...
Log-in to the Rapid Access Cloud dashboard at https://cloud.cybera.ca.
In the left-hand panel under “Compute”, click “Access & Security”.
Click the “Key Pair” tab, then click “+Create Key Pair”.
Enter a
<key_pair_name>
, then click “Create Key Pair”. The browser will automatically download a file named<key_pair_name>.pem
.Move or save this file on your computer somewhere you will remember. It will be used when accessing instances created with this key pair.
Note If this key file is saved to an operating system that uses file-system permissions (Unix, Linux, BSD, OSX) then make sure the permissions are set appropriately. Typically, the
.ssh
directory permissions ought to be set to700 (
drwx------
)
and the private key(
*.pem
)
should be600 (
-rw-------
)
. To change the permissions of the downloaded key to600
, do:Code Block $ chmod 600 /path/to/<key_pair_name>.pem
Warning The private key generated in the step above is not recoverable if it is lost. It is highly recommended that a backup of the key is made and kept safe, ideally on a separate hard drive or USB key.
Info |
---|
About key pairsKey pairs are a set of mathematically generated strings, one is |
...
the private key |
...
and the other is |
...
the public key. The key pairs that are used in the Rapid Access Cloud are ssh keys generated by the OpenStack dashboard, keeping the public key to be injected as needed into new instances, and the private key is the *.pem file automatically downloaded by the browser in the steps above. If you already have a key pair suited for use, import that key |
...
by following the steps in the Advanced Guide. |
...
The private key generated in the step above is not recoverable if it is lost. It is highly recommended that a backup of the key is made and kept safe, ideally on a separate hard drive or USB key. |
|
...
will help you understand it better. |
...
Security Groups
Security groups are the policies that deny access to the network ports of an instance. Security groups are therefore firewalls for instances, with a set of default policies that block all access to each port from any source, including the computer you are using to access the Rapid Access Cloud dashboard. Before an instance can be accessed the appropriate ports will need to be opened and a source IP address or range of addresses will need to be configured.
...
The Cybera Rapid Access Cloud is offered on a best-effort basis and it is the users’ responsibility to ensure appropriate backups of all their data are made. While Cybera’s record for uptime and data-loss is very good, we strongly encourage all of our users to ensure regular backups are made.
Instance Snapshots
Snapshots are point-in-time copies of your instances. You can snapshot your instance and then either download that snapshot as a backup or use that snapshot as a “cookie cutter” template to build new instances based off of it. This has the advantage that you will not have to reconfigure your virtual machine after launching from the snapshot, as opposed to launching from the image. Also, you can use this to resize your instance: if you want your instance to have different resources assigned to it (e.g. CPU or RAM) you can re-launch from the snapshot according to your preferred configuration (note that the root disk cannot be smaller than in the original instance).
...