1.3 Graph The graph on the horizontal axis shows time and the vertical axis shows the number of alarms. When you move the cursor closer to the graph, you can check the details of each time zone. Figure 10 Alarm Graph Details If you move the mouse wheel upwards on the graph you can zoom in, and when you move the mouse wheel downwards it will zoom out. 5.2 Service Usage You can check the usage of each service in the project by graph or ranking. Figure 11 Service Usage 9

21 5.2.1 Select Graph of Service Usage You can select service usage graphs from the following 5. Virtual Server (Default) Block Storage Image Load Balancer Network Figure 12 Select Service Graph The graph on the horizontal axis shows time and the vertical axis shows the operation time. The graph display period can be selected from the following 3. This Month (Default) 6 Months 12 Months Figure 13 Graph after switching display period Also, by moving the cursor closer to the graph, you can check the details of each time zone. When "This month" is selected, daily details are displayed, when "6 months" or "12 months" is selected, monthly details are displayed. 10

22 Figure 14 Service Usage Graph Details (This Month) Ranking We will display usage status of this month in ranking format. The color of the ranking corresponds to the color of the graph. Figure 15 Ranking of Service Usage 11

23 5.3 Resource Usage You can check the number of each item created in the project. Table 5 Resource Usage List No. Item Name Description 1 Virtual Server (Green) Number of running virtual server resources 2 Virtual Server (Red) Error number of virtual server resources 3 Virtual Network Number of virtual network resources 4 Port Number of resources on port 5 IP Address Number of global IP address resources 6 Block Storage Number of block storage resources 7 Total Storage Total block storage capacity Figure 16 Resource Usage List 12

24 Chapter 6 Virtual Server 6.1 Virtual Servers List You can check the list and status of the virtual servers created in the project. Figure 17 Virtual Server List Table 6 Virtual Server List Table No. Item Name Description 1 Virtual Server Name Name of a virtual server 2 Status Refer to Table 7 Virtual Server Status Virtual Server Status 3 IP Address IP address of a virtual server Display multiple lines if you have multiple IP addresses 4 AZ The availability zone in which virtual servers reside 5 Action Various operations on virtual servers Table 7 Virtual Server Status No. Status Description 1 ACTIVE Active State 2 BUILD Build State 3 DELETED Deleted State 4 ERROR Error State 5 HARD_REBOOT Forced Reboot State 6 MIGRATING Migration State 7 PASSWORD Password Setting State 8 PAUSED Paused state 13

25 9 REBOOT Reboot State 10 REBUILD Rebuild State 11 RESCUE Rescue State 12 RESIZE Resize State 13 REVERT_RESIZE Revert Resize State 14 SHELVED Released State (Resource Pending) 15 SHELVED_OFFLOADED Released State 16 SHUTOFF Stopped State 17 SOFT_DELETED Deleted State (Disk is suspended) 18 SUSPENDED Suspend State 19 UNKNOWN Unknown State 20 VERIFY_RESIZE Verify Resize State Action Figure 18 Virtual Server Action We will provide the following as actions of the virtual server list. 1. Resize Refer to 6.5 Resize Virtual Server. 2. Soft Reboot Restart a virtual server. 3. Hard Reboot Turn off an instance, then back on 14

26 4. Shutdown Shutdown a virtual server. 5. Shelve Shelve a virtual server. 6. Remote Console Open Remote Console. Some browsers are blocked by pop-ups. In that case please allow pop-ups. 7. Edit Refer to 6.4 Edit Virtual Server. 8. Delete Delete a virtual server. 9. Start-up Start a virtual server. 10. Restore Restore a virtual server. 11. Confirm Resize/Migration Execute to resize/migrate a virtual server. 12. Cancel Resize/Migration Cancel to resize/migrate a virtual server. 15

27 6.2 Virtual Server Details You can open virtual server details by clicking a virtual server name in a virtual server list. Detailed information on a virtual server not displayed in a virtual server list is displayed. Figure 19 Virtual Server Details Table 8 Virtual Server Details No. Classification Item Name Description 1 Information Virtual Server Name Name of a virtual server 2 Virtual Server ID Unique value 3 Status Status of a virtual server 4 AZ Availability Zone 5 Date and Time of Creation Date and Time of Creation 6 Spec Virtual Server Type Specification of a virtual server 7 Memory Memory Size 16

28 8 Virtual CPU Number of CPUs 9 Connected Disk Access Point Connection Block Storage 10 Port Port Name Port Name 11 Virtual Network Virtual Network Name Name 12 IP Address IP Address 13 Global IP Displayed when global IP address is set. 14 Security Group Security Group Name 15 Action Various operations on ports Action Figure 20 Port Action As a port action it provides the following. 1. Edit 2. Security Group Settings 3. Allocate Global IP 4. Deallocate Global IP 17

29 6.3 Create Virtual Server This is the GUI when creating a new virtual server. Click Create icon of Virtual Server List How to Create Virtual Server When creating a Virtual Server, it is necessary to create a virtual network in advance. 1. Click an icon of Virtual Server list 2. Set the following and click "Next". Figure 21 Create Virtual Server (Virtual Server) Entry of items marked with * (asterisk) to the right of the label is required. (Common to all windows) AZ Virtual Server Name Virtual Server Type Boot Source When "Storage" is selected, set the following. Storage of AZ Device name When "Image" is selected, set the following. Image 18

30 Device Size Device Name When "Snapshot" is selected, set the following. Storage Snapshot Device Name 3. Set the following and then click "Next". Figure 22 Create Virtual Server (Virtual Network) Virtual Network 4. Set the following and click "Next". Figure 23 Create Virtual Server (Access and Security) 19

31 Key Pair Security Group 5. Set the following and then click "Next". Provisioning Script Figure 24 Create Virtual Server (Optional) 6. Confirm the settings so far on the confirmation window. If there is no problem, click "Create". Please return to the virtual server list and make sure that the state of the created virtual server is "BUILD". It will become available when the status is changed to Active. 20

32 Figure 25 Create Virtual Server (Confirmation) 21

33 6.4 Edit Virtual Server You can edit a server name of a virtual server. You can make transition from "Edit" in the pull-down of the action of the virtual server you want to edit on the virtual server list window How to Edit Virtual Server 1. Click the "Edit" from the pull-down of the virtual server that you want to edit on the virtual server list window. Figure 26 Virtual Server List 2. On the Edit Virtual Server window, enter a new virtual server name and click Update. Figure 27 Edit Virtual Server 22

34 6.5 Resize Virtual Server You can change the specifications (number of virtual CPUs etc.) of a Virtual Server. You can make transition from "Resize" of the action pull down of the virtual server you want to change on the virtual server list window How to Resize Virtual Server 1. Click "Resize" from the pull-down of the virtual server you want to edit on the virtual server list window. Figure 28 Resize 2. Select a new Flavor, the number of Virtual CPUs and Memory allocated to this Flavor will be shown under the Flavor Details section. Figure 29 Resize Virtual Server 3. If there is no problem with the new flavor, click "Resize" button. 4. This completes resizing a virtual server. Return to the server list window, and it will become available when the status is changed to "ACTIVE". 23

35 Chapter 7 Key Pair 7.1 Key Pair List You can check the list and status of the key pair created in a project. Figure 30 Key Pair List Table 9 Displayed Contents of Key Pair List Table No. Item Name Description 1 Key Pair Name Key Pair Name 2 Fingerprint Fingerprint of key pair 3 Action Deletion of key pair 7.2 Key Pair Creation Newly create the key pair to be used at the time of logging in to the virtual server How to Create a Key Pair 1. Click the creation icon + on the key pair list screen and display the key pair creation screen. 2. On the Key Pair Details step screen, set the below information and click Next Page. 24

36 Figure 31 (Entry of Key Pair Details information) Key Pair Name AZ 3. Check the setting contents you have entered so far on Confirmation screen. If there is no problem, click Create. Figure 32 (Confirmation for Setting Contents) 4. If a key pair has been created, a private key is then started to be downloaded. Keep it in a secure location. 7.3 Key Pair Import Import the key pair created in another place in order to use it in the virtual server of K5. Here register a public key only How to import the key pair 1. Click Import Key Pair on the Key Pair List screen. 2. Set the below information and click Create 25

37 Figure 33 (Entry of key pair details information) Key Pair Name Public Key AZ 3. Check the setting contents you have entered so far on the confirmation screen. If there are no problems, click Create. Figure 34 Confirmation of Setting Contents 26

38 7.4 Key Pair Details Click the key pair name on the key pair list to open Key Pair Details screen. Check the detailed information not displayed on the key pair list. Figure 35 Key Pair Details Table 10 Displayed Contents of Key Pair Details No. Category Item Name Displayed Contents 1 Key Pair Details Key Pair Name Key Pair Name 2 Created At Created At 3 Fingerprint Fingerprint of Key Pair 4 Public Key A string of the key of a key pair 5 AZ Availability Zone where a key pair exists 27

39 7.5 Key Pair Deletion You can delete a key pair How to delete a key pair 1. On Key Pair List screen, click the Delete button of the key pair you want to delete. Figure 36 Key Pair List (Deletion) 2. If you check the contents to be deleted and there is no problem, click Delete button. Figure 37 Confirmation Dialogue of Deletion 28

40 Chapter 8 Image 8.1 Image List You can check an available image list and status, etc. Figure 38 Image List Table 11 Image List Table No. Item Name Description 1 Image Name Name of an image 2 Status Status of an image 3 Visibility Visibility of an image 4 Protection Protected or not 5 Disk Format Format of an image disk 6 Action Various operations on an image 29

41 8.1.1 Action Figure 39 Images Action Provides the following as an action of an image list. 1. Create Virtual Sever Create a virtual server based on the selected image. For the virtual server creation, refer to 6.3 Create Virtual Server. 2. Create Storage Create storage based on the selected image. For the storage details, refer to 10.2 Storage Details. 8.2 Image Details You can open image details by clicking an image name on an image list. Detailed information on an image not displayed in an image list is displayed. Figure 40 Image List 30

42 Table 12 Image Details No. Classification Item Name Description 1 Information Image Name Image Name 2 Image ID ID to identify an image in unique 3 Status Status 4 Visibility Visibility 5 Protection Protection 6 Checksum Checksum of an image 7 Date and Time Date and Time of Creation of Creation 8 Date Updated Date Updated 9 Spec Size Size 10 Storage Format Storage Format 11 Disk Format Disk Format 12 Minimum Disk Minimum Disk Size 13 Custom Attribute Attribute Name Customized attributes of the image 31

43 Chapter 9 Schedule 9.1 Schedule List You can check a list and status of schedule created in a project. Figure 41 Schedule List Table 13 Schedule List Table No. Item Name Description 1 Schedule Name Name of a Schedule 2 Time of Execution Time of Schedule Execution 3 Action Deletion of Schedule 9.2 Create Schedule This is the GUI when creating a new schedule.click Create icon of Schedule List How to Create Schedule When creating a Schedule, it is necessary to create a stack including schaling policy. 1. Click an icon of schedule list 2. Set the following and click "Next". 32

44 Figure 42 Entry of Schedule Details information Schedule Name Time of Execution Click Setting and set the following. If Monthly is selected, set the below information Figure 43 Time of Execution Setting(Monthly) Day Hour minutes If Weekly is selected, set the below information 33

45 Figure 44 Time of Execution Setting(Weekly) Week Hour minutes If Daily is selected, set the below information Figure 45 Time of Execution Setting(Daily) Hour minutes If Hourly is selected, set the below information 34

46 Figure 46 Time of Execution Setting(Hourly) minutes If cron is selected, set the below information Figure 47 Time of Execution Setting(cron) CRON format 1. Set the following and click "Next" Figure 48 Setting Execution URL 35

47 Stack Resource Execution URL Execution URL is automatically set from Stack and Resource. 2. Confirm the settings so far on the confirmation window. If there is no problem, click "Create" Figure 49 Confirmation for Setting Contents 9.3 Schedule Details Click the schedule name on the schedule list to open Schedule Details screen. Check the detailed information not displayed on the schedule list. Figure 50 Schedule Detail 36

48 Table 14 Displayed Contents of Schedule Details No. Category Item Name Displayed Contents 1 Schedule Details Schedule Name Schedule Name 2 Time of Execution Time of Schedule Execution 3 Execution URL Execution URL 9.4 Schedule Deletion You can delete a schedule How to delete Schedule On Schedule List screen, click the Delete button of the schedule you want to delete Figure 51 Schedule List 1. If you check the contents to be deleted and there is no problem, click Delete button. Figure 52 Confirmation Dialogue of Deletion 37

49 Chapter 10 Storage 10.1 Storage List You can check a list and status of block storage created in a project. Figure 53 Storage List Table 15 Storage List Table No. Item Name Description 1 Storage Name Name of a Storage 2 Status Major Storage Status in-use :In use creating :Creating available :Available 3 Access Point Access point when connected to a virtual server. 4 Size (GB) Storage Capacity 5 Type Type of storage 6 AZ The availability zone in which block storage reside 7 Action Various operations on a storage 38

50 Action Figure 54 Storage Action Provide the following as actions of a storage list. 1. Edit Storage Refer to 10.4 Edit Storage. 2. Delete Storage Delete a storage. 3. Disconnect Storage Refer to 10.5 Disconnect Storage. 4. Edit Connection Refer to 10.6 Connect Storage. 5. Create Snapshot Refer to 10.7 Create Snapshot. 39

51 10.2 Storage Details You can open storage details by clicking a storage name of a storage list. Detailed information on a storage not displayed in a storage list is displayed. Figure 55 Storage Details 40

52 Table 16 Virtual Server Details No. Classification Item Name Description 1 Information Storage Name Storage Name 2 ID Storage ID 3 Status in-use, etc. 4 Connected Virtual Server The virtual server connected this storage 5 Size(GB) Storage capacity 6 Type Storage type 7 AZ Availability Zone 8 Date and Time Created date of Storage of Creation 9 readonly Readonly mode 10 attached_mode Read, write, execute 11 Snapshot Date and Time Created date of Snapshot of Creation 12 Snapshot Name of Snapshot Name 13 Description Description input by a user 14 Size (GB) Capacity of Snapshot 15 Action Various operations on a snapshot 41

53 10.3 Create Storage This is the GUI when creating a new storage. You can make transition from an icon on a storage list window How to Create Storage 1. Click an icon on a storage list window.. 2. Set the following and click "Create". Figure 56 Create Storage Storage Name Description Type Capacity Storage Source Select a snapshot name to use if you select "snapshot". Select images and AZ if you select "image". Select a storage to use if you select "storage". 42

54 10.4 Edit Storage How to Edit Storage Figure 57 Edit Storage You can edit the following. Click "UPDATE" after editing. Storage Name Description 10.5 Disconnect Storage If a selected storage is connected to a Virtual Server, you can detach it from the Virtual Server Connect Storage It is possible to connect selected storage to a Virtual Server Create Snapshot How to Create Snapshot 1. Enter the following in Create Snapshot window, and click "CREATE". Snapshot Name Description Figure 58 Create Snapshot 43

55 Chapter 11 Object Storage 11.1 Function Overview This function provides the functionality for object storage on the IaaS Service Portal. It enables use of online storage in which data can be stored and retrieved on an object (their content and metadata) basis. The functions provided are as follows: Containers Display of lists and details of containers Creation, editing, and deletion of containers Setting of access policies (ACL) for containers *1 Creation and deletion of container metadata Objects Display of lists and details of objects Creation and deletion of objects Re-upload of objects and editing of metadata Download of objects and VM(Virtual Server) import *1 The setting of access policies (ACL) for containers is a function that enables the setting of container read privileges (X-Container-Read) and write privileges (X-Container-Read). Using these settings it is possible control access to containers by the following: - Projects/users - Referer headers included in HTTP requests 44

56 11.2 Usage Methods of Object Storage This chapter explains the following usage methods: Create a container Create an object Download an object Import a VM image Create a Container 1. Display the Containers List window Clicking [Storage] -> [Object Storage] displays the Containers List window. On this window it is possible to refer to the container name, the number of objects, the amount of usage, and the access policies (ACL) of each container. Clicking the "+" button on the Containers List window displays the Create Container window. Figure 59 Containers List Window 2. Create a container After entering each item on the Create Container window, click the "Create" button and create the container. The created container will be displayed in the Containers List window. 45

57 Figure 60 Create Container Window The setting items listed below are those required when creating a container. Table 17 Entry Items for Container Creation No. Item* Description 1 Container Name The name of the container 2 X-Container-Read The access policy (ACL) settings for read privileges 3 X-Container-Write The access policy (ACL) settings for write privileges 4 X-Versions-Location The name of the container for versioning management 5 Container Metadata The key and value to set for the container metadata X-Container-Meta- Access-Control-Allow- Origin "*" : Initial value Note: If this value is changed uploading and downloading of files from the portal is not possible. X-Container-Meta- Access-Control-Max-Age " " : Initial value *For details on each item, refer to the "API Reference - Foundation Service". 46

58 3. Check the Container Detail window The detailed information of a container can be referred to by clicking the container name on the Containers List window. The Container Detail window displays objects, container information, and container metadata. Figure 61 Container Detail Window 47

59 The following table indicates the items displayed on the Container Detail window. Table 18 Container Detail Window Display Items No. Category Item Description 1 Objects Object Name The name of the object 2 Size The size of the object 3 Content-Type The MIME type of the object 4 Update Date and Time (UTC) The date and time when the object was created or metadata was changed 5 Container Info Container Name The name of the container 6 Object Counts The total number of objects in the container 7 Size The size (in bytes) of the objects in the container 8 X-Container-Read The access control (ACL) for read privileges 9 X-Container-Write The access control (ACL) for write privileges 10 X-Versions- Location The name of the container for versioning management 11 X-Trans-Id The ID assigned to the request 12 Execution Date and Time (UTC) The date and time the transaction is to be executed 13 Container Metadata Container Metadata Key The key to set for the container metadata 14 Container Metadata Value The value to set for the container metadata 48

60 Create an Object 1. Display the object list information from the Container Detail window The object list information can be referred to from the Container Detail window. The object name, size, Content-Type, and Update Date and Time (UTC) are displayed in the object list information. Clicking the "+" button on the Container Detail window displays the Create Object window. Figure 62 Container Detail Window (Object Section) Another method for transferring to the Create Object window is to click "Create Object" in the Action menu on the Containers List window. 49

61 2. Create an object After entering each item on the Create Object window, click the "Create" button and create the object. If the name matches that of an existing object, a dialog checking whether to update the object will be displayed. Figure 63 Create Object Window 50

62 The following table indicates the items displayed on the Create Object window. Table 19 Create Object Window Display Items No. Item* Description 1 Object Name The name of the object 2 File The file to register The maximum file size is 1 GB. *When registering a file larger than 1 GB, the setting for a large object is necessary. *Please split files by yourself. 3 X-Detect-Content- Type Automatic and manual setting of the MIME type of the object 4 Content-Type The MIME type setting of the object 5 X-Copy-From The name of the container of the source object Container 6 X-Copy-From Object The name of the source object 7 ETag The setting for the MD5 check sum value of the object 8 Content-Disposition The setting for the behavior of the browser 9 Delete At Date (UTC) Specification of the time and date for deletion of the object, in UTC format 10 Large Object The setting regarding large objects There are the following three methods No settings The setting when not handling as a large object X-Object-Manifest The setting for dynamic large objects Sets the container name/object name. multipart-manifest The setting for static large objects Sets using JSON format. 11 Object Metadata The key and value to set for the object metadata *For details on each item, refer to the "API Reference - Foundation Service". 51

63 3. Check the Object Detail window Clicking the object name in the Object List on the Container Detail window displays the Object Detail window. You can refer to detailed information such as object metadata, etc. Figure 64 Object Detail Window 52

64 The following table indicates the items displayed on the Object Detail window. Table 20 Object Detail Window Display Items No. Item Description 1 Object Name The name of the object 2 Content-Length The size of the object 3 Content-Type The MIME type of the object 4 Update Date The date and time when the object was created or metadata was changed 5 ETag The MD5 check sum value of the object/ "A character string consisting of the ETag of each segment of the manifest combined with the value of the MD5 check sum" (for manifest objects) 6 Content-Encoding The Content-Encoding meta data value 7 Content-Disposition The setting value for the behavior of the browser 8 Delete At Date (UTC) The scheduled time and date for deletion of the object 9 X-Object-Manifest The setting for dynamic large objects (the container name and the prefix name of the split object) 10 X-Static-Large-Object If the object is the manifest object of a static large object, "True" will be returned 11 X-Trans-Id The ID assigned to the request 12 Transaction Date The date and time the transaction is to be executed 13 URL The URL of the download target object 14 Object Metadata Key The key to set for the object metadata 15 Object Metadata Value The value to set for the object metadata 53

65 Download an Object There are the following two methods for downloading an object. Clicking the "Download" button on the Object Detail window Selecting from the Action menu of the object list on the Container Detail window Figure 65 Object Action Menu on the Container Detail Window Advisory Notes It is necessary to configure the following setting in IE 11: Click [Tools] > [Internet options] > [Security] > [Custom level], and then select "Enable" for [Access data sources across domains]. Uploading and downloading of files may take approximately 90 minutes per GB depending on the time of day, the amount of data, and the distance to the target region the data is being transferred to. Note: By viewing [F12 developer tools] > [Network] in IE 11, it is possible to confirm the processing status of each API issued from the portal Import a VM Image It is possible to select VM Import from the Action menu on the Container Detail window to import a virtual server image to the K5 service. Selecting "VM Import" on the Action menu transfers you to the VM Import window. For details on VM import, refer to VM Import. 54

66 11.3 Advisory Notes With the container deletion function, it is only possible to perform "Delete" from the Action menu on the Container List window when the number of objects in a container is "0". Regarding the access policy (ACL) settings, as setting permission for referrer makes reading possible without authentication using a token, it is not recommended as it lowers the security level. For details, refer to the "API Reference - Foundation Service". When you want to register split objects as a single object, perform settings for a large object. This integrates split objects, enabling batch download as a single object and VM import Restrictions On Use There are the following restrictions regarding IE 11. When the size of an object exceeds 4 GB, the following operations cannot be used on the Container Detail window. Show object detail / Re-upload / Edit Metadata Note: Perform operations using the Chrome browser. 55

67 Chapter 12 Snapshot 12.1 Snapshot List Screen You can display a list of snapshots created in a project and perform operations for (edit/delete) the snapshots. Figure 66 Snapshot List Table 21 Displayed Contents of Snapshot List Table No. Item Name Description 1 Snapshot Name Name of a snapshot 2 Description Description set by a user 3 Capacity(GB) Capacity of snapshot a snapshot (GB) 4 Status Snapshot Status 5 AZ Availability Zone in which a snapshot resides. 6 Action Various Operations for a snapshot 56

68 Action Figure 67 Snapshot Action The following are provided as the actions toward a list of snapshots. 1. Edit Refer to 12.3 Edit Snapshot Screen. 2. Delete Delete a snapshot Snapshot Details Screen Click a specific Snapshot Name on the Snapshot List screen and you can check the detailed information on the snapshot. Figure 68 Snapshot Details 57

69 Table 22 Displayed Contents of a Snapshot Details Table No. Classification Item Name Description 1 Information Snapshot Name Name of a snapshot 2 Snapshot ID Unique value attached to a snapshot 3 Description Description set by a user 4 Status Snapshot Status 5 Storage The ID of the storage from which a snapshot is obtained 6 AZ Availability Zone in which a snapshot resides 7 Spec Capacity Capacity of snapshot a snapshot (GB) 8 Date and Time of Creation Date and time in UTC time when a snapshot was created 12.3 Edit Snapshot Screen You can edit the following information. After you have edited it, click UPDATE. Figure 69 Edit Snapshot Snapshot Name Description 58

70 Chapter 13 Virtual Network 13.1 Virtual Network List You can check the list and status of Virtual Networks created in the project. Figure 70 Virtual Network List Table 23 Virtual Network List No. Item Name Description 1 Virtual Network Name Name of a virtual network 2 Status Network Status 3 Allocated Subnet Allocated Subnet 4 AZ Availability Zone in which a virtual network resides 5 Shared Shared Status 6 Management State Management State 7 Action Various operations on a virtual network Action Figure 71 Virtual Network Action 59

71 As actions of a virtual network list we provide the following. 1. Edit Refer to 13.4 Edit Virtual Network. 2. Delete Delete a virtual network Virtual Network Details You can open virtual network details by clicking a virtual network name in the virtual network list. Display detailed information on a virtual network that is not displayed in a virtual network list. Figure 72 Virtual Network Details 60

72 Table 24 Virtual Network Details No. Classification Item Name Description 1 Virtual Network Virtual Network Name Name of a virtual server 2 Overview Virtual Network ID Unique Value 3 Project ID Virtual Server Status 4 AZ Availability Zone 5 Status Always ACTIVE 6 Management State UP / DOWN 7 Shared Yes / No 8 External Virtual Network Yes / No 9 Provider Virtual Network - 10 Subnet Subnet Name Subnet Name Link to Subnet Detail 11 Virtual Network Address Virtual Network Address 12 IP Version IPv4 / IPv6 13 Gateway IP Set Gateway IP 14 Action Various operations on subnet 15 Port Port Name Port Name 16 Private IP Private IP 17 Connected Device Type of Connected Device 18 Connected Virtual Server Virtual Server ID 19 Status ACTIVE, etc. 20 Management State UP / DOWN 21 Action Edit operation for port 61

73 Action for Subnet Figure 73 Subnet Action As subnet actions, it provides the following. 1. Edit (edit subnet name, select Gateway Yes or "No") 2. Delete Action for Port Figure 74 Port Action As port actions, it provides the following. 1. Edit (edit a port name, select an management state "UP" or "DOWN", edit a private IP address) 2. Delete 13.3 Create Virtual Network This is a screen to create a new virtual network. Click Create icon of Virtual Network List window How to Create Virtual Network 1. Click an icon of virtual server list window. 62

74 2. Set the following and click "Next". Figure 75 Create Virtual Network (Virtual Network) AZ Virtual Network Name Management State 3. Set the following and click "NEXT". Existing Existing Figure 76 Create Virtual Network (Subnet) Create Subnet (Yes/No) Subnet Name Virtual Network Address (e.g /24) Gateway (Yes/No) Gateway IP 63

75 4. Set the following and click "Create". Figure 77 Create Virtual Network (Subnet Details) DHCP (Enable/Disable) IP Address Allocation Pool Click "Add" to assign multiple address ranges. DNS Server Click Add to set multiple DNS servers. Adding a Routing Setting Click "Add" to set multiple routes. 5. Confirm the settings so far on the confirmation window. If there is no problem, click "CREATE". 64

76 Figure 78 Confirmation of Setting Details 65

77 13.4 Edit Virtual Network How to Edit Virtual Network You can edit the following. After editing, click "UPDATE". Virtual Network Name Management State (UP/ DOWN) Figure 79 Edit Virtual Network 13.5 Add Subnet In case user does not create subnet in the timing of Create Virtual Network operation, it is possible to add subnet from Virtual Network Detail Window. 66

78 Chapter 14 Virtual Router 14.1 Virtual router list On the Virtual router list screen, you can display a list of virtual routers created in a project and perform operations (Newly create/delete/gateway settings/delete gateway) for the virtual routers. Figure 80 Virtual router list Table 25 Displayed Contents of a Virtual Router List Table No. Item Name Description 1 Virtual router name Name of a virtual router 2 Status Virtual router status *ACTIVE :In operation 3 AZ Availability Zone in which a virtual router is located 4 Action Various operations for a virtual router 67

79 Action Figure 81 Virtual Router Actions The following are provided as the actions for a list of virtual routers. 1. Gateway settings Refer to 14.5 Gateway Settings. 2. Delete gateway Delete a virtual gateway. 3. Delete Delete a virtual router Virtual Router Overview Click a specific Virtual Router Name on the Virtual router list screen and you can check the detailed information on the snapshot. If ports exist, you can display a list of ports and perform operations (Delete/Edit/Allocate Global IP) for the ports. Figure 82 Virtual Router Overview 68

80 Table 26 Displayed Contents of a Virtual Router Details Table No. Classification Item Name Description 1 Virtual Router Virtual Router Name Name of a virtual router 2 Overview Virtual Router ID Unique value attached to a virtual router 3 AZ Availability Zone 4 Status Virtual router status 5 External Gateway IP address of an external gateway 6 Interface Port Name Name of a port 7 Private IP Private IP 8 Global IP Global IP 9 Classification network:router_interface, etc. 10 Management State true / false 11 Status Interface Status ACTIVE, etc. 12 Action Various operations for an interface Action Figure 83 Interface actions The following are provided as the actions for an interface. 1. Delete Deletes a port. 2. Edit Edits a port. 3. Allocate Global IP Allocates a global IP. 69

81 14.3 Virtual Router Creation On the Create a new router screen, you can newly create a virtual router How to create a virtual router 1. Click the icon of the Virtual router list. 2. Set the below information and click CREATE. AZ Virtual router name Figure 84 Create a new router 14.4 Add interface You can newly add an interface on the Virtual Router Overview screen. See below for the Add interface screen. Figure 85 Add interface 14.5 Gateway Settings You can make a gateway setting for a virtual router. As part of the setting, specify an external virtual network. Figure 86 Gateway Settings 70

82 Chapter 15 Security Group 15.1 Security Group List You can check the list and status of the Security Group created in a project. Figure 87 Security Group List Table 27 Displayed Contents of Security Group List Table No. Item Name Description 1 Security Group Name Security Group Name 2 Description Description of Security Group 3 Action Various Operations for Security Group About Operation Figure 88 Security Group Action 71

83 See below for the operations for security group. 1. Manage Rules Refer to 15.4, 15.5, 15.6, and Edit a Security Group Refer to Delete Refer to Security Group Creation Newly create a security group How to create a security group 1. Click the creation icon + at the upper right on the security group list screen. 2. Set the below information and click Next Page. Figure 89 (Security Group Details) Security Group Name Description 3. Check the setting contents you have entered so far on the confirmation screen. If there is no problem, click CREATE. 72

84 Figure 90 Confirmation for Setting Contents 15.3 Security Group Details Click Security Group Name on the security group list to open the Security Group Details. You can check the detailed information not displayed on the security group list. Figure 91 Security Group Details 73

85 Table 28 Displayed Contents of Security Group Details No. Category Item Name Description 1 Security Group Details Security Group Name Security Group Name 2 Security Group ID Security Group ID 3 Description Description of Security Group 4 Applied Rule Direction ingress/egress 5 IP Version IPv4/IPv6 6 Protocol TCP / UDP / ICMP / Other protocols 7 Port Range Port Range * In case of ICMP specified as protocol, this value should be ICMP type and code. 8 Connected to Connected to 15.4 Manage Security Group Rules You can check the list and status of the security group and add/import/export rules. Figure 92 Security Group Rule Management 74

86 Table 29 Displayed Contents of Manage Security Group Rules No. Item Name Description 1 Security Group Name Security Group Name 2 Direction ingress/egress 3 IP Version IPv4/IPv6 4 Protocol HTTP / HTTPS / TCP / SSL 5 Port Range Port Range 6 Connected to Destination of Connection 7 Action Deletion of security group rules How to Transfer to the Rule Management Screen On the security group list, select Manage Rules from the pull-down menu of the security group you want to manage for its rules, or click Manage Rules button on the Security Group Details screen to go to the Rule Management screen. Figure 93 Security Group List (Rule Management) Figure 94 Security Group Details (Rule Management) 75

87 15.5 Addition of Rules You can newly add the rules to an existing security group How to Add Rules 1. Click Add Rule button on the Manage Security Group Rules screen. Figure 95 Rule Management (Rule Addition) 2. Set the below information and click Add. (*1) Figure 96 Add Rule Rule If Custom TCP Rule or Custom UDP Rule is selected, set the below information. Direction (Receive/Send) Open Port (Port/Port Range) Connected to (CIDR/Security Group) If Custom ICMP Rule is selected, set the below information. Direction (Receive/Send) Type Code Connected to(cidr/security Group) If you select Other Protocols, set the below information. 76

88 Direction (Receive/Send) IP Protocol Connected to(cidr/security Group) If you select ALL ICMP, ALL TCP, or ALL UDP, set the below information. Direction (Receive/Send) Connected to (CIDR/Security Group) If you select DNS, HTTP, HTTPS, IMAP, IMAPS, LDAP, MS SQL, MY SQL, POP3, POP3S, RDP, SMTP, SMTPS, or SSH, set the below information. Direction (Receive/Send) Connected to (CIDR/Security Group) *1 In Add Rule, you cannot add the same rule as the one added by default when a security group is created. If you want to add the same rule, export the default rule and import it. Please refer to 15.6 for how to export and 15.7 for how to import. Figure 97 Rule Management (Default Rules) 77

89 15.6 Export Rules You can export rules How to Export Rules 1. Click Export button on the Manage Security Group Rules screen. Figure 98 Rule Management (Export) 15.7 The security group rule list is downloaded in the JSON format.import Rules You can import rules How to Import Rules 1. Click Import button on the Manage Security Group Rules screen. Figure 99 Rule Management (Import) 2. Click Import button and select a file to import. Figure 100 Confirmation of Importing Rules 3. A security group rule is created from an imported file. 78

90 15.8 Deletion of Rules You can delete rules How to Delete Rules 1. Click Delete button of the rule to be deleted on the Manage Security Group Rules screen. Figure 101 Manage Security Group Rules (Deletion) 2. If you check the contents to be deleted and there is no problem, click Delete button. Figure 102 Confirmation of Deletion 79

91 15.9 Editing a Security Group You can edit the group name and description of a security group How to Edit a Security Group 1. On the Security Group List screen, select Edit a Security Group from the pull-down menu of the security group to be edited. Figure 103 Security Group List (Edition) 1 On the Edit a Security Group screen, enter the new security group name and description and click Update. Figure 104 Edit a Security Group 80

92 15.10 Deletion of Security Group You can delete a security group How to Delete a Security Group 1. On the security group list screen, select Delete from the pull-down menu of the security group to be deleted. Figure 105 Security Group List (Deletion) 2. If you check the contents to be deleted and there is no problem, click Delete button. Figure 106 Confirmation of Deletion 81

93 Chapter 16 Global IP 16.1 Global IP List You can refer to a list of reserved global IP. Figure 107 Global IP List Action Figure 108 Global IP Action 16.2 Reserved Global IP You can allocate global IP from a port action of virtual server details. Click "Add" from a global IP list window when you get a new global IP. 1. Select Global IP Pool and click NEXT. Figure 109 Reserved Global IP (Reserved Global IP) 82

94 2. When you want to associate the acquired global IP with a port, select Global IP Address assignment port, and click Next. If you do not assign to a port, leave is a "Global IP Address assignment port blank and click " Next ". Figure 110 Reserved Global IP (port assignment) 3. Confirm the settings so far on the confirmation window. If there are no problems, click "SETTING. Figure 111 Reserved Global IP (Confirmation) 16.3 Allocate Global IP Select a resource to be allocated from the global IP address assignment port, and click "SETTING". Figure 112 Allocate Global IP 83

95 16.4 Deallocate Global IP Deallocate the global IP assigned to the resources like a virtual server from the resource. Figure 113 Deallocate Global IP 16.5 Release Global IP IP addresses that are no longer needed will be released from the global IP pool by clicking "Release". Figure 114 Release Global IP 84

96 Chapter 17 Firewall 17.1 Function Overview This function provides the functionality for managing firewalls. The following functions are provided. Firewall Display of lists and details of firewalls Creation, editing, and deletion of firewalls Association of firewalls and virtual routers Association of firewalls and firewall policies Firewall Policy Display of lists and details of policies Creation, editing, and deletion of policies Association of policies and firewall rules (Registration, deletion, and sorting) Firewall Rule Display of lists and details of rules Creation, editing, and deletion of rules The created firewall, firewall rule, firewall policy, and virtual router must be in the same availability zone to be used. 85

97 17.2 Firewall List Screen Selecting [Side Bar]-[Networking]-[Firewall] displays the Firewall List screen (Refer to "Figure 115 Firewall List"). This section explains the screen that is initially displayed. Create a Firewall Display Firewall Policy List Display Firewall Rule List Display Firewall Details Display Policy Details Operate the Firewall Figure 115 Firewall List 86

98 17.3 Firewall Creation Procedure The procedure for creating a firewall is given below. (1) Confirm a Virtual Router When creating a firewall, associate the firewall with a virtual router. Confirm that the virtual router has been created in advance. If it has not been created, refer to 14.3 Virtual Router Creation and create a virtual router. Figure 116 Virtual Router List (2) Create a Firewall Rule Click the "Rule List" button on the Firewall List screen. Clicking the "+" button on the Firewall Rule List screen creates a firewall rule. z z z Figure 117 Firewall Rule List 87

99 (3) Create a Firewall Policy Click the "Policy List" button on the Firewall List screen. Clicking the "+" button on the Firewall Policy List screen creates a firewall policy. On the Create Firewall Policy screen, select the firewall rule created in (2). Clicking the "Sort" button enables sorting of the selected rules into the desired order. For the sorting method, refer to " Firewall Rule Sorting Operation. (4) Create a Firewall Policy It is possible to register multiple firewall rules with a firewall policy. The validity of registered rules is verified in ascending order, and if verification is successful the action set for the rule (Allow/Deny) is performed. If you want to change the order of rule application, selecting the following menu displays the Sort Firewall Rule screen (Refer to "Figure 119 Sorting Firewall Rules"). - Click "Reflect order display" on the Create Firewall Policy screen. - Click "Reflect order display" on the Edit Firewall Policy screen". Figure 118 Firewall Policy List 88

100 (5) Create a Firewall Clicking the "+" button on the Firewall List screen creates the firewall. On the Create Firewall screen, set the firewall policy created in (3) and the already created virtual router from (1). Figure 119 Firewall List Firewall Rule Sorting Operation It is possible to register multiple firewall rules with a firewall policy. The validity of registered rules is verified in ascending order, and if verification is successful the action set for the rule (Allow/Deny) is performed. If you want to change the order of rule application, selecting the following menu displays the Sort Firewall Rule screen (Refer to "Figure 120 Sorting Firewall Rules"). - Click "Reflect order display" on the Create Firewall Policy screen - Click "Reflect order display" on the Edit Firewall Policy screen Figure 120 Sorting Firewall Rules 89

101 This section explains the operation procedure for the Sort screen. (1) Set the values in the "Sort" text field in the desired order. An example of sorting is given in the following figure. *The default value (integer) of the order of sorting is the same as the order defined on this portal. It has no connection to the upper limit of rules. *If you need to set a higher sorting priority than 1, it is possible to do so by specifying a minus integer for sorting. [Input value: Integers in the range of (high priority) to 999 (low priority)] *If the same value is set at the same time in multiple rules, reordering of those rules will not be performed. Example: When moving FirewallRuleA to between FirewallRuleC and FirewallRuleD. Change FirewallRuleA's Order to "4" Reflect order (2) Clicking the "Reflect order display" button sorts the rules in the order of the specified values. (3) After confirming the rules are in the desired order, click the "Fix" button to close the window. If the "Fix" button is clicked even without the "Reflect order display" button being clicked, the order settings will be reflected anyway. 90

102 17.4 Advisory Notes This section explains the advisory notes for each function. Indication of "Source IP [Port]" and "Destination IP [Port]" on the Firewall Rule List If an IP address and port number are not set, "(any)" will be displayed in the "Source IP [Port]" and "Destination IP [Port]" fields. If the source or destination port is set, "[the_port_number] or [the_range_of_port_numbers]" will be displayed. 91

103 Chapter 18 Load Balancer 18.1 Load Balancer List You can check a list and status of load balancers created in the project. Figure 121 Load Balancers List Table 30 Load Balancer List Table No. Item Name Description 1 Load Balancer Name Name of a load balancer 2 DNS Name FQDN for accessing a load balancer 3 Status Status of a load balancer (In Service, etc.) 4 Action Various operations on a load balancer Action Figure 122 Load Balancer Action 92

104 As actions of a virtual server list, provide the following. 1. Delete Delete a load balancer. 2. Add Subnet Refer to 18.4 Add Subnet. 3. Delete Subnet Refer to 18.5 Delete Subnet. 4. Add Listener Refer to 18.6 Add Listener. 5. Delete Listener Refer to 18.7 Delete Listener. 6. Set Health Check Information Refer to Set Health Check Information. 7. Add Virtual Server Refer to 18.8 Add Virtual Server. 8. Delete Virtual Server Refer to 18.9 Delete Virtual Server. 9. Set Cipher Suite Refer to Set Cipher Suite. 10. Create/Delete Policy Refer to Create/Delete Policy. 11. Create Session Persistence Policy Refer to Create Session Persistence Policy. 12. Create SorryServer Policy Refer to Create SorryServer Policy. 13. Set Security Group Refer to Set Security Group. 93

105 18.2 Load Balancer Details You can open load balancer details by clicking a load balancer name in a load balancer list. Detailed information on a load balancer not displayed in a load balancer list is displayed. Figure 123 Load Balancer Details Table 31 Load Balancer Detailed No. Classification Item Name Description 1 Load Balancer Load Balancer Name Name of a load balancer 2 Information Type public / internal 3 Grade Standard / Middle / High 4 Listener Load Balancer Protocol HTTP / HTTPS / TCP / SSL 5 Load Balancer Port Listen Port Number of a load balancer 6 Virtual Server Protocol HTTP / HTTPS / TCP / SSL 7 Virtual Server Port Listen Port Number of a virtual server 8 Certificate Select for HTTPS, SSL 94

106 9 Session Persistence Policy Name Policy 10 SorryServer Redirect Policy Name Policy 11 Subnet Information Subnet Subnet Name 12 Security Group Security Group Security Group Name Information 13 Health Check Health check Times Information consecutive success times judged as recovery 14 Health check Seconds execution time interval (sec) 15 Protocol HTTP / HTTPS / TCP / SSL 16 Port Port Number 17 URL Health check target URL 18 Health check Seconds response timeout time (sec) 19 Health check Times consecutive failed times judged as faulty 20 Virtual Server Information Virtual Server Name Virtual server name of distribution target 21 IP Address IP Address 22 Status Virtual Server Status 23 AZ Availability Zone 24 Policy Information Policy Name Policy Name 25 Session Maximum time to Seconds Persistence Policy Information maintain session (sec) 26 Policy Information Policy Name Policy Name 95

107 27 Policy Information to redirect to SorryServer Redirect Destination Location URL URL 18.3 Create Load Balancer This is the GUI when creating a new load balancer. You can make transition from an icon on a load balancer list window How to Create Load Balancer 1. Click an icon of load balancer list. 2. Set the following and click "NEXT". Figure 124 Create Load Balancer (Load Balancer Definition) Load Balancer Name Type (public/internal) Grade (Standard, Middle or High) Load Balancer Protocol (HTTP/HTTPS/TCP/SSL) Listen Port Number of a load balancer Virtual Server Protocol (HTTP/HTTPS/TCP/SSL) Listen Port Number of a virtual server 96

108 Certificate (if you select HTTPS or SSL as a load balancer protocol) 2 2 Certificate can not be registered on IaaS Service Portal. For certificate registration, please use API. 97

109 3. Set the following and click "NEXT". Selected Subnet Figure 125 Create Load Balancer (Set Subnet) 4. Set the following then click "NEXT". Figure 126 Create Load Balancer (Set Security Group) 98

110 Selected Security Groups 5. Confirm the settings so far on the confirmation window. If there is no problem, click "CREATE". Figure 127 Create Load Balancer (Confirmation) 18.4 Add Subnet You can select a subnet to add to a load balancer How to Add Subnet 1. Select a predefined subnet you want to add to a load balancer displayed in the "Subnet" then move to the "Selected Subnet". 2. Click "Add". 99

111 18.5 Delete Subnet You can select a subnet to remove from a load balancer How to Delete Subnet 1. Select the deletion target from the subnet displayed in the list and click "Delete" Add Listener You can select a listener to add to a load balancer How to Add Listener 1. In "Load Balancer Protocol", select a protocol accepted by a load balancer. (HTTP/HTTPS/ TCP/SSL). 2. Enter a port number acceptable for a load balancer in "Load Balancer Port". 3. Select a protocol to communicate from a load balancer to a virtual server in "Virtual Server Protocol". (HTTP/HTTPS/TCP/SSL) 4. Enter a port number acceptable for a virtual server in "Virtual server port". 5. Select a credential if you select "HTTPS" or "SSL" in "Load Balancer Protocol. 6. Click "Add" Delete Listener You can delete a listener from a load balancer How to Delete Listener 1. Select a listener you want to delete from the list, then click "Delete" Add Virtual Server You can select a virtual server to which a load balancer distributes requests How to Add Virtual Server 1. From a virtual server list, select a server you want to add to a load balancer. 2. Click "Add". 100

112 18.9 Delete Virtual Server You can delete a virtual server to which a load balancer distributes requests. Just out of the load balancer distribution target, the virtual server itself will remain How to Delete Virtual Server 1. From a virtual server list, select a server you want to delete from a load balancer. 2. Click "Delete" Create Session Persistence Policy You can create a session persistence policy for a load balancer How to Create Session Persistence Policy 1. Set the following and click "Create". Policy Name Maximum time to maintain session (sec) Create SorryServer Policy You can create a policy to redirect to SorryServer when there is no destination for a load balancer to distribute How to Create SorryServer policy 1. Set the following and click "Create". Policy Name Redirect Destination Location URL Create/Delete Policy For a load balancer, you can set a session persistence policy created and a SorryServer policy to set How to Create/Delete Policy 1. Set the following and click "Set". Load Balancer Port 101

113 Session Persistence Policy to set SorryServer Policy to set * The values of Session persistence policy and SorryServer policy are displayed by selecting a policy Set Health Check Information You can set health check information of a virtual server by a load balancer How to Set Health Check Information 1. Set the following and click "Create". Health check consecutive success times judged as recovery Health check execution time interval (sec) Protocol (HTTP/HTTPS/TCP/SSL) Port URL Health check response timeout time (sec) Health check consecutive failed times judged as faulty Set Security Group You can set a security group on a load balancer How to Set Security Group 1. Select a predefined security group you want to add to a load balancer displayed in "Security Group", then move to "Security Group Settings." 2. Click "Set" Set Cipher Suite You can set cipher suites on a load balancer How to Set Cipher Suite 1. Select "Add or an action of the created cipher suite. 2. Select a cipher suite name and a cipher suite to use in the cipher suite add (edit) dialog. 3. Click "Set". 102

114 Chapter 19 DNS 19.1 DNS Zone List You can check the list and status of DNS zone which is created in project. Figure 128 DNS Zone List Table 32 Displayed Contents of DNS Zone List Table No. Item Name Displayed Contents 1 DNS Zone Name Name of DNS zone 2 Number of Records Number of records registered in a zone 3 Description Description of DNS zone 4 Action Various operation for DNS zone 103

115 About Operation Figure 129 DNS zone action The following items will be provided as the operation of DNS zone list. 1. Record Settings Refer to 19.3, 19.4 and Zone Delete Refer to DNS Zone Registration DNS zone will newly be registered How to Register DNS Zone 1. Click the icon + at the upper right on the DNS zone list screen. 2. Enter appropriate information as below and click Next. Figure 130 Registration 104

116 DNS Zone Name Description 3. Check the setting details you have entered so far on the confirmation screen. If there is no problem, click Create. Figure 131 Confirmation of Setting Details 4. If DNS zone registration authentication confirmation dialogue is displayed after it is created, follow the displayed contents and register DNS zone again. The registered DNS zone information and name server information can be confirmed using API execution function or API. 105

117 19.3 Record List You can move to this screen by selecting Record Management in the pull-down menu of Action in the DNS zone you want to edit on the DNS zone list screen. Figure 132 Record List Table 33 Displayed Contents of Record List Table No. Item Name Displayed Contents 1 Record Name Record Name 2 Type NS / A / AAAA / CNAME / MX / TXT / LBR 3 Value Value 4 TTL TTL Value 5 Policy None / Fail Over / Weighting 6 Action Various Operations for Record 106

118 About Operation Figure 133 Record List Action The below items will be provided as the operations of Record List. Setting Refer to 19.6 Editing Records. Delete Please refer to 19.7 Record Deletion Record Details You can open record details by clicking the record name of Record List. You can check the detailed information that is not displayed on the record list. Figure 134 Record Details (if policy is none ) 107

119 Figure 135 Record Details (if policy is weighting ) Figure 136 Record Details (if policy is fail-over ) 108

120 Table 34 Displayed Contents of Record Details Table No. Category Item Name Displayed Contents 1 Record Details DNS Zone DNS zone 2 Record Name Record Name 3 Type NS / A / AAAA / CNAME / MX / TXT / LBR 4 TTL TTL Value 5 Value Value 6 Description Description of Records 7 Policy None/Fail-Over/Weighting 8 Weight Weight Weighting Value 9 Failover Failover PRIMARY / SECONDARY 10 Health Check Preference IP Address Health Check Destination IP Address 11 (If failover is selected) Port Health Check Destination Port 12 Protocol HTTP / HTTPS / TCP 13 Health Check Health Check Path Path 14 Health Check Destination Domain Name Health Check Destination Domain Name 19.5 Record Registration Records can newly be registered How to register records 1 Click the icon + at the upper right on the Record List screen. 2 Enter appropriate information as below and click Next. If type A or AAAA is selected, enter appropriate information on the below screen. 109

121 Figure 137 Create Record (Record Information : If type A) Record Name TTL Value (Usable IPv4 address if type A, and Usable IPv4 address if type AAAA ) Description Policy (No/Failover/Weight Settings) Details of Failover (If failover is selected in policy) Figure 138 Record Information (Fail-over details) Failover (PRIMARY / SECONDARY) Health Check Setting (Failover is selected in Policy) 110

122 Figure 139 Record Information (Health Check Setting) IP Port Protocol (HTTP / HTTPS / TCP) Health Check Path Health Check Destination Domain Name Weight Details (If Weight is selected in policy) Figure 140 Record Information (Weight Details) 111

123 Set the below information if type CNAME or NS is selected. Figure 141 Record Registration (Record Information: type CNAME) Record Name TTL Value Description Set the below if type MX is selected. Figure 142 Record Registration (Record Information: type MX) 112

124 Record Name TTL Value (priority and host are half-width space separated when specified) Description Set the below if type LBR is selected. Figure 143 Record Registration (Record Information: if type LBR) Record Name Default Host Value (Area and host are half-width separated) Description 3 You can check the setting details you have entered so far on the confirmation screen. If there is no problem, click Create. 113

125 Figure 144 Record Registration (Confirmation) 19.6 Editing Records You can edit the details of registered records How to edit records 1. On the Record List scree, click Edit from the pull-down menu of the record you want to edit. Figure 145 Record List (Edition) 2. You can edit the below information on the record edition screen. Depending on the type you selected, the items to be edited are changed. Please refer to for the edition items of each type. 114

126 Figure 146 Record Edition 3. Click Update after edited Record Deletion You can delete the registered records How to delete records 1. On the record list screen, click Delete by selecting from the pull-down menu of the record you want to delete. Figure 147 Record List (Delete) 2. Click Delete button if there is no problem after you have checked the deletion details. 115

127 Figure 148 Confirmation of Deletion 19.8 DNS Zone Deletion You can delete the registered DNS zone How to delete DNS zone 1 On the DNS zone list screen, click DNS Zone Deletion, selecting from the pull-down menu of the DNS zone to be deleted. Figure 149 DNS Zone List (DNS Zone Deletion) 2 Click Delete button if there is no problem after you have checked deletion details. Figure 150 Confirmation of Deletion 116

128 Chapter 20 VPN Service 20.1 Function Overview This function provides an SSL-VPN connection function for secure connections to virtual environments created on the K5 system. This enables safe access from client terminals to virtual servers on K5 using SSL-VPN. The following functions are provided. Creation of VPN services Creation of SSL-VPN Connections 20.2 Usage Method of SSL-VPN Connections Preparations are necessary to use SSL-VPN connections. The flow from preparation to creation of an SSL-VPN connection is indicated below. Figure 151 Flow of VPN Environment Configuration 117

129 (1) Preparation (Required) To create a VPN service, the preparations indicated below, such as creation of a virtual router and changes to settings, are necessary. 1.1 Create a Virtual Router Create a virtual router (Refer to Chapter 14 Virtual Router). 1.2 Configure the Gateway for the Virtual Router Configure the gateway for the created virtual router (Refer to 14.5 Gateway Settings). 1.3 Create a Virtual Network Create a virtual network (Refer to Chapter 13 Virtual Network). 1.4 Add an Interface to the Virtual Router From the Details window of the virtual router created in 1.1, add an interface. For the subnet, specify the subnet configured in 1.3. For the IP address, specify the last unused IP address in the subnet. (2) Configure a VPN Service After preparations are complete, create a VPN service and an SSL-VPN connection. 2.1 Create a VPN Service Press [Network] -> [VPN Service], and click the "+" button displayed on the VPN Service List window. Figure 152 Create VPN Service Window 118

130 The setting items necessary when creating a VPN service are given in the following table. Table 35 Entry Items for VPN Service Creation Item Setting Content AZ Select the same availability zone as that of the prepared virtual router. * Selection of a virtual router becomes possible after an AZ is selected. Virtual Router Name Select the virtual router created in 1.1. * Specification of a Subnet Name becomes possible after a virtual router is selected. Subnet Name Select the subnet configured in 1.3. VPN Service Name Enter the name of the VPN service. Description Enter the description of the VPN service. Management State Select "true" or "false" (The default value is "true"). After the VPN service is created, it will be displayed in the VPN Service List window. Figure 153 VPN Service List Window 119

131 2.2 Create an SSL-VPN Connection SSL-VPN connections can be created from the VPN Service Detail window. Figure 154 VPN Service Detail Window The setting items necessary when creating an SSL-VPN connection are as follows. Table 36 Entry Items for SSL-VPN Connections Item Setting Content SSL-VPN connection name Enter the name for the SSL-VPN connection. Protocol Select "TCP" or "UDP" (The default value is "TCP"). Management State Select "true" or "false" (The default value is "true"). Credential Select the credential to use (The default value is the K5 credential). * When using a credential other than the K5 credential, register the credential in advance. Security Group Check the box of the security group to be used. * The number of security groups that can be registered is 6 or less. Global IP Select the global IP to be used. Client IP pool Configure the client IP pool in CIDR format (For example: /24). 120

132 Click the add SSL-VPN connection icon and enter the items on each window. Finally, click "Create" to create the SSL-VPN connection. Figure 155 Create SSL-VPN Connection Window 121

133 (3) Firewall Setting (Optional) The setting of firewall rules is optional. Setting of firewall rules is recommended in order to enable safe connections with configured virtual environments. 3.1 Create a Firewall Rule Create a firewall rule (Refer to Chapter 17 Firewall). 3.2 Create a Firewall Policy Create a firewall policy that applies the created firewall rules. 3.3 Create a Firewall Create a firewall (Refer to Chapter 17 Firewall). 3.4 When creating a firewall, select the firewall policy and virtual router Advisory Notes When creating an SSL-VPN connection, if using a credential other than the K5 credential, register that credential with the API in advance (Refer to the K5 IaaS Features Handbook and the K5 IaaS API Reference - Management Administration). After creating an SSL-VPN connection, connect to the target virtual server using an OpenVPN client, etc. For the installation method for an OpenVPN client, refer to the "K5 IaaS Features Handbook". 122

134 Chapter 21 Database Virtual Server 21.1 Database Virtual Server List You can check the list and status of the database virtual server created in project. Figure 156 Database Virtual Server List Table 37 Displayed Contents of Database Virtual Server List Table No. Item Name Displayed Contents 1 Database Virtual Server Database Virtual Server Name Name 2 Status Refer to Table 38 Database Virtual Server Status 3 Action Various Operations for database virtual server Table 38 Database Virtual Server Status No. Status Description 1 Active SQL Statement Receiving State 2 Backup Back-up Status 3 Build DB Virtual Server Creating Status 4 Failed State where POST/PUT API execution has failed 5 Error Illegal state 123

135 6 Deleted State where DB Virtual Server has already been deleted but the snapshot linked to the virtual server exists 7 Reboot Start-up State 8 Resize State where data volume is being resized 9 Modifying State where an attribute is being changed 10 Restart_Required State where restart is required 11 Degenerated State where one DB virtual server is in degenerate operation 12 Switched State where original server is switched with duplicate one due to DB fail-over About Operation Figure 157 Database Virtual Server List Action See below for the operations of database virtual server list. 1. Start Refer to Stop Refer to

136 3. Reboot Refer to Delete Refer to Show Parameters Refer to Show Database Logs Refer to 21.9 and Database Virtual Server Creation Database Virtual Server is newly created How to create database virtual server 1. Click the icon + at the upper right on the Database Virtual Server List screen. 2. Enter the appropriate information as below and click Next Page. Figure 158 Database Virtual Server Information Database Virtual Server Name Database Master User Name Database Master Password Database Master Password Confirmation 125

137 Data Disk Size (GB) Backup Retention Period (Days) If you select Set, you need to set the following information. Figure 159 Backup Retention Period Number of Days for Backup Retention (1 to 10 days) Redundancy (Enabled/Disabled) Description 3. Enter the appropriate information as below and click Next Page. Figure 160 Flavor Type Flavor Type 126

138 4. Enter the appropriate information as below and click Next Page. Figure 161 DB Subnet Group DB Subnet Group 5. Enter the appropriate information as below and click Next Page. Figure 162 Security Group Security Group 6. You can check the setting details you have entered so far on the confirmation screen. If there is no problem, click Create. (*1) 127

139 Figure 163 Confirmation for Setting Contents *1 Automatically generated parameters, which is displayed on the confirmation screen for database creation, is automatically set from recommended value of database engine. 128

140 Table 39 Contents of Automatically generated parameters No. Item Name Displayed Contents 1 shared_buffers Buffer size which is about 20% of the memory size of selected flavor. 2 effective_cache_size Cache size which is about 50% of the memory size of selected flavor. 3 log_line_prefix Log format for the database log Database Virtual Server Details You can open the database virtual server details by clicking the database virtual server name of database virtual server list. The detailed information not displayed on the database virtual server list can be checked. Figure 164 Database Virtual Server Details (Database Virtual Server Information) 129

141 Figure 165 Database Virtual Server Details (Flavor Type Network Information) Figure 166 Database Virtual Server Details (Database Information) 130

142 Figure 167 Database Virtual Server Details (Database Operation Information) Figure 168 Database Virtual Server Details (Parameters to be changed at the time of next reboot) Table 40 Displayed Contents of Database Virtual Server Details No. Category Item Name Displayed Contents 1 Database Virtual Server Details ID Database Virtual Server ID 2 Database Virtual Server Name Database Virtual Server Name 3 Status Table 32 Database Virtual Server Status 131

143 4 Creation Time Created Date and Time 5 Update Time Update Date and Time 6 Data Storage Size Data Storage Size 7 Data Storage Type Data Storage Type 8 Availability Zone of Master Running Availability Zone where the main server is starting up 9 Redundancy true / false 10 Multi AZ Option true / false 11 Associated Read Linked Read Replica Replica 12 Original ID of Read Replica Replication Source Database Virtual Server ID 13 Availability Zone of Slave Running Availability Zone where duplicate server is starting up 14 Status of Read Status of Read Replica Replica 15 Security Group Security Group 16 Description Description 17 Flavor Type Flavor ID Flavor ID 18 Network Internal FQDN Internal FQDN 19 Information External FQDN External FQDN 20 Internal IP Address IP Address 21 Global IP Address Global IP Address 22 Connectable from true / false Internet 23 DB Subnet Group Subnet Group 24 Database Port Number Port Number 25 Information DB Encoding Database Encoding 26 DB Collation Order Checking Flow 27 DB Type Type 28 DB Version Version 132

144 29 Database Master User Name Database Management User Name 30 DB Parameter Group DB Parameter Group ID ID 31 Database Automatic application true / false 32 Operation Information of minor version up Backup Retention Period Number of Days for Backup Storage 33 Backup Retention Backup Time Range Period 34 Time Zone of Maintenance Time Range Backups 35 Recover Redundancy true / false Immediately 36 Automatic Recovery of Redundancy Start Automatic Recovery Start Time At 37 Parameters to be Data Storage Size Data Storage Size 38 changed when Data Storage Type Data Storage Type 39 next rebooting Backup Retention Period Number of Days for Backup Storage 40 Flavor ID Flavor ID 41 ID Database Virtual Server ID 42 Name Database Virtual Server Name 43 DB Parameter Group DB Parameter Group ID ID 44 DB Version Database Version 45 Database Master User Name Database Management User Name 46 Database Master Password Database Management Password 47 Multi DB Option true / false 48 Multi AZ Option true / false 133

145 49 Port Number Port Number 21.4 Database Virtual Server Startup You can start up Database Virtual Server How to start up Database Virtual Server 1. On the Database Virtual Server List screen, click Start selecting from the pull-down menu of the database virtual server that is starting up. Figure 169 Database Virtual Server List (Start) 2. If you check the start-up status and there is no problem, click Start button. Figure 170 Start-up Check 134

146 21.5 Database Virtual Server Stop You can stop the database virtual server How to stop database virtual server 1. On the database virtual server list screen, click Stop selecting from the pull-down menu of the database virtual server that you want to stop. Figure 171 Database Virtual Server List (Stop) 2. If you check the stop status and there is no problem, click Stop button. Figure 172 Stop Check 21.6 Database Virtual Server Reboot You can reboot the database virtual server. 135

147 How to reboot the database virtual server 1. On the database virtual server list screen, click Reboot selecting from the pull-down menu of the database virtual server that you want to reboot. Figure 173 Database Virtual Server List (Reboot) 2. If you check reboot status and there is no problem, click Reboot button. Figure 174 Reboot Check 21.7 Database Virtual Server Deletion You can delete the database virtual server How to delete the database virtual server 1. On the database virtual server list screen, click Delete selecting from the pull-down menu of the database virtual server that you want to delete. 136

148 Figure 175 Database Virtual Server List (Deletion) 2. If you check the deletion status and there is no problem, click Delete button. Figure 176 Deletion Check 21.8 DB Parameter Group Details You can check the details of DB parameter group How to Check DB Parameter Group 1. On the database virtual server list screen, click Show Parameters selecting from the pull-down menu of DB parameter group check. 137

149 Figure 177 Database Virtual Server List (Show Parameters) 2. DB Parameter Group Details screen is open. You can check the detailed information on DB parameter group. Figure 178 DB Parameter Group Details (Show Parameters) Figure 179 DB Parameter Group Details (Parameter Details) 138

150 Table 41 Displayed Contents of DB Parameter Group Details No. Category Item Name Displayed Contents 1 DB Parameter Group DB Parameter Group Name DB Parameter Group Name 2 DB Parameter Group ID DB Parameter Group ID 3 Parameter Group Details Parameter Name Parameter Name 4 DB Parameter Name DB Parameter Values 21.9 Database Log List You can check the database log list. Figure 180 Database Log List How to see log 1. On the database virtual server list screen, click Show Database Logs selecting from the pull-down menu of the database in which you want to see log. Figure 181 Database Virtual Server List (Show Database Logs) 139

151 21.10 Database Log Details Click the log file name of database log list to open database log details. You can check the detailed information which is not displayed on the database log list. Figure 182 Database log details Table 42 Displayed Contents of Relational Database Log Details No. Item Name Displayed Contents 1 Log File Name Log File Name 2 Log Log 140

152 Chapter 22 Stack 22.1 Stack List You can check a list and status of a stack created in a project. Figure 183 Stack List Table 43 Stack List Table No. Item Name Description 1 Stack name Name of a stack 2 Description Description of a stack 3 Stack ID ID to identify a stack in unique 4 Status Status of a stack 5 Action Various operations on a stack 141

153 22.2 Stack Details You can check a list and status of a stack created in a project. Figure 184 Stack Details Table 44 Stack Details Table No. Classification Item Name Description 1 Information Description Description of a stack 2 Status Status 3 Date and time of Date and time of creation creation 4 Timeout Timeout (minutes) 5 Resource Behavior at creation failure deletion at stack creation failure 6 Template Name Key 7 parameter Value Value corresponding to the key 142

154 22.3 Create Stack How to Create Stack 1. Click an icon on Virtual Server List window.. 2. Set the following and click "CREATE". Figure 185 Create Stack Stack Name How to Specify Template If you select "URL", specify the following. URL If you select "File", specify the following. Drop a configuration file in "File". If you select "YAML", specify the following. YAML Timeout ( minutes ) Resource deletion at stack creation failure (Delete or not) 143

155 22.4 Edit Stack You can edit the created stack. Figure 186 Edit Stack You can edit the following. Click "UPDATE" after editing. How to Specify Templates Timeout Parameter 144

156 Chapter 23 Monitoring 23.1 Monitoring Target Resource List Monitoring Target Resource List is displayed. Figure 187 Monitoring Target Resource List Table 45 Displayed Contents of Monitoring Target Resource List Table No. Item Name Displayed Contents 1 Resource Resource Name 2 Resource ID Resource ID 3 AZ Availability Zone How to display target resource list 1. On the Monitoring Target Resource List screen, select the menu from the pull-down menu of the audit menu. Figure 188 Monitoring Target Resource List (Audit Item Sorting : Audit Menu) 145

157 Audit Menu Compute Storage Database Network Custom 2. Select the resource from the pull-down menu of the target resource. *By selecting any of the Audit Menu items, items are displayed in the pull-down menu of Target Resource. The target resource that corresponds to the Audit Menu is as follows. Figure 189 Monitoring Target Resource List (Audit Item Sorting : Target Resource) Target Resource if compute is selected Virtual Server Image Target Resource if storage is selected Block Storage Object Storage Target Resource if database is selected Database Target Resource if network is selected Port Global IP Load Balancer Target Resource if Custom is selected Custom Audit 3. Resource List is displayed. 146

158 Figure 190 Monitoring Target Resource List (After Audit Item Sorting) 23.2 Resource Audit Information By clicking the resource name of the resource displayed on the Monitoring Target Resource List, you can open the resource audit information screen. Here you can check the detailed information not displayed on the target resource list. Figure 191 Resource Audit Information (Resource Information) Figure 192 Resource Audit Information (Graph) 147

159 Figure 193 Resource Audit Information (Sample Statistical Value) Table 46 Displayed Contents of Resource Audit Information No. Category Item Name Displayed Contents 1 Resource Information Resource Resource Name 2 Resource ID Resource ID 3 Graph Meter Refer to Line Chart 5 Sample Statistical Value Minimum Value Minimum Value of Statistical Value 6 Maximum Value Maximum Value of Statistical Value 7 Average Value Average Value of Statistical Value 23.3 Graph The graph with the horizontal axis being time and vertical axis being sample values is displayed How to change the displayed content of the graph From the pull-down menu of Meter of the resource audit information, select the meter for which you want to display a graph. 148

160 Figure 194 Resource Audit Information (Graph : Meter) Graph Operation If you move a cursor to a graph, the details of each time range (date, time, and sample values) are displayed. Figure 195 Resource Audit Information (Graph Details) If you move the mouse wheel upwards on the graph you can zoom in, and when you move the mouse wheel downwards it will zoom out. 149

161 Chapter 24 Alarm 24.1 Alarm List You can check the list and status of the alarm created in project. Figure 196 Alarm List Table 47 Displayed Contents of Alarm List Table No. Item Name Displayed Contents 1 Alarm Name Alarm Name 2 Type threshold / combination 3 Enable/Disable true / false 4 Status ok / insufficient data / alarm 5 Action Various Operations for Alarm 150

162 About Operations Figure 197 Alarm List Action The below are provided as the alarm list operations. 1. Update Refer to 24.4 Action setting. 2. History Refer to 24.5 History of Alarm. 3. Delete Refer to 24.6 Alarm Deletion Alarm Creation An alarm can newly be created How to create an alarm 1. Set the below information and click Next Page. 2. Set the below information and click Next Page. Figure 198 Alarm Type Alarm Type (threshold / combination) 151

163 3. Set the below information and click Next. Figure 199 Alarm Details Alarm Name Enable/Disable How to Execute Action (Rerun / Do Not Rerun) Description 4. Set the below information and click Next. If Alarm Type threshold is selected Figure 200 Audit Item Audit Item Click Set button and a pop-up window will be displayed. The below information should be set. 152

164 Figure 201 Audit Item Setting Resource Type Virtual Server Database Global IP Virtual Network Virtual Router Load Balancer Threshold Figure 202 Audit Item (Threshold) Threshold Operator for comparing threshold and sampling value (equal/larger than/equal to or larger than/smaller than/equal to or smaller than) 153

165 Threshold Evaluation Interval (sec) Number of Threshold Evaluation Repeats Statistics for comparing with threshold (Average Value/Number of Samples/Maximum Value/Minimum Value/Total Value) Treatment of data point when the number of samples is abnormally small (Exclude/Does not exclude) Query If you click Add Query button, a pop-up window will be displayed. Please set appropriate information. Figure 203 Alarm Creation (Add Query) Figure 204 Add Query Field Name (Project Name/User Name) Relative Operator (equal/larger than/equal to or larger than/smaller than/equal to or smaller than) Value If an alarm type combination is selected How to evaluate a combination (AND condition / OR condition) 154

166 Figure 205 Alarm Selection (How to evaluate a combination) Alarm List for Combination If you click Add alarm button, a pop-up window will be displayed. Please set the below information. Figure 206 Alarm Selection (Alarm List for combination) Figure 207 Add alarm Alarm to add 155

167 5. Please set the appropriate information and click Next. Figure 208 Alarm Evaluation Schedule (No setting) To be set no matter whether the alarm type threshold or combination is selected Setting/No Setting If setting is selected, evaluation schedule can be added. If you click Add evaluation schedule button, a pop-up window will be displayed. Set the below information. Figure 209 Alarm Evaluation Schedule (Set) 156

168 Figure 210 Add evaluation schedule Basic Setting Setting name Description Start Date If you select Monthly, set the below information. 157

169 Figure 211 Start Date and Time (Monthly) Day Hour minutes Monitoring period (sec) Time Zone If Weekly is selected, set the below information. 158

170 Figure 212 Start Date (Weekly) WEEK Hour minutes Monitoring period (sec) Time Zone If you select Daily, set the below information. Figure 213 Start Date and Time (Every Day) Hour Minute Monitoring period (sec) Time Zone If Hourly is selected, set the below. 159

171 Figure 214 Start Date and Time (Every Hour) minutes Monitoring period (sec) Time Zone If cron is selected, set the below. Figure 215 Start Date and Time (cron) CRON format Monitoring period (sec) Time Zone 160

172 6. Set the below information and click the Next. Figure 216 Action Setting (No Setting) To be set no matter whether the alarm type threshold or combination is selected Setting / No Setting If you select Set, you can add Action at alarm, Action at OK, What to do when sufficient data is not collected. If you click Add action button, a pop-up window will be displayed. Please set the below. Figure 217 Action Setting (Set) 161

173 Figure 218 Add action at alarm Service (compute / mail) If you select compute, set the below. Figure 219 Add action at alarm(compute) Parameter 1 Parameter 2 Figure 220 Add Action when OK 162

174 Service(compute / mail) If you select compute, set the below. Figure 221 Add Action when OK (compute) Parameter 1 Parameter 2 Figure 222 Add Action when data is lacking Service(compute / mail) If you select compute, set the below. 163

175 Figure 223 Add Action when data is lacking (compute) Parameter 1 Parameter 2 7. The setting contents you have entered so far can be checked on the confirmation screen. If there is no problem, click create. Figure 224 Create Alarm 164

176 24.3 Alarm Details If you click the alarm name of alarm list, you can open the alarm details. The detailed information not displayed on alarm list can be checked. Figure 225 Alarm Details (Alarm Type and Alarm Details) Figure 226 Alarm Details (Monitoring Item and Threshold) 165

177 Figure 227 Alarm Details (Query and Alarm evaluation schedule) Figure 228 Alarm Details (Select alarm and Alarm evaluation schedule) Figure 229 Alarm Details (Action at alarm, Action at OK, and What to do when sufficient data is not collected) 166

178 Table 48 Displayed Contents of Alarm Details No. Category Item Name Displayed Contents 1 Alarm Type Alarm Type threshold / combination 2 Alarm Details Alarm Name Alarm Name 3 Resource ID Resource ID 4 Enable/Disable true / false 5 How to Execute true / false Action 6 Description Alarm Description 7 Monitoring Item Monitoring Item Monitoring Item 8 Threshold Threshold Threshold 9 Operator for comparing threshold and sampling value equal/larger than/equal to or larger than/smaller than/equal to or smaller than 10 Threshold Number of seconds Evaluation Interval 11 Number of Threshold Number of Threshold Evaluation Repeats Evaluation Repeats 12 Statistics for comparing with threshold Average value/number of samples/maximum value/minimum value/total value 13 Treatment of data point when the Exclude/Does not exclude number of samples is abnormally small 14 Query Field Name Project Name/User Name 15 Relative Operator equal/larger than/equal to or larger than/smaller than/equal to or smaller than 16 Value Value 167

179 17 Select alarm Condition of combination AND condition / OR condition 18 Alarm Name Names of alarm to be evaluated in the combination 19 Alarm Type Type of each alarm: threshold / combination 20 Enable / Disable True / false 21 Status The latest status of each alarm: ok / insufficient data / alarm 22 Alarm evaluation Setting name Setting name 23 schedule Start Date Start Date 24 Monitoring period Number of seconds (sec) 25 Time Zone Time Zone 26 Description Description of Alarm evaluation schedule 27 Action at alarm Service compute / mail 28 Parameter 1 Parameter 1 29 Parameter 2 Parameter 2 30 Action at OK Service compute / mail 31 Parameter 1 Parameter 1 32 Parameter 2 Parameter 2 33 What to do when Service compute / mail 34 sufficient data is not Parameter 1 Parameter 1 35 collected Parameter 2 Parameter 2 168

180 24.4 Action setting You can edit the created alarm How to set an alarm 1. On the alarm list screen, click Update selecting from the pull-down menu of the alarm you want to edit. Figure 230 Alarm List (setting) 2. On the alarm setting screen, you can set the below. Items to be edited change depending on the alarm type you selected. Please refer to 20.2 for the items to be edited of each type. Figure 231 Alarm Setting (Alarm type and alarm details) Alarm Type (threshold / combination) Alarm Name Resource ID Enable/Disable How to Execute Action (Rerun / Do Not Rerun) Description 169

181 Figure 232 Alarm Setting (Monitoring Item and threshold) Figure 233 Alarm Setting (Query) Alarm Type (if threshold is selected) Monitoring Item Threshold Operator for comparing threshold and sampling value (equal/larger than/equal to or larger than/smaller than/equal to or smaller than) Threshold Evaluation Interval (sec) Number of Threshold Evaluation Repeats Statistics for comparing with threshold Treatment of data point when the number of samples is abnormally small (Exclude / Not Exclude) Query 170

182 Figure 234 Alarm Setting (Select alarm) If an alarm type combination is selected Select alarm (And / Or) Combination alarm list Figure 235 Alarm Setting (Alarm evaluation schedule) To be set no matter whether alarm type threshold or combination is selected Set/Not Set Figure 236 Alarm Setting (Action setting) To be set no matter whether alarm type threshold or combination is selected Set/Not Set 171

183 Figure 237 Alarm Setting (Action at alarm, Action at OK, What to do when sufficient data is not collected) To be set no matter whether alarm type threshold or combination is selected Action at alarm Action at OK What to do when sufficient data is not collected 3. Click Update after edition. 172

184 24.5 History of Alarm The alarm history is displayed. Figure 238 History of Alarm Table 49 Displayed Contents of Alarm History No. Item Name Displayed Contents 1 Alarm Name Alarm Name 2 Filtering conditions See Date and time Alarm date and time 4 Alarm Type creation / rule change / state transition / deletion / action 5 Description Description of Alarm How to display the history of alarm 1. Click history of the pull-down menu of the alarm that displays the history of alarm on the Alarm List screen. Figure 239 Alarm List (History) 173

185 2. Set the below information under the filtering conditions on the alarm history screen, and click View button. Figure 240 History of Alarm (Filtering Conditions time stamp ) If a time stamp is selected, set the below. Start Date Click next to the text form of Start Date and select a date. Figure 241 Time Stamp (Start Date) End date Click next to the text form of Start Date and select a date. 174

186 Figure 242 Time Stamp (End date) If alarm type is selected, set the below. Figure 243 History of Alarm (Filtering conditions alarm type ) Alarm Type creation rule change state transition deletion action 175

187 24.6 Alarm Deletion You can delete an alarm. On the alarm list screen, click Delete of the pulldown menu of the action of the alarm that will be deleted How to delete an alarm 1. On the alarm list screen, click delete of the pull-down menu of the alarm that will be deleted. Figure 244 Alarm List (Deletion) 2. Click delete button if there is no problem after you have checked the contents to be deleted. Figure 245 Deletion of Alarm 176

188 Chapter 25 Operation Log 25.1 Function Overview This function provides the functionality for checking the history of operations performed on the IaaS service portal. The history of operations performed in the last three days can be referred to. The following functions are provided. List Display of Operation Logs Search function Select a period from the last three days to filter the displayed operation log. The displayed items are those listed in Table 50. Clicking a displayed request ID displays the details of the relevant operation log. - Specifiable range of date and time to search: The last three days - Amount of operation logs displayable at once: One day's worth - Date and time specification format: UTC time Export function The list information of displayed operation logs can be output in csv format. - File format: csv Detailed Display of Operation Logs Clicking a specific request ID in the list of the operation log displays the detailed information indicated in Table 50. This enables checking of API request parameters and response bodies. 177

189 The items displayed in the Operation Log List Display screen and the Detailed Display screen is indicated below. Table 50 Operation Log Display Items (List Display and Detailed Display) Item Description List Display Detailed Display Operation time The time the request was sent Yes Yes (UTC) from the screen Session ID The ID that indicates the Yes Yes uniqueness of the browser Request ID The ID assigned to the request Yes Yes sent from the screen Screen name The name of the screen that sent Yes Yes the request Operation The sent request Yes Yes Status code The HTTP status code Yes Yes corresponding to the request User name The user that executed the Yes Yes request HTTP request The content of the sent request No Yes HTTP response The body of the response to the No Yes request Yes: Displayed No: Not displayed 178

190 25.2 Usage Method of Operation Logs 1. List Display of Operation Logs Enter the date and time to use as the search scope (in UTC time), and then click the "Search" button. The operation log for the specified search scope is displayed. To save the search results, click the "Export" button to save the results as a file in csv format. Figure 246 Operation Log List Screen 2. Detailed Display of Operation Logs To check the details of an operation log, click the Request ID. 179

191 25.3 Advisory Notes Figure 247 Operation Log Details Screen This function cannot store operation logs covering long periods of time. If you need to store logs covering long periods of time, regularly export the operation log. The export function for the operation log only outputs the list information. The detailed information of the Operation log cannot be output. When specifying a time in a search of the operation log, searches are performed using times rounded down to the nearest 5-minute interval. For example: 12:09 will be handled as 12:05. The details of operations are recorded in the operation log, but it may take some time until it is possible to search them. 180

192 Chapter 26 API Execution 26.1 Function Overview This function is for executing APIs from the IaaS Service Portal and displaying the response results on the portal. It can be used when executing functions not provided by the IaaS Service Portal, or when there is no environment for executing APIs using the command line. Note: This function is not guaranteed to work with all APIs. If it does not work correctly, please use the API. Refer to the following URL for the API Reference Usage Example This chapter explains examples of the following two methods That can be executed using APIs. For other methods, use them after referring to the API Reference. GET method : An example of virtual server list acquisition is explained. POST method : An example of virtual server creation is explained Information Necessary for API Execution The following information is necessary on the API execution window. The example explains the methods for confirming and setting this information. 181

193 Table 51 Information Necessary for API Execution Item Description Required / Optional Region Select the region to execute the API in. A specific Required region or Global can be selected. HTTP Method Select the HTTP method to be used when Required executing the API. Endpoint Select the component to use for API execution. Required Refer to Endpoint List. URI Refer to the "API Reference", and then enter the Required URI. Query Parameters Enter the Key and Value of the query. Optional Refer to the "API Reference", and then enter the Key and Value. HTTP Header Enter the key and value of the HTTP header. Optional Request Body Enter the HTTP request body. Optional Endpoint List The endpoints available when a specific region and Global is selected are different. Refer to the tables below for details and then specify the endpoint. Table 52 Endpoint List (Regional Service) Endpoint Service Name Note autoscale Auto-Scaling blockstoragev2 Block Storage compute Compute (Standard Service) compute-b Compute (Service for SAP HANA) Only available with SAP HANA contracts compute-w Compute (Service for SAP) database Database dns DNS Service identityv3 Regional User Management image Image Management import-export Virtual Server Import and Export keymanagement Key Management loadbalancing Load Balancer 182

194 networking Virtual Network networking-ex Virtual Network Expansion objectstorage Object Storage orchestration Template Management (Orchestration) software Software Management telemetry Monitoring appmanagement Application Management blockstorage Block Storage certificate Certificate Management Not available contract Regional Contract Management identity Regional User Management queue Queue Management vmimport Virtual Server Import global-identity Global User Management Not available * When using globalidentity, use the endpoint of Global Service. Note: Different endpoints are provided in each region. Table 53 Endpoint List (Global Service) Endpoint Name of Service Note global-billing Billing Management global-catalog Product Management global-cdn Content Delivery Service global-contract Contract Management global-identity User Management (Global) global-rolemanagement Role Management Not available Note: Different endpoints are provided in each region. 183

195 Example of Virtual Server List Acquisition This section explains the method for acquiring a list of the virtual servers in a project. TenantID /v2/ TenantID /servers Figure 248 Example of Entry on the API Execution Window 1. Select the region to execute the API in. You can select the currently selected region or Global. When acquiring a list of virtual servers, select the currently selected Region. For the relationship between regional and global services, refer to the "Features Handbook 1.2 Location Services". 2. Specify the HTTP method, the URI, query parameters, the HTTP header, and the request body. Search in the "API Reference - Foundation Service" for the explanation of the desired API (Refer to the figure below). Figure 249 Extract from API Reference - Foundation Service 184

196 As shown in Figure 249, set the following for the HTTP method. - HTTP Method: "GET" It is possible to specify changes since, image, flavor, name, status, and host in the Query Parameters, but this example filters the virtual servers to those with the status "ACTIVE". - Query Parameters Key : "status" Value : "ACTIVE" - HTTP Header: Setting is unnecessary - Request Body: Setting is unnecessary 3. Select the Endpoint Refer to Endpoint List and select the relevant endpoint. To acquire the list information of virtual servers, select "compute". 4. Execute the API After all of the necessary information has been entered, click the "Execute API" button. 5. Execution Results The execution results are displayed in the response field. Figure 250 API Response 185

197 Example of Virtual Server Creation This section explains the method for creating virtual servers in a project. TenantID /v2/ TenantID /servers Figure 251 Entry Example Figure 252 Response Example 186

198 1. Select the Region When creating a virtual server, select the currently selected Region. 2. Select the Endpoint As in the preceding Example of Virtual Server List Acquisition, select "compute". 3. Specify the HTTP Method, the URI, the Query Parameters, the HTTP Header, and the Request Body Search in the "API Reference - Foundation Service" for the explanation of the desired API (Refer to the figure below). Figure 253 Extract from API Reference - Foundation Service As shown in Figure 253, set the following for the HTTP method. - HTTP Method: "POST" - URI : "/v2/{tenant_id}/servers" - Query Parameters: Setting is unnecessary - HTTP Header: Setting is unnecessary - Request Body: Create the body referring to the following section in the API Reference. Remainder Figure 254 Extract from API Reference - Foundation Service 187

199 Figure 255 Example of Request Body Creation 4. Execute the API After all of the necessary information has been entered, click the "Execute API" button. 5. Execution Results 6. The execution results are displayed in the response field. 188

200 Figure 256 API Response 189

201 Chapter 27 VM Import and Export 27.1 Function Overview This function provides the functions (VM import and export) for importing and exporting virtual server images (vmdk format) that are stored on object storage to and from the K5 service. For details on the environment settings necessary for VM import and export, refer to "Virtual Server Import" and "Virtual Server Export" in the "IaaS Features Handbook". The OSs supported by VM import and export are as follows. VM import and export only support the following OSs: Windows Server 2008 R2 SE Windows Server 2008 R2 EE Windows Server 2012 SE Windows Server 2012 R2 SE Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Ubuntu 190

202 27.2 Usage Example This section explains execution examples of the following: VM Import VM Export : Explains an example of import of a virtual server image. : Explains an example of export of a virtual server image VM Import This section explains the confirmation and setting methods for VM import. 1. Display the VM Import List window Clicking [Import / Export] -> [VM Import] displays the VM Import List window. Using this window it is possible to refer to the import status of each image that has been imported. Clicking the "Import" button on the VM Import List window displays the VM Import window. There are four types of VM import status: succeeded failed processing queued Figure 257 VM Import List Window 2. Information necessary for VM import After entering each item on the VM Import window, click the "Import" button and Import the image. 191

203 Figure 258 VM Import Window The following table indicates the items necessary for VM import. Table 54 VM Import Window Display Items No. Item Description Required/ Optional 1 Image Name Enter the image name. Required 2 Container Name Select the name of the container to import. *When there are no containers, transfer to the Create Container window using the text link, and then create a container. Refer to Create a Container. 3 Object Name Select the name of the object to import. *When there are no objects, transfer to the Create Object window using the text link, and then create an object. Refer to Create an Object. 4 OS Type Select the OS type. 5 Check Sum (SHA1) * Specify an OS type that matches that of the OS to be imported. Enter the value of the check sum. Required Required Required Optional 6 Min Disk Enter the minimum disk value. Optional 7 Min RAM Enter the minimum RAM value. Optional 192

204 3. Check from the VM Import Detail window Clicking the desired image name on the VM Import List window displays the VM Import Detail window. You can refer to detailed information such as object pass, etc. Figure 259 VM Import Detail Window 193

205 VM Export This section explains the confirmation and setting methods for VM export. 1. Display the VM Export List window Clicking [Import / Export] -> [VM Export] displays the VM Export List window. Using this window it is possible to refer to the export status of each image that has been exported. Clicking the "Export" button on the VM Export List window displays the VM Export window. There are six types of VM export status: succeeded failed processing queued cancelling canceled Figure 260 VM Export List Window 194

206 2. Information necessary for VM export After entering each item on the VM Export window, click the "Export" button and export the image. Figure 261 VM Export Window The following table indicates the items necessary for VM export. Table 55 VM Export Window Display Items No. Item Description Required/ Optional 1 Image Name Enter the image name. Required 2 Container Name of Object Storage Select the container name of the object storage where exported image files will be stored. *When there are no containers, transfer to the Create Container window using the text link, and then create a container. Refer to Create a Container. Required 195

207 3. Check from the VM Export Detail window Clicking the desired image name on the VM Export List window displays the VM Export Detail window. You can refer to detailed information such as container pass, etc. Figure 262 VM Export Detail Window 27.3 Advisory Notes The retention period of the status of VM import and export processing is seven days from the completion of the VM import or VM export process. 196

Service Portal User Guide

Service Portal User Guide FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 1.4 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2016 K5IA-DC-M-005-001E Preface Purpose of This Manual This manual

More information

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 2.21 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 2.21 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED FUJITSU Cloud Service K5 IaaS Features Handbook Version 2.21 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2018 K5IA-DC-M-004-016E Preface Purpose of This Manual This document explains

More information

K5 Portal User Guide

K5 Portal User Guide FUJITSU Cloud Service K5 K5 Portal User Guide Version 2.6 FUJITSU LIMITED Preface Purpose of This Document This guide describes the operating procedures for the services provided by FUJITSU Cloud Service

More information

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 1.8 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED

Features Handbook. FUJITSU Cloud Service K5 IaaS. Version 1.8 FUJITSU LIMITED. All Rights Reserved, Copyright FUJITSU LIMITED FUJITSU Cloud Service K5 IaaS Features Handbook Version 1.8 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2016 K5IA-DC-M-004-001E Preface Purpose of This Manual This document explains

More information

IaaS Integration Guide

IaaS Integration Guide FUJITSU Software Enterprise Service Catalog Manager V16.1.0 IaaS Integration Guide Windows(64) B1WS-1259-02ENZ0(00) September 2016 Preface Purpose of This Document This document explains the introduction

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

MasterScope Virtual DataCenter Automation Media v3.0

MasterScope Virtual DataCenter Automation Media v3.0 MasterScope Virtual DataCenter Automation Media v3.0 Release Memo 1st Edition June, 2016 NEC Corporation Disclaimer The copyrighted information noted in this document shall belong to NEC Corporation. Copying

More information

IBM Single Sign On for Bluemix Version December Identity Bridge Configuration topics

IBM Single Sign On for Bluemix Version December Identity Bridge Configuration topics IBM Single Sign On for Bluemix Version 2.0 28 December 2014 Identity Bridge Configuration topics IBM Single Sign On for Bluemix Version 2.0 28 December 2014 Identity Bridge Configuration topics ii IBM

More information

FUJITSU Cloud Service K5 SF Restrictions / Advisory Notes. Version 1.5 FUJITSU LIMITED

FUJITSU Cloud Service K5 SF Restrictions / Advisory Notes. Version 1.5 FUJITSU LIMITED Version 1.5 FUJITSU LIMITED Oct 27, 2016 Contents 1 Preface 2 1.1 Purpose of This Document.................................... 2 1.2 Intended Readers......................................... 2 1.3 Structure

More information

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3 Migration Guide B1FW-5958-06ENZ0(00) June 2013 Preface Purpose This manual describes how to upgrade to this version from the

More information

IaaS API Reference (Management Administration)

IaaS API Reference (Management Administration) FUJITSU Cloud Service K5 IaaS API Reference (Management Administration) Version 1.18 FUJITSU LIMITED All Rights Reserved, Copyright FUJITSU LIMITED 2015-2018 K5IA-DC-M-001-001E Preface Structure of the

More information

Red Hat Virtualization 4.2

Red Hat Virtualization 4.2 Red Hat Virtualization 4.2 Introduction to the VM Portal Accessing and Using the VM Portal Last Updated: 2018-07-30 Red Hat Virtualization 4.2 Introduction to the VM Portal Accessing and Using the VM

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA f Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017

FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017 FUJITSU Cloud Service K5 - IaaS Service Description February 15, 2017 1. General Overview The FUJITSU Cloud Service K5 is provided via a standardized platform and common architecture, which is deployed

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

This component of K5 IaaS provides a virtual infrastructure accessible via the Internet within which physical computers are divided using virtualizati

This component of K5 IaaS provides a virtual infrastructure accessible via the Internet within which physical computers are divided using virtualizati FUJITSU Cloud Service K5 - IaaS Service Description September 28, 2017 1. General Overview The FUJITSU Cloud Service K5 is provided via a standardized platform and common architecture, which is deployed

More information

MasterScope Virtual DataCenter Automation Media v5.0

MasterScope Virtual DataCenter Automation Media v5.0 MasterScope Virtual DataCenter Automation Media v5.0 Release Memo 1st Edition April, 2018 NEC Corporation Disclaimer The copyrighted information noted in this document shall belong to NEC Corporation.

More information

Red Hat OpenStack Platform 10 Product Guide

Red Hat OpenStack Platform 10 Product Guide Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team rhos-docs@redhat.com

More information

Fujitsu Global Cloud Platform Service Catalogue

Fujitsu Global Cloud Platform Service Catalogue Fujitsu Global Cloud Platform Service Catalogue Fujitsu Asia Pte Ltd V1.56 All Rights Reserved, Copyright FUJITSU ASIA PTE LTD 2011 1 V1.56 All Rights Reserved, Copyright FUJITSU ASIA PTE LTD 2011 Copyright

More information

Red Hat CloudForms 4.6

Red Hat CloudForms 4.6 Red Hat CloudForms 4.6 Managing Infrastructure and Inventory Viewing and collecting information from your clusters, hosts, virtual machines, and other resources Last Updated: 2018-06-12 Red Hat CloudForms

More information

Red Hat OpenStack Platform 9 Introduction to the OpenStack Dashboard

Red Hat OpenStack Platform 9 Introduction to the OpenStack Dashboard Red Hat OpenStack Platform 9 Introduction to the OpenStack Dashboard An overview of the OpenStack dashboard graphical user interface OpenStack Team Red Hat OpenStack Platform 9 Introduction to the OpenStack

More information

Red Hat CloudForms 4.2

Red Hat CloudForms 4.2 Red Hat CloudForms 4.2 Managing Infrastructure and Inventory Viewing and collecting information from your clusters, hosts, virtual machines, and other resources Last Updated: 2017-12-18 Red Hat CloudForms

More information

User's Guide - Master Schedule Management

User's Guide - Master Schedule Management FUJITSU Software Systemwalker Operation Manager User's Guide - Master Schedule Management UNIX/Windows(R) J2X1-3170-14ENZ0(00) May 2015 Preface Purpose of This Document This document describes the Master

More information

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1 Migration Guide B1FW-5958-03ENZ0(00) August 2012 Preface Purpose This manual describes how to upgrade to this version from the

More information

IBM Spectrum Protect Plus Version Installation and User's Guide IBM

IBM Spectrum Protect Plus Version Installation and User's Guide IBM IBM Spectrum Protect Plus Version 10.1.1 Installation and User's Guide IBM Note: Before you use this information and the product it supports, read the information in Notices on page 119. Third edition

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

Basic System Administration ESX Server and Virtual Center 2.0.1

Basic System Administration ESX Server and Virtual Center 2.0.1 ESX Server 3.0.1 and Virtual Center 2.0.1 Basic System Administration Revision: 2006105 Item: VI-ENG-Q306-293 You can find the most up-to-date technical documentation on our Web site at http://www.vmware.com/support/

More information

V iew Direct- Connection Plug-In. The Leostream Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds

V iew Direct- Connection Plug-In. The Leostream Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds V iew Direct- Connection Plug-In The Leostream Connection Broker Advanced Connection and Capacity Management for Hybrid Clouds Version 9.0 June 2018 f Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

vcenter CapacityIQ Installation Guide

vcenter CapacityIQ Installation Guide vcenter CapacityIQ 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

FUJITSU Software Systemwalker Software Configuration Manager. Release Notes. Windows/Linux

FUJITSU Software Systemwalker Software Configuration Manager. Release Notes. Windows/Linux FUJITSU Software Systemwalker Software Configuration Manager Release Notes B1X1-0125-05ENZ0(00) August 2014 Preface Purpose of this Document This document presents an overview of the functions that have

More information

vcenter CapacityIQ Installation Guide

vcenter CapacityIQ Installation Guide vcenter CapacityIQ 1.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Quick Start Using Leostream with Citrix XenDesktop 7 and HDX Version 8.1 January 14, 2016 Contacting

More information

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting

Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting Red Hat CloudForms 4.0 Monitoring, Alerts, and Reporting Creating and managing reports, feeds, and widgets in CloudForms Management Engine Red Hat CloudForms Documentation Team Red Hat CloudForms 4.0

More information

Fujitsu On-demand Virtual System Service Service Catalogue

Fujitsu On-demand Virtual System Service Service Catalogue Fujitsu On-demand Virtual System Service Service Catalogue Nov. 16 th, 2010 FUJITSU LIMITED 1 Service outline Fujitsu DC Provide the allocated private virtual system environment. Internet Resource pool

More information

Gateway Guide. Leostream Gateway. Advanced Capacity and Connection Management for Hybrid Clouds

Gateway Guide. Leostream Gateway. Advanced Capacity and Connection Management for Hybrid Clouds Gateway Guide Leostream Gateway Advanced Capacity and Connection Management for Hybrid Clouds Version 9.0 June 2018 Contacting Leostream Leostream Corporation 271 Waverley Oaks Rd Suite 206 Waltham, MA

More information

Clearswift Gateway Installation & Getting Started Guide. Version 4.1 Document Revision 1.4

Clearswift Gateway Installation & Getting Started Guide. Version 4.1 Document Revision 1.4 Clearswift Gateway Installation & Getting Started Guide Version 4.1 Document Revision 1.4 Copyright Revision 1.4, March, 2015 Published by Clearswift Ltd. 1995 2015 Clearswift Ltd. All rights reserved.

More information

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference ETERNUS SF AdvancedCopy Manager V15.0 Quick Reference B1FW-5967-02ENZ0(00) April 2012 Preface Purpose This manual describes the pre-installation requirements, installation procedure, configuration procedure,

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

FUJITSU Software Systemwalker Software Configuration Manager. Operator's Guide. Windows/Linux

FUJITSU Software Systemwalker Software Configuration Manager. Operator's Guide. Windows/Linux FUJITSU Software Systemwalker Software Configuration Manager Operator's Guide Windows/Linux B1X1-0129-04ENZ0(00) March 2014 Preface Purpose of this Document This document explains patch management procedures

More information

Red Hat CloudForms 4.6

Red Hat CloudForms 4.6 Red Hat CloudForms 4.6 Policies and Profiles Guide Policy-based enforcement, compliance, events, and policy profiles for Red Hat CloudForms Last Updated: 2018-03-02 Red Hat CloudForms 4.6 Policies and

More information

The Contents and Structure of this Manual. This document is composed of the following two chapters.

The Contents and Structure of this Manual. This document is composed of the following two chapters. Preface This document briefly explains the operations that need to be performed by the user in order to connect an ETERNUS2000 model 100 or 200 Disk storage system to a server running Solaris, HP-UX, Windows,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Security Guide. Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds

Security Guide. Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds Security Guide Connection Broker Advanced Connection and Capacity Management for Hybrid Clouds Version 9.0 June 2018 Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks

More information

FUJITSU Software Smart Communication Optimizer V User's Guide

FUJITSU Software Smart Communication Optimizer V User's Guide FUJITSU Software Smart Communication Optimizer V1.1.0 User's Guide J2UL-2332-02ENZ0(00) December 2018 Preface Purpose of This Document This manual explains the overview of, and the methods for designing,

More information

Version 2.3 User Guide

Version 2.3 User Guide V Mware vcloud Usage Meter Version 2.3 User Guide 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered

More information

Version 1.26 Installation Guide for SaaS Uila Deployment

Version 1.26 Installation Guide for SaaS Uila Deployment Version 1.26 Installation Guide for SaaS Uila Deployment Table of Contents Introduction... 2 Scope and Purpose... 2 Architecture Overview... 2 Virtual Architecture... 2 Getting Started... 3 System Requirements...

More information

Table of Contents. Configure and Manage Logging in to the Management Portal Verify and Trust Certificates

Table of Contents. Configure and Manage Logging in to the Management Portal Verify and Trust Certificates Table of Contents Configure and Manage Logging in to the Management Portal Verify and Trust Certificates Configure System Settings Add Cloud Administrators Add Viewers, Developers, or DevOps Administrators

More information

Red Hat CloudForms 4.0

Red Hat CloudForms 4.0 Red Hat CloudForms 4.0 Installing CloudForms on VMware vsphere How to Install and Configure the CloudForms Management Engine Appliance on a VMware vsphere environment Last Updated: 2017-12-08 Red Hat

More information

API reference (Network)

API reference (Network) FUJITSU Cloud Service K5 IaaS API reference (Network) Version 1.5 FUJITSU LIMITED All Rights Reserved, Copyright Fujitsu Limited 2015-2016 K5IA-DC-M-001-001E Preface Structure of the manuals Manual Title

More information

Cloud Computing /AWS Course Content

Cloud Computing /AWS Course Content Cloud Computing /AWS Course Content 1. Amazon VPC What is Amazon VPC? How to Get Started with Amazon VPC Create New VPC Launch an instance (Server) to use this VPC Security in Your VPC Networking in Your

More information

Red Hat Enterprise Virtualization 3.6

Red Hat Enterprise Virtualization 3.6 Red Hat Enterprise Virtualization 3.6 Introduction to the User Portal Accessing and Using the User Portal Last Updated: 2017-09-27 Red Hat Enterprise Virtualization 3.6 Introduction to the User Portal

More information

Red Hat Enterprise Virtualization 3.6 Introduction to the User Portal

Red Hat Enterprise Virtualization 3.6 Introduction to the User Portal Red Hat Enterprise Virtualization 3.6 Introduction to the User Portal Accessing and Using the User Portal Red Hat Enterprise Virtualization Documentation Team Red Hat Enterprise Virtualization 3.6 Introduction

More information

Acano solution. Virtualized Deployment R1.2 Installation Guide. Acano. December G

Acano solution. Virtualized Deployment R1.2 Installation Guide. Acano. December G Acano solution Virtualized Deployment R1.2 Installation Guide Acano December 2014 76-1025-04-G Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 About the Acano virtualized solution...

More information

IaaS Integration Guide

IaaS Integration Guide FUJITSU Software Enterprise Service Catalog Manager V16.0.0 IaaS Integration Guide Windows(64) B1WS-1259-01ENZ0(00) February 2016 Preface Purpose of This Document This document explains the introduction

More information

Red Hat CloudForms 4.2

Red Hat CloudForms 4.2 Red Hat CloudForms 4.2 Monitoring, Alerts, and Reporting Creating and managing reports, feeds, and widgets in Red Hat CloudForms Last Updated: 2017-12-18 Red Hat CloudForms 4.2 Monitoring, Alerts, and

More information

Notices Carbonite Recover User's Guide, version 1.1.0, Tuesday, July 31, 2018 If you need technical assistance, you can contact CustomerCare.

Notices Carbonite Recover User's Guide, version 1.1.0, Tuesday, July 31, 2018 If you need technical assistance, you can contact CustomerCare. Notices Carbonite Recover User's Guide, version 1.1.0, Tuesday, July 31, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online documentation

More information

Fujitsu Global Cloud Platform Service Catalog

Fujitsu Global Cloud Platform Service Catalog Fujitsu Global Cloud Platform Service Catalog October, 2011 Fujitsu America, Inc. NOTE: This presentation is only a summary and does not constitute a legal contract. Please see the terms and conditions

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

Red Hat CloudForms 4.2

Red Hat CloudForms 4.2 Red Hat CloudForms 4.2 Support Matrix Supported platforms and features in Red Hat CloudForms 4.2 Last Updated: 2018-03-16 Red Hat CloudForms 4.2 Support Matrix Supported platforms and features in Red

More information

User's Guide for Infrastructure Administrators (Resource Management)

User's Guide for Infrastructure Administrators (Resource Management) ServerView Resource Orchestrator Cloud Edition V3.0.0 User's Guide for Infrastructure Administrators (Resource Management) Windows/Linux J2X1-7612-01ENZ0(05) April 2012 Preface Purpose This manual provides

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (December 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Epson Device Admin User s Guide NPD EN

Epson Device Admin User s Guide NPD EN Epson Device Admin User s Guide NPD5817-00 EN About this Manual About this Manual Marks and Symbols! Caution: Instructions that must be followed carefully to avoid bodily injury. c Important: Instructions

More information

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5 Migration Guide B1FW-6000-06ENZ0(01) June 2017 Preface Purpose This manual describes how to upgrade to this

More information

SonicWall SMA 8200v. Getting Started Guide

SonicWall SMA 8200v. Getting Started Guide SonicWall SMA 8200v Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or

More information

WatchGuard XTMv Setup Guide

WatchGuard XTMv Setup Guide WatchGuard XTMv Setup Guide All XTMv Editions Copyright and Patent Information Copyright 1998 2011 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and

More information

Managing the VM Lifecycle

Managing the VM Lifecycle This chapter contains the following sections:, page 1 Managing VM Power, page 2 Resizing a VM, page 3 Resizing a VM Disk, page 4 Managing VM Snapshots, page 5 Managing Other VM Actions, page 7 You can

More information

FUJITSU Software Smart Communication Optimizer V User's Guide

FUJITSU Software Smart Communication Optimizer V User's Guide FUJITSU Software Smart Communication Optimizer V1.0.0 User's Guide J2UL-2332-01ENZ0(00) June 2018 Preface Purpose of This Document This manual explains the overview of, and the methods for designing, installing,

More information

Using the vrealize Orchestrator OpenStack Plug-In 2.0. Modified on 19 SEP 2017 vrealize Orchestrator 7.0

Using the vrealize Orchestrator OpenStack Plug-In 2.0. Modified on 19 SEP 2017 vrealize Orchestrator 7.0 Using the vrealize Orchestrator OpenStack Plug-In 2.0 Modified on 19 SEP 2017 vrealize Orchestrator 7.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Notices Carbonite Recover User's Guide Wednesday, December 20, 2017 If you need technical assistance, you can contact CustomerCare.

Notices Carbonite Recover User's Guide Wednesday, December 20, 2017 If you need technical assistance, you can contact CustomerCare. Notices Carbonite Recover User's Guide Wednesday, December 20, 2017 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online documentation will be

More information

System Monitor - Performance Monitoring Services 5.8 User's Guide

System Monitor - Performance Monitoring Services 5.8 User's Guide System Monitor - Performance Monitoring Services 5.8 User's Guide - First Edition - Copyright (C) NEC Corporation 2004-2017. Disclaimer of Warranty All the information, text, graphics, links or other items

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Cluster Environment Setup Guide

FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Cluster Environment Setup Guide FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3 Cluster Environment Setup Guide B1FW-6006-04ENZ0(00) October 2015 Preface Purpose This manual provides information on installation

More information

Version 1.26 Installation Guide for On-Premise Uila Deployment

Version 1.26 Installation Guide for On-Premise Uila Deployment Version 1.26 Installation Guide for On-Premise Uila Deployment Table of Contents Introduction... 2 Scope and Purpose... 2 Architecture Overview... 2 Virtual Architecture... 2 Getting Started... 3 System

More information

User's Guide (Systemwalker User Management and Single Sign-On Edition)

User's Guide (Systemwalker User Management and Single Sign-On Edition) Systemwalker Service Quality Coordinator User's Guide (Systemwalker User Management and Single Sign-On Edition) Windows/Solaris/Linux J2X1-7665-02ENZ0(00) January 2013 Preface Purpose of this manual This

More information

Structure and Overview of Manuals

Structure and Overview of Manuals FUJITSU Software Systemwalker Operation Manager Structure and Overview of Manuals UNIX/Windows(R) J2X1-6900-08ENZ0(00) May 2015 Introduction Purpose of This Document Please ensure that you read this document

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017 UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation

More information

FUJITSU Software ServerView Resource Orchestrator Cloud Edition V Quick Start Guide. Windows/Linux

FUJITSU Software ServerView Resource Orchestrator Cloud Edition V Quick Start Guide. Windows/Linux FUJITSU Software ServerView Resource Orchestrator Cloud Edition V3.1.2 Quick Start Guide Windows/Linux J2X1-7622-06ENZ0(01) June 2014 Preface Purpose of This Document This manual explains the flow of installation

More information

VMware vcloud Air User's Guide

VMware vcloud Air User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Installing and Configuring vrealize Automation for the Rainpole Scenario. 12 April 2018 vrealize Automation 7.4

Installing and Configuring vrealize Automation for the Rainpole Scenario. 12 April 2018 vrealize Automation 7.4 Installing and Configuring vrealize Automation for the Rainpole Scenario 12 April 2018 vrealize Automation 7.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

OpenStack End User Guide. SUSE OpenStack Cloud 8

OpenStack End User Guide. SUSE OpenStack Cloud 8 OpenStack End User Guide SUSE OpenStack Cloud 8 OpenStack End User Guide SUSE OpenStack Cloud 8 ABSTRACT OpenStack is an open-source cloud computing platform for public and private clouds. A series of

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

VMware Integrated OpenStack User Guide. VMware Integrated OpenStack 4.1

VMware Integrated OpenStack User Guide. VMware Integrated OpenStack 4.1 VMware Integrated OpenStack User Guide VMware Integrated OpenStack 4.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3 Migration Guide B1FW-6000-04ENZ0(00) October 2015 Preface Purpose This manual describes how to upgrade to this

More information

Red Hat Quay 2.9 Deploy Red Hat Quay - Basic

Red Hat Quay 2.9 Deploy Red Hat Quay - Basic Red Hat Quay 2.9 Deploy Red Hat Quay - Basic Deploy Red Hat Quay Last Updated: 2018-09-14 Red Hat Quay 2.9 Deploy Red Hat Quay - Basic Deploy Red Hat Quay Legal Notice Copyright 2018 Red Hat, Inc. The

More information

StoneGate Management Center. Release Notes for Version 5.3.2

StoneGate Management Center. Release Notes for Version 5.3.2 StoneGate Management Center Release Notes for Version 5.3.2 Created: September 21, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 Other Changes... 4 System Requirements... 5 Basic

More information

Red Hat CloudForms 4.6

Red Hat CloudForms 4.6 Red Hat CloudForms 4.6 Scanning Container Images in CloudForms with OpenSCAP Configuring OpenSCAP in CloudForms for Scanning Container Images Last Updated: 2018-05-24 Red Hat CloudForms 4.6 Scanning Container

More information

AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM. Using VMware vcloud Connector

AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM. Using VMware vcloud Connector AT&T CLOUD SERVICES AT&T Synaptic Compute as a Service SM Using VMware vcloud Connector 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Administrator s Guide Version 3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

What s New for Oracle Java Cloud Service. On Oracle Cloud Infrastructure and Oracle Cloud Infrastructure Classic. Topics: Oracle Cloud

What s New for Oracle Java Cloud Service. On Oracle Cloud Infrastructure and Oracle Cloud Infrastructure Classic. Topics: Oracle Cloud Oracle Cloud What's New for Oracle Java Cloud Service Release 17.4 E64762-32 November 2017 What s New for Oracle Java Cloud Service This document describes what's new in Oracle Java Cloud Service on all

More information