Upload
trankiet
View
249
Download
0
Embed Size (px)
Citation preview
i
Preface
Purpose of This Document
This guide describes the operating procedures of the IaaS Service Portal for
the services provided by FUJITSU Cloud Service K5.
You are recommended to also refer to the following related manuals.
- IaaS Features Handbook
- IaaS API References
Abbreviations in the present document
In this document, product names are written as follows.
Official Name Abbreviation
FUJITSU Cloud Service K5 IaaS K5 IaaS
Microsoft Windows Server Windows Server Windows
Microsoft Windows Server 2016 Windows 2016
Microsoft Windows Server 2012 R2 Windows 2012 R2
Microsoft Windows Server 2012 Windows 2012
Microsoft Windows Server 2008 R2 Windows 2008 R2
Microsoft Windows Server 2008 Windows 2008
Windows 10 Windows 10
Windows 8.1 Windows 8.1
Windows 7 Windows 7
Red Hat® Enterprise Linux 6.x (for Intel64) (x
is a number)
RHEL6.x ( x is a
number)
Linux
Red Hat Enterprise Linux 7.x (for Intel64)(x
is a number)
RHEL7.x ( x is a
number)
Red Hat OpenShift Container Platform 3.x
(English) (x is a number)
RHOCP3.x ( x is a
number)
Community Enterprise Operating System 6.x
(x is a number)
CentOS 6.x(x is a
number)
CentOS
ii
Official Name Abbreviation
Community Enterprise Operating System 7.x
(x is a
number)
CentOS 7.x(x is a
number)
Red Hat Update Infrastructure RHUI
Red Hat Enterprise Linux AUS(AMC Update
Support)
RHEL AUS
SUSE Linux Enterprise Server 12 Service
Pack 1 for AMD64 & Intel64
SLES 12 SP1 Linux
SUSE Linux Enterprise Server SLES
Windows Server Update Services WSUS
VMware vSphere VMware vSphere VMware
VMware ESX ESX
VMware ESXi ESXi
VMware vCenter Server vCenter Server
VMware vSphere Client vSphere Client
VMware Tools VMware Tools
Trademarks
・ Microsoft, Windows, Windows Server and other Microsoft product names and
model names are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
・ Java is a registered trademark of Oracle Corporation and its subsidiaries or
affiliates in the United States and/or other countries.
・ Xeon is a trademark of Intel Corporation in the United States and/or other countries.
・ Linux® is a registered trademark of Linus Torvalds in the United States and/or
other countries.
・ Red Hat, Red Hat Enterprise Linux, and OpenShift are trademarks of Red
Hat, Inc. registered in the United States and/or other countries.
・ Ubuntu is a registered trademark of Canonical Ltd.
・ The OpenStack Word Mark is either a registered trademark/service mark or
trademark/service mark of the OpenStack Foundation, in the United States
and other countries and is used with the OpenStack Foundation's permission.
・ VMware and VMware product names are either trademarks or registered
trademarks of VMware, Inc. in the United States and/or other countries.
iii
・ SAP and SAP logos, SAP R/3, mySAP.com, mySAP Business Suite, and
other SAP products are either trademarks or registered trademarks of SAP
AG in Germany and/or other countries.
・ Akamai and Akamai Intelligent Platform are either trademarks or registered
trademarks of Akamai Technologies, Inc.
・ Novell is a registered trademark of Novell Inc. in the United States and/or
other countries; SUSE and SUSE logos are either trademarks or registered
trademarks of SUSE LLC in the United States and/or other countries.
・ Other company names and product names mentioned in this manual are
trademarks or registered trademarks of their respective companies.
In addition, the company name and product name described in this document are
trademarks or registered trademarks of each company.
Compliance with Export Control Regulations
When exporting this document or providing it to a third party, check the export
control laws and regulations of your country and the U.S. and take necessary
procedures.
Notices
- The content of this manual is subject to change without notice.
- The content of this manual shall not be reproduced without express written
permission from FUJITSU LIMITED.
- FUJITSU LIMITED shall bear no responsibility for any claims of violation of
a third party's patent or other rights arising from the use of the data described
in this document.
iv
Document history
Version Date Edited places Description
2.0 April 4, 2017 Whole Initial Release
2.1 April 21, 2017 Ch. 11 and 13 Added descriptions.
2.2 May 19, 2017 Whole Modification of section number
Ch. 6 Addition of "Confirm and Cancel
Resize/Migrate" menu.
Ch. 10 Addition of volume type in Table
14.
Addition of storage action (Connect
and Disconnect Storage)
2.3 May 31, 2017 Ch. 10 Update of Table 14 and Table 15
Ch. 12 Table 20 Addition of the link to
Subnet Detail
Ch. 12.2.2 Addition of Delete action
in the Port.
Ch. 12.5 Addition of Subnet
2.4 June 30, 2017 Ch. 23 Addition of the API execution
function
2.5 July 18, 2017 Ch. 16 Addition of functions for
creation/editing/deletion of the
following firewall features.
- Firewalls
- Firewall policies
- Firewall rules
2.5.1 August 1, 2017 Ch. 2 Updated Figure 1
Ch. 3 Overall correction focusing on
Paging and Update button function
addition
Ch. 6 Added explanation of required
entry items in "6.3.1 How to Create
Virtual Server"
2.6 September 1, 2017 Ch. 19 Added VPN Service
v
2.7 September 28, 2017 Ch. 24 Added Operation Log
2.8 December 13, 2017 Ch. 1 Modified the OpenStack
Foundation trademark information
Ch. 11 Added Object Storage
Ch. 27 Added Virtual Server Import and
Export
2.9 March 22, 2018 Ch. 6
Ch. 6.1.1 Added the "Edit
metadata" Action
Ch. 6.3 Added the metadata
function of Creating Virtual Server
Ch. 11 Removed the restriction regarding
object storage in 11.4
Ch. 21 Added the IPsec VPN function
Ch. 23 Updated Table 49
Ch. 27
Ch. 27.1 Added the history function
of API Execution
2.9.1 April 20, 2018 Ch. 15 Ch. 15.5.1 Corrected the port
number of Security Group Rule
(MS SQL)
Ch. 19 Ch. 19.5 Added SRV to the
supported records
2.9.2 April 26, 2018 Ch. 11 Ch. 11.3 Added advisory note
regarding object list display
2.10 June, 1, 2018 Ch. 4 Ch. 4.2 Added Advisory Notes
Ch. 6 Ch. 6.6 Added the Port Creation
Function
Ch. 12 Ch. 12.2.1 Added the Snapshot
Restoration Function
Ch. 14 Ch. 14.4 Added the Routing Setting
Function
Ch. 19 Ch. 19.1 Added display content to
the DNS Zone list
3.0 June 29, 2018 Ch. 1 Ch. 1.2 Added the Functions
Provided by the IaaS Service
Portal
vi
Ch. 19 Added the Load Balancer
(Western Japan Region 3)
Function
Ch. 20 Ch. 20.5 Added PTR to Record
Registration
Ch. 21 Updated Table 43
Ch. 23 Ch. 23.5 Added Starting the
Database Virtual Server After
Patch Application
Ch. 23.8 Added Rebooting the
Database Virtual Server After
Patch Application
vii
Contents
Preface .................................................................................................................................... i
Document history ................................................................................................................. iv
Chapter 1 Introduction ......................................................................................................... 1
1.1 IaaS Service Portal Overview ................................................................................... 1
1.1.1 IaaS Service Portal ......................................................................................... 1
1.1.2 Recommended Environment .......................................................................... 1
1.2 Functions Provided by the IaaS Service Portal ....................................................... 2
Chapter 2 Overall Structure ................................................................................................ 5
2.1 GUI Structure ............................................................................................................ 5
Chapter 3 Common Operations ........................................................................................... 6
3.1 Description .................................................................................................................. 6
3.1.1 System Area Common Operations ................................................................. 6
3.1.2 Display Area Common Operations ................................................................. 7
Chapter 4 Login .................................................................................................................... 8
4.1 How to Login .............................................................................................................. 8
4.2 Advisory Notes ........................................................................................................... 9
Chapter 5 Top ...................................................................................................................... 10
5.1 Alarm ........................................................................................................................ 10
5.1.1 Select Alarm ................................................................................................... 11
5.1.2 Alarm History ................................................................................................. 11
5.1.3 Graph ............................................................................................................. 12
5.2 Service Usage ........................................................................................................... 12
5.2.1 Select Graph of Service Usage ..................................................................... 13
5.2.2 Graph ............................................................................................................. 13
5.2.3 Ranking .......................................................................................................... 14
5.3 Resource Usage ........................................................................................................ 15
Chapter 6 Virtual Server .................................................................................................... 16
6.1 Virtual Servers List ................................................................................................. 16
6.1.1 Action ............................................................................................................. 17
6.2 Virtual Server Details .............................................................................................. 19
6.2.1 Action ............................................................................................................. 21
6.3 Create Virtual Server .............................................................................................. 22
viii
6.3.1 How to Create Virtual Server ....................................................................... 22
6.4 Edit Virtual Server................................................................................................... 26
6.4.1 How to Edit Virtual Server ........................................................................... 26
6.5 Resize Virtual Server ............................................................................................... 27
6.5.1 How to Resize Virtual Server ....................................................................... 27
6.6 Port Creation ............................................................................................................ 28
6.6.1 How to Create a Port .................................................................................... 28
Chapter 7 Key Pair ............................................................................................................. 31
7.1 Key Pair List ............................................................................................................ 31
7.2 Key Pair Creation ...................................................................................................... 31
7.2.1 How to Create a Key Pair ............................................................................... 31
7.3 Key Pair Import .......................................................................................................... 32
7.3.1 How to import the key pair .............................................................................. 32
7.4 Key Pair Details ......................................................................................................... 34
7.5 Key Pair Deletion ..................................................................................................... 35
7.5.1 How to delete a key pair ................................................................................. 35
Chapter 8 Image .................................................................................................................. 36
8.1 Image List ................................................................................................................. 36
8.1.1 Action ............................................................................................................. 37
8.2 Image Details ........................................................................................................... 38
Chapter 9 Schedule ............................................................................................................. 39
9.1 Schedule List ............................................................................................................ 39
9.2 Create Schedule ....................................................................................................... 39
9.2.1 How to Create Schedule................................................................................ 39
9.3 Schedule Details ........................................................................................................ 43
9.4 Schedule Deletion ..................................................................................................... 44
9.4.1 How to delete Schedule ................................................................................. 44
Chapter 10 Storage ............................................................................................................. 45
10.1 Storage List .............................................................................................................. 45
10.1.1 Action ............................................................................................................. 46
10.2 Storage Details ......................................................................................................... 47
10.3 Create Storage .......................................................................................................... 49
10.3.1 How to Create Storage .................................................................................. 49
10.4 Edit Storage .............................................................................................................. 50
10.4.1 How to Edit Storage ...................................................................................... 50
10.5 Disconnect Storage ................................................................................................... 50
ix
10.6 Connect Storage ....................................................................................................... 50
10.7 Create Snapshot ....................................................................................................... 50
10.7.1 How to Create Snapshot ............................................................................... 50
Chapter 11 Object Storage ................................................................................................. 51
11.1 Function Overview ................................................................................................... 51
11.2 Usage Methods of Object Storage ........................................................................... 52
11.2.1 Create a Container ........................................................................................ 52
11.2.2 Create an Object ............................................................................................ 56
11.2.3 Download an Object ...................................................................................... 61
11.2.4 Import a VM Image ....................................................................................... 61
11.3 Advisory Notes ......................................................................................................... 62
Chapter 12 Snapshot .......................................................................................................... 63
12.1 Snapshot List Screen ............................................................................................... 63
12.1.1 Action ............................................................................................................. 64
12.2 Snapshot Details Screen .......................................................................................... 64
12.2.1 Restore a Snapshot ....................................................................................... 65
12.3 Edit Snapshot Screen .............................................................................................. 66
12.4 Advisory Notes ......................................................................................................... 66
Chapter 13 Virtual Network .............................................................................................. 67
13.1 Virtual Network List ................................................................................................ 67
13.1.1 Action ............................................................................................................. 68
13.2 Virtual Network Details .......................................................................................... 68
13.2.1 Action for Subnet........................................................................................... 70
13.2.2 Action for Port ............................................................................................... 70
13.3 Create Virtual Network ........................................................................................... 70
13.3.1 How to Create Virtual Network ................................................................... 70
13.4 Edit Virtual Network ............................................................................................... 74
13.4.1 How to Edit Virtual Network ....................................................................... 74
13.5 Add Subnet ............................................................................................................... 74
Chapter 14 Virtual Router ................................................................................................. 75
14.1 Virtual router list ..................................................................................................... 75
14.1.1 Action ............................................................................................................. 76
14.2 Virtual Router Overview ......................................................................................... 76
14.2.1 Action ............................................................................................................. 77
14.3 Virtual Router Creation ........................................................................................... 78
14.3.1 How to create a virtual router ...................................................................... 78
x
14.4 Edit a Virtual Router ............................................................................................... 78
14.4.1 How to edit a virtual router ......................................................................... 78
14.5 Add interface ............................................................................................................ 79
Chapter 15 Security Group ................................................................................................ 80
15.1 Security Group List .................................................................................................. 80
15.1.1 About Operation ............................................................................................ 80
15.2 Security Group Creation .......................................................................................... 81
15.2.1 How to create a security group..................................................................... 81
15.3 Security Group Details ............................................................................................ 82
15.4 Manage Security Group Rules ................................................................................ 83
15.4.1 How to Transfer to the Rule Management Screen...................................... 84
15.5 Addition of Security Group Rules ........................................................................... 85
15.5.1 How to Add Security Group Rules ............................................................... 85
15.6 Export Security Group Rules .................................................................................. 87
15.6.1 How to Export Rules ..................................................................................... 87
15.7 Import Security Group Rules .................................................................................. 87
15.7.1 How to Import Rules ..................................................................................... 87
15.8 Deletion of Security Group Rules ........................................................................... 88
15.8.1 How to Delete Rules ...................................................................................... 88
15.9 Editing a Security Group ......................................................................................... 89
15.9.1 How to Edit a Security Group ...................................................................... 89
15.10 Deletion of Security Group ............................................................................... 90
15.10.1 How to Delete a Security Group .................................................................. 90
Chapter 16 Global IP .......................................................................................................... 91
16.1 Global IP List ........................................................................................................... 91
16.1.1 Action ............................................................................................................. 91
16.2 Reserved Global IP ................................................................................................... 91
16.3 Allocate Global IP .................................................................................................... 92
16.4 Deallocate Global IP ................................................................................................ 93
16.5 Release Global IP ..................................................................................................... 93
Chapter 17 Firewall ............................................................................................................ 94
17.1 Function Overview ................................................................................................... 94
17.2 Firewall List Screen ................................................................................................. 95
17.3 Firewall Creation Procedure ................................................................................... 96
17.3.1 Firewall Rule Sorting Operation .................................................................. 98
17.4 Advisory Notes ....................................................................................................... 100
xi
Chapter 18 Load Balancer................................................................................................ 101
18.1 Load Balancer List ................................................................................................. 101
18.1.1 Action ........................................................................................................... 101
18.2 Load Balancer Details ........................................................................................... 102
18.3 Create Load Balancer ............................................................................................ 105
18.3.1 How to Create Load Balancer .................................................................... 105
18.4 Add Subnet ............................................................................................................. 107
18.4.1 How to Add Subnet ..................................................................................... 107
18.5 Delete Subnet ......................................................................................................... 108
18.5.1 How to Delete Subnet ................................................................................. 108
18.6 Add Listener ........................................................................................................... 108
18.6.1 How to Add Listener ................................................................................... 108
18.7 Delete Listener ....................................................................................................... 108
18.8 Add Virtual Server ................................................................................................. 108
18.8.1 How to Add Virtual Server ......................................................................... 108
18.9 Delete Virtual Server ............................................................................................. 108
18.9.1 How to Delete Virtual Server ..................................................................... 109
18.10 Create Session Persistence Policy ................................................................. 109
18.11 Create SorryServer Policy .............................................................................. 109
18.11.1 How to Create SorryServer policy.............................................................. 109
18.12 Create/Delete Policy ....................................................................................... 109
18.13 Set Health Check Information ........................................................................ 110
18.14 Set Security Group .......................................................................................... 110
18.15 Set Cipher Suite ............................................................................................... 110
Chapter 19 Load Balancer (Western Japan Region 3) .................................................... 111
19.1 Function Overview .................................................................................................. 111
19.2 Method of Using Load Balancers ........................................................................... 112
19.2.1 Create a Load Balancer ............................................................................... 113
19.2.2 Load Balancing Settings .............................................................................. 114
19.2.3 Confirmation after Creation ....................................................................... 121
19.3 Points to Note ......................................................................................................... 123
Chapter 20 DNS ................................................................................................................ 124
20.1 DNS Zone List ........................................................................................................ 124
20.1.1 About Operation .......................................................................................... 125
20.2 DNS Zone Registration .......................................................................................... 125
20.2.1 How to Register DNS Zone ......................................................................... 125
xii
20.3 Record List .............................................................................................................. 127
20.3.1 About Operation .......................................................................................... 128
20.4 Record Details ........................................................................................................ 128
20.5 Record Registration ............................................................................................... 130
20.5.1 How to register records ............................................................................... 130
20.6 Editing Records ...................................................................................................... 137
20.6.1 How to edit records ..................................................................................... 137
20.7 Record Deletion ...................................................................................................... 138
20.7.1 How to delete records .................................................................................. 138
20.8 DNS Zone Deletion ................................................................................................. 138
20.8.1 How to delete DNS zone ............................................................................. 138
Chapter 21 VPN Service (SSL-VPN) ............................................................................... 140
21.1 Function Overview ................................................................................................. 140
21.2 Usage Method of SSL-VPN Connections .............................................................. 140
21.3 Advisory Notes ....................................................................................................... 146
Chapter 22 VPN Service (IPsec VPN) ............................................................................. 147
22.1 Function Overview ................................................................................................. 147
22.2 Usage Method of IPsec VPN Connections ............................................................ 148
22.3 How to Delete IKE and IPsec Policies .................................................................. 156
22.4 Advisory Notes ....................................................................................................... 158
Chapter 23 Database Virtual Server ............................................................................... 159
23.1 Database Virtual Server List ................................................................................ 159
23.1.1 About Operation .......................................................................................... 161
23.2 Database Virtual Server Creation ........................................................................ 162
23.2.1 How to create database virtual server ....................................................... 162
23.3 Database Virtual Server Details ........................................................................... 166
23.4 Database Virtual Server Startup .......................................................................... 171
23.4.1 How to start up Database Virtual Server.................................................. 171
23.5 Starting the Database Virtual Server after Patch Application .......................... 172
23.5.1 How to start the database virtual server after patch application ........... 172
23.6 Database Virtual Server Stop ............................................................................... 173
23.6.1 How to stop database virtual server .......................................................... 173
23.7 Database Virtual Server Reboot ........................................................................... 173
23.7.1 How to reboot the database virtual server ................................................ 174
23.8 Rebooting the Database Virtual Server after Patch Application........................ 175
23.8.1 How to reboot the database virtual server after patch application ......... 175
xiii
23.9 Database Virtual Server Deletion ......................................................................... 176
23.9.1 How to delete the database virtual server ................................................ 176
23.10 DB Parameter Group Details......................................................................... 177
23.10.1 How to Check DB Parameter Group .......................................................... 177
23.11 Database Log List ........................................................................................... 178
23.11.1 How to see log .............................................................................................. 178
23.12 Database Log Details...................................................................................... 179
Chapter 24 Stack............................................................................................................... 180
24.1 Stack List ................................................................................................................ 180
24.2 Stack Details .......................................................................................................... 181
24.3 Create Stack ........................................................................................................... 182
24.3.1 How to Create Stack ................................................................................... 182
24.4 Edit Stack ............................................................................................................... 183
Chapter 25 Monitoring ..................................................................................................... 184
25.1 Monitoring Target Resource List .......................................................................... 184
25.1.1 How to display target resource list ............................................................ 184
25.2 Resource Audit Information .................................................................................. 186
25.3 Graph ...................................................................................................................... 187
25.3.1 How to change the displayed content of the graph ................................... 187
25.3.2 Graph Operation ......................................................................................... 188
Chapter 26 Alarm .............................................................................................................. 189
26.1 Alarm List ............................................................................................................... 189
26.1.1 About Operations ........................................................................................ 190
26.2 Alarm Creation ....................................................................................................... 190
26.2.1 How to create an alarm .............................................................................. 190
26.3 Alarm Details ......................................................................................................... 204
26.4 Action setting ......................................................................................................... 208
26.4.1 How to set an alarm .................................................................................... 208
26.5 History of Alarm ..................................................................................................... 212
26.5.1 How to display the history of alarm .......................................................... 212
26.6 Alarm Deletion ....................................................................................................... 215
26.6.1 How to delete an alarm ............................................................................... 215
Chapter 27 Operation Log ................................................................................................ 216
27.1 Function Overview ................................................................................................. 216
27.2 Usage Method of Operation Logs .......................................................................... 218
27.3 Advisory Notes ....................................................................................................... 219
xiv
Chapter 28 API Execution ................................................................................................ 220
28.1 Function Overview ................................................................................................. 220
28.2 Usage Example ....................................................................................................... 220
28.2.1 Information Necessary for API Execution ................................................. 220
28.2.2 Endpoint List ............................................................................................... 221
28.2.3 Example of Virtual Server List Acquisition .............................................. 223
28.2.4 Example of Virtual Server Creation .......................................................... 225
Chapter 29 VM Import and Export ................................................................................. 229
29.1 Function Overview ................................................................................................. 229
29.2 Usage Example ....................................................................................................... 230
29.2.1 VM Import ................................................................................................... 230
29.2.2 VM Export ................................................................................................... 233
29.3 Advisory Notes ....................................................................................................... 235
1
Chapter 1 Introduction
1.1 IaaS Service Portal Overview
1.1.1 IaaS Service Portal
IaaS Service Portal is a GUI application for using FUJITSU Cloud Service K5 IaaS (K5
IaaS or IaaS) service. On the IaaS Service Portal, you can operate on some of the IaaS
resources.
1.1.2 Recommended Environment
The recommended environment for the integrated service portal is as follows.
Table 1 Recommended Operating Environment
OS Windows 7/8.1
Browser Microsoft Internet Explorer 11
2
1.2 Functions Provided by the IaaS Service Portal
The functions available on the IaaS Service Portal vary depending on the
Region. This section explains the available regions and the available functions.
Available Regions
The relationships of the Region Names and the Region Identifiers are
shown below.
Table 2 List of Available Regions
Country Region Name Abbreviation Region
Identifier
Number of
Availability
Zones (AZ)
Japan Eastern Japan Region 1 Japan East 1 jp-east-1 2
Eastern Japan Region 2 Japan East 2 jp-east-2 2
Western Japan Region 1 Japan West 1 jp-west-1 2
Western Japan Region 2 Japan West 2 jp-west-2 2
Western Japan Region 3 Japan West 3 jp-west-3 1
UK UK Region 1 UK uk-1 2
Finland Finland Region 1 Finland fi-1 2
Germany Germany Region 1 Germany de-1 2
Spain Spain Region 1 Spain es-1 2
US US Region 1 US us-1 2
*For details on regions, refer to the "IaaS Features Handbook – Region".
Available Functions
A list of the available functions in each region is given below.
Table 3 List of Available Functions by Region
[Legend] ✓: Available
- : Not available as at July 2018 (Includes functions to be released later)
3
No Function Eastern Japan
Region 1/Region 2
Western Japan
Region 1/Region 2
UK/US
Finland
Germany/Spain
Western Japan
Region 3
1 Top ✓ -
2 Virtual Servers ✓ ✓
3 Key Pairs ✓ ✓
4 Images ✓ ✓
5 Schedule ✓ -
6 Storage ✓ ✓
7 Object Storage ✓ -
8 Snapshots ✓ ✓
9 Virtual Networks ✓ ✓
10 Virtual Routers ✓ ✓
11 Security Groups ✓ ✓
12 Global IPs ✓ ✓
13 Firewalls ✓ ✓
14 Load Balancers ✓(*1) ✓(*1)
15 DNS ✓(*2) ✓(*2)
16 VPN Service (SSL-VPN) ✓ ✓
17 VPN Service (IPsec VPN) ✓ -
18 Database Virtual Servers ✓ -
19 Stacks ✓ -
20 Monitoring ✓ -
21 Alarms ✓ -
22 Operation Logs ✓ ✓
23 API Execution ✓ ✓
24 VM Import/Export ✓ -
*1: The functions available in Western Japan Region 3 and the operation
screens differ from the other regions indicated in Table 2 List of Available
Regions.
*2: Only provided in Eastern Japan Region 1
4
Points to Note
As there is only one AZ in Western Japan Region 3, AZ information is
not displayed on the screen.
Even though functions may be common between regions, depending
on the region the layouts of screens differ slightly. Unless otherwise
noted, the screens shown in this guide are those of Eastern Japan
Region 1.
5
Chapter 2 Overall Structure
2.1 GUI Structure
GUI of K5 IaaS service portal is configured as follows.
Table 4 Area Name
No. Name Details
1 System Area Displays a service name, a user name, etc.
2 Side Bar Select a resource and display it in the display area.
3 Display Area Display information on the selected resource.
Figure 1 Service Portal
6
Chapter 3 Common Operations
3.1 Description
This section explains the common operations of the IaaS Service Portal window.
3.1.1 System Area Common Operations
Figure 2 System Area Common Operations
・ Switch Language
Selecting a language from the pull-down menu enables switching of the
display language between Japanese and English.
・ Switch Region
Selecting a region name from the pull-down menu enables switching of
regions.
7
3.1.2 Display Area Common Operations
Figure 3 Display Area Common Operations
・ Switch Side Bar Display
Switches between display/non-display of the side bar. When the side bar is
not displayed, the display area is enlarged.
・ Switch Project
Selecting a project name from the pull-down menu enables switching of
projects. There are cases when it is not possible to switch projects, such as
when resources are being created.
・ Update Button
Clicking this button updates (refreshes) the information in the Display Area.
There are cases where updating of information is not possible, such as when
resources are being created.
・ Add Resource
Clicking this displays the Add Resource window.
・ Filter
The items displayed in a list can be filtered using an entered string.
・ Paging
This enables division of a list into multiple pages when there are many
records. The following operations switch the page.
Changing the number of pages.
Clicking the previous or next page button.
8
Chapter 4 Login
4.1 How to Login
Enter the contract number, user name, and password, then press the "Login"
button.
Figure 4 Login
In case there are input error of the contract number, user name or password,
following error message is displayed.1
Figure 5 Login with an error message
1 From a security point of view, if login fails five times consecutively, you cannot log in for 30 minutes.
9
4.2 Advisory Notes
When an authentication error occurs during login, the browser's cache may
be the cause. Take corrective action following the procedure below.
1. Delete the cache of IE 11.
From the Tool Bar, select "Tools" > "Internet Options" > "General Tab",
and "Delete" in the "Browsing history".
Check "Cookies and website data", and press "Delete".
2. Close all IE 11 windows.
3. Start IE 11 again and log in.
11
5.1.1 Select Alarm
Select an alarm whose graph you want to display from alarm list.
Figure 8 Select Alarm
5.1.2 Alarm History
Table 5 Items of Alarm
No Item Name Description
1 Insufficient Number of alarms with insufficient condition
settings
2 Action Succeeded Number of successful alarms
3 Action Failed Number of failed alarms
Figure 9 Result of Alarm Collection
Most of data that are highly likely to be conditional settings as meaningless
alarms are distributed to Insufficient.
12
5.1.3 Graph
The graph on the horizontal axis shows time and the vertical axis shows the
number of alarms. When you move the cursor closer to the graph, you can check
the details of each time zone.
Figure 10 Alarm Graph Details
If you move the mouse wheel upwards on the graph you can zoom in, and when
you move the mouse wheel downwards it will zoom out.
5.2 Service Usage
You can check the usage of each service in the project by graph or ranking.
Figure 11 Service Usage
13
5.2.1 Select Graph of Service Usage
You can select service usage graphs from the following five.
・ Virtual Server (Default)
・ Block Storage
・ Image
・ Load Balancer
・ Network
Figure 12 Select Service
5.2.2 Graph
The graph on the horizontal axis shows time and the vertical axis shows the
operation time. The graph display period can be selected from the following three.
・ This Month (Default)
・ 6 Months
・ 12 Months
Figure 13 Graph after switching display period
Also, by moving the cursor closer to the graph, you can check the details of each
time zone. When "This month" is selected, daily details are displayed, when "6
months" or "12 months" is selected, monthly details are displayed.
14
Figure 14 Service Usage Graph Details (This Month)
5.2.3 Ranking
We will display usage status of this month in ranking format. The color of the
ranking corresponds to the color of the graph.
Figure 15 Ranking of Service Usage
15
5.3 Resource Usage
You can check the number of each item created in the project.
Table 6 Resource Usage List
No. Item Name Description
1 Virtual Server (Green) Number of running virtual server resources
2 Virtual Server (Red) Error number of virtual server resources
3 Virtual Network Number of virtual network resources
4 Port Number of resources on port
5 IP Address Number of global IP address resources
6 Block Storage Number of block storage resources
7 Total Storage Total block storage capacity
Figure 16 Resource Usage List
16
Chapter 6 Virtual Server
6.1 Virtual Servers List
You can check the list and status of the virtual servers created in the project.
Figure 17 Virtual Server List
Table 7 Virtual Server List Table
No. Item Name Description
1 Virtual Server Name Name of a virtual server
2 Status Refer to Table 8 Virtual Server Status
3 IP Address IP address of a virtual server
Display multiple lines if you have multiple IP
addresses
4 AZ The availability zone in which virtual servers
reside
5 Dedicated Display of dedicated virtual servers
"true" will be displayed for dedicated virtual
servers
6 Action Various operations on virtual servers
Table 8 Virtual Server Status
No. Status Description
1 ACTIVE Active State
2 BUILD Build State
3 DELETED Deleted State
4 ERROR Error State
5 HARD_REBOOT Forced Reboot State
6 MIGRATING Migration State
17
7 PASSWORD Password Setting State
8 PAUSED Paused state
9 REBOOT Reboot State
10 REBUILD Rebuild State
11 RESCUE Rescue State
12 RESIZE Resize State
13 REVERT_RESIZE Revert Resize State
14 SHELVED Released State (Resource
Pending)
15 SHELVED_OFFLOADED Released State
16 SHUTOFF Stopped State
17 SOFT_DELETED Deleted State (Disk is
suspended)
18 SUSPENDED Suspend State
19 UNKNOWN Unknown State
20 VERIFY_RESIZE Verify Resize State
6.1.1 Action
Figure 18 Virtual Server Action
We will provide the following as actions of the virtual server list.
1. Resize
Refer to 6.5 Resize Virtual Server.
18
2. Soft Reboot
Restart a virtual server.
3. Hard Reboot
Turn off an instance, then back on
4. Shutdown
Shutdown a virtual server.
5. Release
Release a virtual server.
6. Remote Console
Open Remote Console.
Some browsers are blocked by pop-ups. In that case please allow pop-ups.
7. Edit
Refer to 6.4 Edit Virtual Server.
8. Edit Metadata
Edit (Add/Display/Update/Delete) metadata of a virtual server.
9. Delete
Delete a virtual server.
10. Start-up
Start a virtual server.
11. Restore
Restore a virtual server.
12. Confirm Resize/Migration
Execute to resize/migrate a virtual server.
13. Cancel Resize/Migration
Cancel to resize/migrate a virtual server.
19
6.2 Virtual Server Details
You can open virtual server details by clicking a virtual server name in a virtual
server list.
Detailed information on a virtual server not displayed in a virtual server list is
displayed.
Figure 19 Virtual Server Details
20
Table 9 Virtual Server Details
No. Classification Item Name Description
1 Information Virtual Server Name Name of a virtual server
2 Virtual Server ID Unique value
3 Status Status of a virtual server
4 AZ Availability Zone
5 Dedicated Display of dedicated
virtual servers
"true" will be displayed
for dedicated virtual
servers
6 Key Pair Key Pair
7 Image Name Image Name
8 Date and Time of
Creation
Date and Time of
Creation
9 Spec Virtual Server Type Specification of a virtual
server
10 Memory Memory Size
11 Virtual CPU Number of CPUs
12 Connected Disk Access Point Connection Block
Storage
13 Connection Destination Connection Destination
Volume
14 Port Port Name Port Name
15 Virtual Network Name Virtual Network Name
16 Private IP Address Private IP Address
17 Global IP Address Displayed when a global
IP address is set.
18 Security Group Security Group Name
19 Action Various operations on
ports
20 Metadata Key Key set for virtual server
metadata
21 Value Value set for virtual
server metadata
21
6.2.1 Action
Figure 20 Port Action
As a port action it provides the following.
1. Edit
2. Security Group Settings
3. Allocate Global IP
4. Deallocate Global IP
5. Delete
22
6.3 Create Virtual Server
This is the GUI when creating a new virtual server. Click Create icon of Virtual
Server List.
6.3.1 How to Create Virtual Server
When creating a Virtual Server, it is necessary to create a virtual network in advance.
1. Click an icon of Virtual Server list
2. Set the following and click "Next".
Figure 21 Create Virtual Server (Virtual Server)
Entry of items marked with * (asterisk) to the right of the label is required. (Common to all
windows)
・ AZ
・ Virtual Server Name
・ Virtual Server Type
・ Boot Source
When "Storage" is selected, set the following.
Storage of AZ
Device name
When "Image" is selected, set the following.
Image
23
Device Size
Device Name
When "Snapshot" is selected, set the following.
Storage Snapshot
Device Name
3. Set the following and then click "Next".
Figure 22 Create Virtual Server (Virtual Network)
・ Virtual Network
4. Set the following and click "Next".
Figure 23 Create Virtual Server (Access and Security)
24
・ Key Pair
・ Security Group
5. Set the following and then click "Next".
Figure 24 Create Virtual Server (Optional)
・ Provisioning Script
・ Metadata(Up to 10 items)
Note: You can add, update, and delete the metadata from the virtual server list action
"Edit metadata".
25
6. Confirm the settings so far on the confirmation window. If there are no problems, click
"Create".
Please return to the virtual server list and make sure that the state of the created virtual
server is "BUILD". It will become available when the status is changed to "Active".
Figure 25 Create Virtual Server (Confirmation)
26
6.4 Edit Virtual Server
You can edit a server name of a virtual server. You can make transition from
"Edit" in the pull-down of the action of the virtual server you want to edit on the
virtual server list window.
6.4.1 How to Edit Virtual Server
1. Click the "Edit" from the pull-down of the virtual server that you want to edit on the virtual
server list window.
Figure 26 Virtual Server List
2. On the Edit Virtual Server window, enter a new virtual server name and click "Update".
Figure 27 Edit Virtual Server
27
6.5 Resize Virtual Server
You can change the specifications (number of virtual CPUs etc.) of a Virtual
Server. You can make transition from "Resize" of the action pull down of the
virtual server you want to change on the virtual server list window.
6.5.1 How to Resize Virtual Server
1. Click "Resize" from the pull-down of the virtual server you want to edit on the virtual server
list window.
Figure 28 Resize
2. Select a new Flavor, the number of Virtual CPUs and Memory allocated to this Flavor will
be shown under the Flavor Details section.
Figure 29 Resize Virtual Server
3. If there are no problems with the new flavor, click the "Resize" button.
4. This completes resizing a virtual server. Return to the server list window, and it will become
available when the status is changed to "ACTIVE".
28
6.6 Port Creation
Assign a new port to a virtual server. It is possible to add multiple ports to a
single virtual server.
6.6.1 How to Create a Port
1. Display the port list information from the Virtual Server Details screen
Click the "+" button on the Port List on the Virtual Server Details screen to transfer to the
Create Port screen.
Figure 30 Virtual Server Details Screen(Ports)
29
2. Create a Port
After entering the setting items on the Create Port screen, press the "Create" button to
create the port.
Figure 31 Create Port Screen
The items displayed on the Create Port screen are indicated in the table below.
Table 10 Displayed Content of Create Port Screen
No. Item Name Description
1 Port Name Name of the Port
2 AZ Availability zone where the port is created
3 Management State Management state of the port (true/false)
4 Network Name Select the Network to connect the Port to
5 Subnet Name Select the Subnet of the Network to connect the Port
to
6 Private IP Address Private IP Address settings
Perform settings in the IPv4 format.
*When an IP address that is already in use is specified,
port creation will fail.
30
3. Check the Port Details Screen
Clicking a port name on the port list on the Virtual Server Details screen displays the
Port Details screen. Here it is possible to check detailed information such as the Port ID,
etc.
Figure 32 Port Details Screen
*Operations for ports (editing/setting of security groups/allocation of global IP
addresses/deleting) can be performed from each action in 6.2.1 Action of the Virtual
Server Details screen.
31
Chapter 7 Key Pair
7.1 Key Pair List
You can check the list and status of the key pair created in a project.
Figure 33 Key Pair List
Table 11 Displayed Content of Key Pair List Table
No. Item Name Description
1 Key Pair Name Key Pair Name
2 Fingerprint Fingerprint of key pair
3 AZ The Availability Zone the key pair is in
4 Action Deletion of key pair
7.2 Key Pair Creation
Newly create the key pair to be used at the time of logging in to the virtual server.
7.2.1 How to Create a Key Pair
1. Click the creation icon "+" on the key pair list screen and display the key pair creation
screen.
32
2. On the "Key Pair Details" step screen, set the below information and click "Next Page".
Figure 34 (Entry of Key Pair Details information)
・ Key Pair Name
・ AZ
3. Check the setting content you have entered so far on "Confirmation" screen. If there are
no problems, click "Create".
Figure 35 (Confirmation for Setting Content)
4. If a key pair has been created, a private key is then started to be downloaded. Keep it in
a secure location.
7.3 Key Pair Import
Import the key pair created in another place in order to use it in the virtual server
of K5. Here register a public key only.
7.3.1 How to import the key pair
1. Click "Import Key Pair" on the Key Pair List screen.
33
2. Set the below information and click "Create"
Figure 36 Entry of key pair details information
・ Key Pair Name
・ Public Key
・ AZ
3. Check the setting content you have entered so far on the confirmation screen. If there
are no problems, click "Create".
Figure 37 Confirmation of Setting Content
34
7.4 Key Pair Details
Click the key pair name on the key pair list to open "Key Pair Details" screen.
Check the detailed information not displayed on the key pair list.
Figure 38 Key Pair Details
Table 12 Displayed Content of Key Pair Details
No. Category Item Name Displayed Content
1 Key Pair Details Key Pair Name Key Pair Name
2 Created At Created At
3 Fingerprint Fingerprint of Key Pair
4 Public Key A string of the key of a key pair
5 AZ Availability Zone where a key
pair exists
35
7.5 Key Pair Deletion
You can delete a key pair.
7.5.1 How to delete a key pair
1. On "Key Pair List" screen, click the "Delete" button of the key pair you want to delete.
Figure 39 Key Pair List (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 40 Confirmation Dialog of Deletion
36
Chapter 8 Image
8.1 Image List
You can check an available image list and status, etc.
Figure 41 Image List
Table 13 Image List Table
No. Item Name Description
1 Image Name Name of an image
2 Status Status of an image
3 Visibility Visibility of an image
4 Protection Protected or not
5 Disk Format Format of an image disk
6 Action Various operations on an image
37
8.1.1 Action
Figure 42 Images Action
Provides the following as an action of an image list.
1. Create Virtual Server
Create a virtual server based on the selected image. For the virtual server
creation, refer to 6.3 Create Virtual Server.
2. Create Storage
Create storage based on the selected image. For the storage details, refer to
10.2 Storage Details.
38
8.2 Image Details
You can open image details by clicking an image name on an image list.
Detailed information on an image not displayed in an image list is displayed.
Figure 43 Image List
Table 14 Image Details
No. Classification Item Name Description
1 Information Image Name Image Name
2 Image ID ID to identify an image in unique
3 Status Status
4 Visibility Visibility
5 Protection Protection
6 Checksum Checksum of an image
7 Date and Time
of Creation
Date and Time of Creation
8 Date Updated Date Updated
9 Spec Size Size
10 Storage Format Storage Format
11 Disk Format Disk Format
12 Minimum Disk Minimum Disk Size
13 Custom
Attribute
- -
39
Chapter 9 Schedule
9.1 Schedule List
You can check a list and status of schedule created in a project.
Figure 44 Schedule List
Table 15 Schedule List Table
No. Item Name Description
1 Schedule Name Name of a Schedule
2 Time of Execution Time of Schedule Execution
3 Action Deletion of Schedule
9.2 Create Schedule
This is the GUI when creating a new schedule .Click Create icon of Schedule List
9.2.1 How to Create Schedule
When creating a Schedule, it is necessary to create a stack including a scaling policy.
1. Click an icon of schedule list
2. Set the following and click "Next".
40
Figure 45 Entry of Schedule Details information
Schedule Name
Time of Execution
Click "Setting" and set the following.
If "Monthly" is selected, set the below information
Figure 46 Time of Execution Setting(Monthly)
41
If "Weekly" is selected, set the below information
Figure 47 Time of Execution Setting(Weekly)
If "Daily" is selected, set the below information
Figure 48 Time of Execution Setting(Daily)
42
If "Hourly" is selected, set the below information
Figure 49 Time of Execution Setting(Hourly)
If "cron" is selected, set the below information
Figure 50 Time of Execution Setting (cron)
3. Set the following and click "Next"
Figure 51 Setting Execution URL
43
・ Stack
・ Resource
・ Execution URL
Execution URL is automatically set from "Stack" and "Resource".
4. Confirm the settings so far on the confirmation window. If there are no problems, click
"Create"
Figure 52 Confirmation for Setting Content
9.3 Schedule Details
Click the schedule name on the schedule list to open "Schedule Details" screen.
Check the detailed information not displayed on the schedule list.
Figure 53 Schedule Detail
44
Table 16 Displayed Content of Schedule Details
No. Category Item Name Displayed Content
1 Schedule Details Schedule Name Schedule Name
2 Time of Execution Time of Schedule
Execution
3 Execution URL Execution URL
9.4 Schedule Deletion
You can delete a schedule.
9.4.1 How to delete Schedule
On "Schedule List" screen, click the "Delete" button of the schedule you want to delete
Figure 54 Schedule List
1. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 55 Confirmation Dialog of Deletion
45
Chapter 10 Storage
10.1 Storage List
You can check a list and status of block storage created in a project.
Figure 56 Block Storage List
Table 17 Block Storage List Table
No. Item Name Description
1 Volume Storage Name of the volume
2 Status Major Storage Status
・ in-use : In use
・ creating : Creating
・ available : Available
3 Connected Virtual
Server
Access point when connected to a virtual server.
4 Size (GB) Volume Capacity
5 Type Type of volume
6 AZ The availability zone in which block storage
reside
7 Action Various operations for a volume
46
10.1.1 Action
Figure 57 Storage Action
Provide the following as actions of a storage list.
1. Edit Storage
Refer to 10.4 Edit Storage.
2. Delete Storage
Delete a storage.
3. Disconnect Storage
Refer to 10.5 Disconnect Storage.
4. Edit Connection
Refer to 10.6 Connect Storage.
5. Create Snapshot
Refer to 10.7 Create Snapshot.
47
10.2 Storage Details
You can open storage details by clicking a volume name of a storage list.
Detailed information on a storage not displayed in a storage list is displayed.
Figure 58 Storage Details
48
Table 18 Virtual Server Details
No. Classification Item Name Description
1 Information
Volume Name Volume Name
2 Volume ID Volume ID
3 Description Description of the volume
4 Status The volume status, in-use, etc.
5 Connected
Virtual Server
The connected virtual server
6 Size(GB) Volume capacity
7 Type Volume type
8 AZ Availability Zone
9 Date and Time
of Creation
Created date of Volume
10 readonly Readonly mode
11 attached_mode Read, write, execute
12 Snapshot Date and Time
of Creation
Created date of Snapshot
13 Snapshot
Name
Name of Snapshot
14 Description Snapshot description input by a user
15 Size (GB) Capacity of Snapshot
16 Action Various operations on a snapshot
49
10.3 Create Storage
This is the GUI when creating a new storage. You can make transition from an
icon on a storage list window.
10.3.1 How to Create Storage
1. Click an icon on a storage list window.
2. Set the following and click "Create".
Figure 59 Create Storage
・ Volume Name
・ Description
・ Type
・ Size (GB)
・ Storage Source
Select a snapshot name to use if you select "snapshot".
Select images and AZ if you select "image".
Select a storage to use if you select "storage".
50
10.4 Edit Storage
10.4.1 How to Edit Storage
Figure 60 Edit Storage
You can edit the following. Click "UPDATE" after editing.
・ Volume Name
・ Description
10.5 Disconnect Storage
If a selected volume is connected to a Virtual Server, you can detach it from the
Virtual Server.
10.6 Connect Storage
It is possible to connect selected volumes to a Virtual Server.
10.7 Create Snapshot
10.7.1 How to Create Snapshot
1. Enter the following in Create Snapshot window, and click "CREATE".
Figure 61 Create Snapshot
・ Snapshot Name
・ Description
51
Chapter 11 Object Storage
11.1 Function Overview
This function provides the functionality for object storage on the IaaS Service
Portal. It enables use of online storage in which data can be stored and
retrieved on an object (their content and metadata) basis.
The functions provided are as follows:
・ Containers
Display of lists and details of containers
Creation, editing, and deletion of containers
Setting of access policies (ACL) for containers *1
Creation and deletion of container metadata
・ Objects
Display of lists and details of objects
Creation and deletion of objects
Re-upload of objects and editing of metadata
Download of objects and VM(Virtual Server) import
*1 The setting of access policies (ACL) for containers is a function that
enables the setting of container read privileges (X-Container-Read)
and write privileges (X-Container-Read). Using these settings it is
possible control access to containers by the following:
- Projects/users
- Referer headers included in HTTP requests
52
11.2 Usage Methods of Object Storage
This chapter explains the following usage methods:
・ Create a container
・ Create an object
・ Download an object
・ Import a VM image
11.2.1 Create a Container
1. Display the Containers List window
Clicking [Storage] -> [Object Storage] displays the Containers List window.
On this window it is possible to refer to the container name, the number of
objects, the amount of usage, and the access policies (ACL) of each
container.
Clicking the "+" button on the Containers List window displays the Create
Container window.
Figure 62 Containers List Window
2. Create a container
After entering each item on the Create Container window, click the "Create"
button and create the container. The created container will be displayed in the
Containers List window.
53
Figure 63 Create Container Window
The setting items listed below are those required when creating a
container.
Table 19 Entry Items for Container Creation
No. Item* Description
1 Container Name The name of the container
2 X-Container-Read The access policy (ACL) settings for read
privileges
3 X-Container-Write The access policy (ACL) settings for write
privileges
4 X-Versions-Location The name of the container for versioning
management
5 Container Metadata The key and value to set for the container
metadata
X-Container-Meta-
Access-Control-Allow-
Origin
"*" : Initial value
Note: If this value is changed uploading and
downloading of files from the portal is not
possible.
X-Container-Meta-
Access-Control-Max-Age
"3628800" : Initial value
*For details on each item, refer to the "API Reference - Foundation Service".
54
3. Check the Container Detail window
The detailed information of a container can be referred to by clicking the
container name on the Containers List window. The Container Detail window
displays objects, container information, and container metadata.
Figure 64 Container Detail Window
55
The following table indicates the items displayed on the Container Detail
window.
Table 20 Container Detail Window Display Items
No. Category Item Description
1 Objects Object Name The name of the object
2 Size The size of the object
3 Content-Type The MIME type of the
object
4 Update Date and
Time (UTC)
The date and time when
the object was created or
metadata was changed
5 Container Info Container Name The name of the container
6 Object Counts The total number of
objects in the container
7 Size The size (in bytes) of the
objects in the container
8 X-Container-Read The access control (ACL)
for read privileges
9 X-Container-Write The access control (ACL)
for write privileges
10 X-Versions-
Location
The name of the container
for versioning
management
11 X-Trans-Id The ID assigned to the
request
12 Execution Date
and Time (UTC)
The date and time the
transaction is to be
executed
13 Container
Metadata
Container
Metadata Key
The key to set for the
container metadata
14 Container
Metadata Value
The value to set for the
container metadata
56
11.2.2 Create an Object
1. Display the object list information from the Container Detail window
The object list information can be referred to from the Container Detail
window. The object name, size, Content-Type, and Update Date and Time
(UTC) are displayed in the object list information.
Clicking the "+" button on the Container Detail window displays the Create
Object window.
Figure 65 Container Detail Window (Object Section)
Another method for transferring to the Create Object window is to click
"Create Object" in the Action menu on the Containers List window.
57
2. Create an object
After entering each item on the Create Object window, click the "Create"
button and create the object. If the name matches that of an existing object, a
dialog checking whether to update the object will be displayed.
Figure 66 Create Object Window
58
The following table indicates the items displayed on the Create Object
window.
Table 21 Create Object Window Display Items
No. Item* Description
1 Object Name The name of the object
2 File The file to register
The maximum file size is 1 GB.
*When registering a file larger than 1 GB, the
setting for a large object is necessary.
*Please split files by yourself.
3 X-Detect-Content-
Type
Automatic and manual setting of the MIME
type of the object
4 Content-Type The MIME type setting of the object
5 X-Copy-From
Container
The name of the container of the source object
6 X-Copy-From Object The name of the source object
7 ETag The setting for the MD5 check sum value of
the object
8 Content-Disposition The setting for the behavior of the browser
9 Delete At Date (UTC) Specification of the time and date for deletion
of the object, in UTC format
10
Large Object
The setting regarding large objects
There are the following three methods
No settings The setting when not handling as a large
object
X-Object-Manifest The setting for dynamic large objects
Sets the container name/object name.
multipart-manifest The setting for static large objects
Sets using JSON format.
11 Object Metadata The key and value to set for the object
metadata
*For details on each item, refer to the "API Reference - Foundation Service".
59
3. Check the Object Detail window
Clicking the object name in the Object List on the Container Detail window
displays the Object Detail window. You can refer to detailed information such
as object metadata, etc.
Figure 67 Object Detail Window
60
The following table indicates the items displayed on the Object Detail
window.
Table 22 Object Detail Window Display Items
No. Item Description
1 Object Name The name of the object
2 Content-Length The size of the object
3 Content-Type The MIME type of the object
4 Update Date The date and time when the object was
created or metadata was changed
5 ETag The MD5 check sum value of the object/
"A character string consisting of the ETag of
each segment of the manifest combined with
the value of the MD5 check sum" (for manifest
objects)
6 Content-Encoding The Content-Encoding meta data value
7 Content-Disposition The setting value for the behavior of the
browser
8 Delete At Date (UTC) The scheduled time and date for deletion of the
object
9 X-Object-Manifest The setting for dynamic large objects (the
container name and the prefix name of the split
object)
10 X-Static-Large-Object If the object is the manifest object of a static
large object, "True" will be returned
11 X-Trans-Id The ID assigned to the request
12 Transaction Date The date and time the transaction is to be
executed
13 URL The URL of the download target object
14 Object Metadata Key The key to set for the object metadata
15 Object Metadata
Value
The value to set for the object metadata
61
11.2.3 Download an Object
There are the following two methods for downloading an object.
Clicking the "Download" button on the Object Detail window
Selecting from the Action menu of the object list on the Container Detail
window
Figure 68 Object Action Menu on the Container Detail Window
Advisory Notes
・ It is necessary to configure the following setting in IE 11:
Click [Tools] > [Internet options] > [Security] > [Custom level], and then
select "Enable" for [Access data sources across domains].
Uploading and downloading of files may take approximately 90 minutes per
GB depending on the time of day, the amount of data, and the distance to the
target region the data is being transferred to.
Note: By viewing [F12 developer tools] > [Network] in IE 11, it is possible to
confirm the processing status of each API issued from the portal.
11.2.4 Import a VM Image
It is possible to select VM Import from the Action menu on the Container
Detail window to import a virtual server image to the K5 service. Selecting "VM
Import" on the Action menu transfers you to the VM Import window. For details
on VM import, refer to 29.2.1 VM Import.
62
11.3 Advisory Notes
With the container deletion function, it is only possible to perform "Delete"
from the Action menu on the Container List window when the number of
objects in a container is "0".
Regarding the access policy (ACL) settings, as setting permission for
referrer makes reading possible without authentication using a token, it
is not recommended as it lowers the security level. For details, refer to
the "API Reference - Foundation Service".
When you want to register split objects as a single object, perform
settings for a large object. This integrates split objects, enabling batch
download as a single object and VM import.
The maximum number of objects that can be displayed on the Container
Detail window is 10,000. If it is necessary to obtain a list of objects when
the maximum has been exceeded, obtain the list using an API.
63
Chapter 12 Snapshot
12.1 Snapshot List Screen
You can display a list of snapshots created in a project and perform operations for
(edit/delete) the snapshots.
Figure 69 Snapshot List
Table 23 Displayed Content of Snapshot List Table
No. Item Name Description
1 Snapshot Name Name of a snapshot
2 Description Description set by a user
3 Capacity(GB) Capacity of snapshot a snapshot (GB)
4 Status Snapshot Status
5 AZ Availability Zone in which a snapshot resides.
6 Action Various Operations for a snapshot
64
12.1.1 Action
Figure 70 Snapshot Action
The following are provided as the actions toward a list of snapshots.
1. Edit
Refer to 12.3 Edit Snapshot Screen.
2. Delete
Delete a snapshot.
12.2 Snapshot Details Screen
Click a specific Snapshot Name on the Snapshot List screen and you can check the
detailed information on the snapshot.
Figure 71 Snapshot Details
65
Table 24 Displayed Content of a Snapshot Details Table
No. Classification Item Name Description
1 Information Snapshot Name Name of a snapshot
2 Snapshot ID Unique value attached to a snapshot
3 Description Description set by a user
4 Status Snapshot Status
5 Volume ID The ID of the volume from which a
snapshot is obtained
6 Connected
Virtual Server
The name of the connected virtual
server
7 AZ Availability Zone in which a snapshot
resides
8 Spec Capacity Capacity of snapshot a snapshot (GB)
9 Date and Time of
Creation
Date and time in UTC time when a
snapshot was created
12.2.1 Restore a Snapshot
It is possible to restore block storage from a snapshot. Click the "Restore"
button on the Snapshot Detail screen.
Figure 72 Restore a Snapshot
66
12.3 Edit Snapshot Screen
You can edit the following information. After you have edited it, click "UPDATE".
Figure 73 Edit Snapshot
・ Snapshot Name
・ Description
12.4 Advisory Notes
Snapshots can only be restored when the following conditions are met.
- The Status of the snapshot is "available"
- The Status of the volume is "in-use"
- The Status of the server is "SHUTOFF"
67
Chapter 13 Virtual Network
13.1 Virtual Network List
You can check the list and status of Virtual Networks created in the project.
Figure 74 Virtual Network List
Table 25 Virtual Network List
No. Item Name Description
1 Virtual Network Name Name of a virtual network
2 Status Network Status
3 Allocated Subnet Allocated Subnet
4 AZ Availability Zone in which a virtual network
resides
5 Shared Shared Status
6 Management State Management State
7 Action Various operations on a virtual network
68
13.1.1 Action
Figure 75 Virtual Network Action
As actions of a virtual network list we provide the following.
1. Edit
Refer to 13.4 Edit Virtual Network.
2. Delete
Delete a virtual network.
13.2 Virtual Network Details
You can open virtual network details by clicking a virtual network name in the
virtual network list.
Display detailed information on a virtual network that is not displayed in a
virtual network list.
Figure 76 Virtual Network Details
69
Table 26 Virtual Network Details
No. Classification Item Name Description
1 Virtual Network
Overview
Virtual Network Name Name of a virtual server
2 Virtual Network ID Unique Value
3 Project ID Virtual Server Status
4 AZ Availability Zone
5 Status Always ACTIVE
6 Management State UP / DOWN
7 Shared Yes / No
8 External Virtual Network Yes / No
9 Provider Virtual Network -
10 Subnet Subnet Name Subnet Name
Link to Subnet Detail
11 Virtual Network Address Virtual Network Address
12 IP Version IPv4 / IPv6
13 Gateway IP Set Gateway IP
14 Action Various operations on
subnet
15 Port Port Name Port Name
16 Private IP Private IP
17 Connected Device Type of Connected
Device
18 Connected Virtual Server Virtual Server ID
19 Status ACTIVE, etc.
20 Management State UP / DOWN
21 Action Edit operation for port
70
13.2.1 Action for Subnet
Figure 77 Subnet Action
As subnet actions, it provides the following.
1. Edit (edit subnet name, select Gateway "Yes" or "No")
2. Delete
13.2.2 Action for Port
Figure 78 Port Action
As port actions, it provides the following.
1. Edit (edit a port name, select an management state "UP" or "DOWN", edit a private IP
address)
2. Delete
13.3 Create Virtual Network
This is a screen to create a new virtual network. Click Create icon of Virtual
Network List window.
13.3.1 How to Create Virtual Network
1. Click an icon of virtual server list window.
71
2. Set the following and click "Next".
Figure 79 Create Virtual Network (Virtual Network)
・ AZ
・ Virtual Network Name
・ Management State
3. Set the following and click "NEXT".
Figure 80 Create Virtual Network (Subnet)
・ Create Subnet (Yes/No)
・ Subnet Name
・ Virtual Network Address (e.g. 192.168.0.0/24)
・ Gateway (Yes/No)
・ Gateway IP
Existing
Existing
72
4. Set the following and click "Create".
Figure 81 Create Virtual Network (Subnet Details)
・ DHCP (Enable/Disable)
・ IP Address Allocation Pool
Click "Add" to assign multiple address ranges.
・ DNS Server
Click "Add" to set multiple DNS servers.
・ Adding a Routing Setting
Click "Add" to set multiple routes.
5. Confirm the settings so far on the confirmation window. If there are no problems, click
"CREATE".
74
13.4 Edit Virtual Network
13.4.1 How to Edit Virtual Network
You can edit the following. After editing, click "UPDATE".
Figure 83 Edit Virtual Network
・ Virtual Network Name
・ Management State (UP/ DOWN)
13.5 Add Subnet
In case user does not create subnet in the timing of "Create Virtual Network"
operation, it is possible to add subnet from Virtual Network Detail Window.
75
Chapter 14 Virtual Router
14.1 Virtual router list
On the Virtual router list screen, you can display a list of virtual routers
created in a project and perform operations (Newly create/Delete/Gateway
settings/Delete gateway) for the virtual routers.
Figure 84 Virtual router list
Table 27 Displayed Content of a Virtual Router List Table
No. Item Name Description
1 Virtual router name Name of a virtual router
2 Status Virtual router status
*ACTIVE : In operation
3 AZ Availability Zone in which a virtual router is
located
4 Action Various operations for a virtual router
76
14.1.1 Action
Figure 85 Virtual Router Actions
The following are provided as the actions for a list of virtual routers.
1. Edit
Edit virtual router.
2. Delete
Delete a virtual router.
14.2 Virtual Router Overview
Click a specific Virtual Router Name on the Virtual router list screen and you
can check the detailed information on the snapshot. If ports exist, you can
display a list of ports and perform operations (Delete/Edit/Allocate Global IP) for
the ports.
Figure 86 Virtual Router Overview
77
Table 28 Displayed Content of a Virtual Router Details Table
No. Classification Item Name Description
1 Virtual Router
Overview
Virtual Router Name Name of a virtual router
2 Virtual Router ID Unique value attached to a virtual
router
3 AZ Availability Zone
4 Status Virtual router status
5 External Gateway IP address of an external gateway
6 Routing
Configuration
Destination Destination network address(CIDR)
7 Nexthop Nexthop IP address
8 Interface Port Name Name of a port
9 Private IP Private IP
10 Global IP Global IP
11 Classification network:router_interface, etc.
12 Management State true / false
13 Status Interface Status
ACTIVE, etc.
14 Action Various operations for an interface
14.2.1 Action
Figure 87 Interface actions
The following are provided as the actions for an interface.
1. Delete
Deletes a port.
2. Edit
Edits a port.
3. Allocate Global IP
Allocates a global IP.
78
14.3 Virtual Router Creation
On the Create a new router screen, you can newly create a virtual router.
14.3.1 How to create a virtual router
1. Click the icon of the Virtual router list.
2. Set the below information and click "CREATE".
・ AZ
・ Virtual router name
Figure 88 Create a new router
14.4 Edit a Virtual Router
On the Edit Virtual Router screen, it is possible to edit the gateway settings and
the routing configuration.
14.4.1 How to edit a virtual router
1. On the Virtual Router Detail screen, click the "Edit" Action of the virtual router to edit.
2. On the Edit Virtual Router screen, you can edit the following. After editing, click "Update".
・ Gateway Setting
You can select a candidate External Virtual Network from the pull-down menu.
・ Routing Configuration
Routing can be added by clicking "Add" after configuring the Destination and
Nexthop.
Routing can be deleted by clicking "Delete".
79
Figure 89 Edit Virtual Router
14.5 Add interface
You can newly add an interface on the Virtual Router Overview screen. See below
for the Add interface screen.
Figure 90 Add interface
80
Chapter 15 Security Group
15.1 Security Group List
You can check the list and status of the Security Group created in a project.
Figure 91 Security Group List
Table 29 Displayed Content of Security Group List Table
No. Item Name Description
1 Security Group Name Security Group Name
2 Description Description of Security Group
3 Action Various Operations for Security Group
15.1.1 About Operation
Figure 92 Security Group Action
81
See below for the operations for security group.
1. Manage Rules
Refer to 15.4, 15.5, 15.6, and 15.7.
2. Edit a Security Group
Refer to 15.9.
3. Delete
Refer to 15.10.
15.2 Security Group Creation
Newly create a security group.
15.2.1 How to create a security group
1. Click the creation icon "+" at the upper right on the security group list screen.
2. Set the below information and click "Next Page".
Figure 93 (Security Group Details)
・ Security Group Name
・ Description
3. Check the setting content you have entered so far on the confirmation screen. If there
are no problems, click "Create".
82
Figure 94 Confirmation for Setting Content
15.3 Security Group Details
Click Security Group Name on the security group list to open the Security Group
Details.
You can check the detailed information not displayed on the security group list.
Figure 95 Security Group Details
83
Table 30 Displayed Content of Security Group Details
No. Category Item Name Description
1 Security Group Details Security Group Name Security Group Name
2 Security Group ID Security Group ID
3 Description Description of Security
Group
4 Applied Rule Direction ingress/egress
5 IP Version IPv4/IPv6
6 Protocol TCP / UDP / ICMP /
Other protocols
7 Port Range Port Range
* In case of "ICMP"
specified as protocol,
this value should be
ICMP type and code.
8 Connected to Connected to
15.4 Manage Security Group Rules
You can check the list and status of the security group and add/import/export
rules.
Figure 96 Security Group Rule Management
84
Table 31 Displayed Content of Manage Security Group Rules
No. Item Name Description
1 Security Group Name Security Group Name
2 Direction ingress/egress
3 IP Version IPv4/IPv6
4 Protocol HTTP / HTTPS / TCP / SSL
5 Port Range Port Range
6 Connected to Destination of Connection
7 Action Deletion of security group rules
15.4.1 How to Transfer to the Rule Management Screen
On the security group list, select "Manage Rules" from the pull-down menu of the
security group you want to manage for its rules, or click the "Manage Rules"
button on the Security Group Details screen to go to the Rule Management
screen.
Figure 97 Security Group List (Rule Management)
Figure 98 Security Group Details (Rule Management)
85
15.5 Addition of Security Group Rules
You can newly add the rules to an existing security group.
15.5.1 How to Add Security Group Rules
1. Click the "Add Rule" button on the Manage Security Group Rules screen.
Figure 99 Rule Management (Rule Addition)
2. Set the below information and click "Add". (*1)
Figure 100 Add Rule
・ Rule
If "Custom TCP Rule" or "Custom UDP Rule" is selected, set the below information.
Direction (Receive/Send)
Open Port (Port/Port Range)
Connected to (CIDR/Security Group)
If "Custom ICMP Rule" is selected, set the below information.
Direction (Receive/Send)
Type
Code
Connected to (CIDR/Security Group)
If you select "Other Protocols", set the below information.
86
Direction (Receive/Send)
IP Protocol
Connected to (CIDR/Security Group)
If you select "ALL ICMP", "ALL TCP(1-65535)", or "ALL UDP(1-65535)", set the
information below.
Direction (Receive/Send)
Connected to (CIDR/Security Group)
If you select "DNS(53)", "HTTP(80)", "HTTPS(443)", "IMAP(143)", "IMAPS(993)",
"LDAP(389)", "MS SQL(1433)", "MYSQL(3306)", "POP3(110)", "POP3S(995)",
"RDP(3389)", "SMTP(25)", "SMTPS(465)", or "SSH(22)", set the information
below.
Connected to (CIDR/Security Group)
*1
In "Add Rule", you cannot add the same rule as the one added by default when
a security group is created. If you want to add the same rule, export the default
rule and import it. Please refer to 15.6 for how to export and 15.7 for how to
import.
Figure 101 Rule Management (Default Rules)
87
15.6 Export Security Group Rules
You can export security group rules.
15.6.1 How to Export Rules
1. Click the "Export" button on the Manage Security Group Rules screen.
Figure 102 Rule Management (Export)
2. The security group rule list is downloaded in the JSON format.
Figure 103 Rule Management (Export File Download)
15.7 Import Security Group Rules
You can import security group rules.
15.7.1 How to Import Rules
1. Click the "Import" button on the Manage Security Group Rules screen.
Figure 104 Rule Management (Import)
2. Click the "Import" button and select a file to import.
Figure 1055 Confirmation of Importing Rules
88
3. A security group rule is created from an imported file.
15.8 Deletion of Security Group Rules
You can delete security group rules.
15.8.1 How to Delete Rules
1. Click the "Delete" button of the rule to be deleted on the Manage Security Group Rules
screen.
Figure 106 Manage Security Group Rules (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 107 Confirmation of Deletion
89
15.9 Editing a Security Group
You can edit the group name and description of a security group.
15.9.1 How to Edit a Security Group
1. On the Security Group List screen, select "Edit a Security Group" from the pull-down
menu of the security group to be edited.
Figure 108 Security Group List (Edition)
1 On the Edit a Security Group screen, enter the new security group name and description
and click "Update".
Figure 109 Edit a Security Group
90
15.10 Deletion of Security Group
You can delete a security group.
15.10.1 How to Delete a Security Group
1. On the security group list screen, select "Delete" from the pull-down menu of the security
group to be deleted.
Figure 110 Security Group List (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 111 Confirmation of Deletion
91
Chapter 16 Global IP
16.1 Global IP List
You can refer to a list of reserved global IP.
Figure 112 Global IP List
16.1.1 Action
Figure 113 Global IP Action
16.2 Reserved Global IP
You can allocate global IP from a port action of virtual server details. Click "Add"
from a global IP list window when you get a new global IP.
1. Select Global IP Pool and click "NEXT".
Figure 114 Reserved Global IP (Reserved Global IP)
92
2. When you want to associate the acquired global IP with a port, select
"Global IP Address assignment port", and click "Next".
If you do not assign to a port, leave a "Global IP Address assignment port"
blank and click "Next".
Figure 115 Reserved Global IP (port assignment)
3. Confirm the settings so far on the confirmation window. If there are no problems, click
"SETTING".
Figure 116 Reserved Global IP (Confirmation)
16.3 Allocate Global IP
Select a resource to be allocated from the global IP address assignment port, and click
"SETTING".
Figure 117 Allocate Global IP
93
16.4 Deallocate Global IP
Deallocate the global IP assigned to the resources like a virtual server from the
resource.
Figure 118 Deallocate Global IP
16.5 Release Global IP
IP addresses that are no longer needed will be released from the global IP pool
by clicking "Release".
Figure 119 Release Global IP
94
Chapter 17 Firewall
17.1 Function Overview
This function provides the functionality for managing firewalls. The following
functions are provided.
・ Firewall
Display of lists and details of firewalls
Creation, editing, and deletion of firewalls
Association of firewalls and virtual routers
Association of firewalls and firewall policies
・ Firewall Policy
Display of lists and details of policies
Creation, editing, and deletion of policies
Association of policies and firewall rules (Registration, deletion, and
sorting)
・ Firewall Rule
Display of lists and details of rules
Creation, editing, and deletion of rules
The created firewall, firewall rule, firewall policy, and virtual router must be in
the same availability zone to be used.
95
17.2 Firewall List Screen
Selecting [Side Bar]-[Networking]-[Firewall] displays the Firewall List screen
(Refer to "Figure 120 Firewall List"). This section explains the screen that is
initially displayed.
Figure 120 Firewall List
Create a Firewall
Display Firewall Details
Display Policy Details
Display Firewall Rule List
Operate the Firewall
Display Firewall Policy List
96
17.3 Firewall Creation Procedure
The procedure for creating a firewall is given below.
(1) Confirm a Virtual Router
When creating a firewall, associate the firewall with a virtual router. Confirm
that the virtual router has been created in advance. If it has not been
created, refer to "14.3 Virtual Router Creation" and create a virtual router.
Figure 121 Virtual Router List
(2) Create a Firewall Rule
Click the "Rule List" button on the Firewall List screen. Clicking the "+"
button on the Firewall Rule List screen creates a firewall rule.
Figure 122 Firewall Rule List
z
z
z
97
(3) Create a Firewall Policy
Click the "Policy List" button on the Firewall List screen. Clicking the "+"
button on the Firewall Policy List screen creates a firewall policy. On the
Create Firewall Policy screen, select the firewall rule created in (2). Clicking
the "Sort" button enables sorting of the selected rules into the desired order.
For the sorting method, refer to "17.3.1 Firewall Rule Sorting Operation".
(4) Create a Firewall Policy
It is possible to register multiple firewall rules with a firewall policy. The
validity of registered rules is verified in ascending order, and if verification is
successful the action set for the rule (Allow/Deny) is performed. If you want
to change the order of rule application, selecting the following menu displays
the Sort Firewall Rule screen (Refer to "Figure 119 Sorting Firewall Rules").
- Click "Reflect order display" on the Create Firewall Policy screen.
- Click "Reflect order display" on the Edit Firewall Policy screen".
Figure 123 Firewall Policy List
98
(5) Create a Firewall
Clicking the "+" button on the Firewall List screen creates the firewall. On the
Create Firewall screen, set the firewall policy created in (3) and the already
created virtual router from (1).
Figure 124 Firewall List
17.3.1 Firewall Rule Sorting Operation
It is possible to register multiple firewall rules with a firewall policy. The validity
of registered rules is verified in ascending order, and if verification is successful
the action set for the rule (Allow/Deny) is performed. If you want to change the
order of rule application, selecting the following menu displays the Sort Firewall
Rule screen (Refer to "Figure 125 Sorting Firewall Rules").
- Click "Reflect order display" on the Create Firewall Policy screen
- Click "Reflect order display" on the Edit Firewall Policy screen
Figure 125 Sorting Firewall Rules
99
This section explains the operation procedure for the Sort screen.
(1) Set the values in the "Sort" text field in the desired order. An example of sorting
is given in the following figure.
*The default value (integer) of the order of sorting is the same as the order
defined on this portal. It has no connection to the upper limit of rules.
*If you need to set a higher sorting priority than 1, it is possible to do so by
specifying a minus integer for sorting. [Input value: Integers in the range of -
999 (high priority) to 999 (low priority)]
*If the same value is set at the same time in multiple rules, reordering of those
rules will not be performed.
Example:
When moving FirewallRuleA to between FirewallRuleC and FirewallRuleD.
(2) Clicking the "Reflect order display" button sorts the rules in the order of the
specified values.
(3) After confirming the rules are in the desired order, click the "Fix" button to
close the window. If the "Fix" button is clicked even without the "Reflect order
display" button being clicked, the order settings will be reflected anyway.
Change
FirewallRuleA's order to
Reflect order
100
17.4 Advisory Notes
This section explains the advisory notes for each function.
・ Indication of "Source IP [Port]" and "Destination IP [Port]" on the Firewall Rule
List
If an IP address and port number are not set, "(any)" will be displayed in the
"Source IP [Port]" and "Destination IP [Port]" fields. If the source or
destination port is set, "[the_port_number]" or
"[the_range_of_port_numbers]" will be displayed.
101
Chapter 18 Load Balancer
18.1 Load Balancer List
The load balancers explained in this section are provided for Japan East
1/Japan East 2/Japan West 1/Japan West 2/UK/Finland/Germany/Spain/US
region. Please refer to Chapter 19 Load Balancer (Western Japan Region 3)
when using Western Japan Region 3.
You can check a list and status of load balancers created in the project.
Figure 126 Load Balancers List
Table 32 Load Balancer List Table
No. Item Name Description
1 Load Balancer Name Name of a load balancer
2 DNS Name FQDN for accessing a load balancer
3 Status Status of a load balancer (In Service, etc.)
4 Action Various operations on a load balancer
18.1.1 Action
Figure 127 Load Balancer Action
You can select the necessary Action based on the content of each target screen.
102
18.2 Load Balancer Details
You can open load balancer details by clicking a load balancer name in a load
balancer list.
Detailed information on a load balancer not displayed in a load balancer list is
displayed.
Figure 128 Load Balancer Details
Table 33 Load Balancer Detailed
No. Classification Item Name Description
1 Load Balancer
Information
Load Balancer Name Name of a load balancer
2 Type public / internal
3 Grade Standard / Middle / High
4 Listener Load Balancer
Protocol
HTTP / HTTPS / TCP /
SSL
5 Load Balancer Port Listen Port Number of a
load balancer
6 Virtual Server
Protocol
HTTP / HTTPS / TCP /
SSL
7 Virtual Server Port Listen Port Number of a
virtual server
8 Certificate Select for HTTPS, SSL
103
9 Session Persistence
Policy
Policy Name
10 SorryServer Redirect
Policy
Policy Name
11 Subnet Information Subnet Subnet Name
12 Security Group
Information
Security Group Security Group Name
13 Health Check
Information
Health check
consecutive success
times judged as
recovery
Times
14 Health check
execution time
interval (sec)
Seconds
15 Protocol HTTP / HTTPS / TCP /
SSL
16 Port Port Number
17 URL Health check target URL
18 Health check
response timeout
time (sec)
Seconds
19 Health check
consecutive failed
times judged as faulty
Times
20 Virtual Server
Information
Virtual Server Name Virtual server name of
distribution target
21 IP Address IP Address
22 Status Virtual Server Status
23 AZ Availability Zone
24 Dedicated Display Dedicated Virtual
Servers
"true" is displayed for
dedicated virtual servers.
25 Policy Information Policy Name Policy Name
104
26 Session
Persistence Policy
Information
Maximum time to
maintain session
(sec)
Seconds
27 Policy Information
Policy Information
to redirect to
SorryServer
Policy Name Policy Name
28 Redirect Destination
Location URL
URL
105
18.3 Create Load Balancer
This is the GUI when creating a new load balancer. You can make transition
from an icon on a load balancer list window.
18.3.1 How to Create Load Balancer
1. Click an icon of load balancer list.
2. Set the following and click "NEXT".
Figure 129 Create Load Balancer (Load Balancer Definition)
・ Load Balancer Name
・ Type (public/internal)
・ Grade (Standard, Middle or High)
・ Load Balancer Protocol (HTTP/HTTPS/TCP/SSL)
・ Listen Port Number of a load balancer
・ Virtual Server Protocol (HTTP/HTTPS/TCP/SSL)
・ Listen Port Number of a virtual server
・ Certificate (if you select HTTPS or SSL as a load balancer protocol)2
2 Certificate cannot be registered on IaaS Service Portal. For certificate registration, please use API.
106
3. Set the Subnet and click "NEXT".
Figure 130 Create Load Balancer (Subnet Settings)
4. Perform settings for the Security Group then click "NEXT".
Figure 131 Create Load Balancer (Security Group Settings)
107
5. Confirm the settings so far on the confirmation window. If there are no problems, click
"CREATE".
Figure 132 Create Load Balancer (Confirmation)
18.4 Add Subnet
You can select a subnet to add to a load balancer.
18.4.1 How to Add Subnet
1. Select a predefined subnet you want to add to a load balancer displayed in the "Subnet"
then move to the "Selected Subnet".
2. Click "Add".
108
18.5 Delete Subnet
You can select a subnet to remove from a load balancer.
18.5.1 How to Delete Subnet
1. Select the deletion target from the subnet displayed in the list and click "Delete".
18.6 Add Listener
You can select a listener to add to a load balancer.
18.6.1 How to Add Listener
It is possible to select the listener to add to a load balancer. The method for adding
a listener is indicated below.
1. In "Load Balancer Protocol", select a protocol accepted by a load balancer. (HTTP/HTTPS/
TCP/SSL).
2. Enter a port number acceptable for a load balancer in "Load Balancer Port".
3. Select a protocol to communicate from a load balancer to a virtual server in "Virtual Server
Protocol". (HTTP/HTTPS/TCP/SSL)
4. Enter a port number acceptable for a virtual server in "Virtual server port".
5. Select a credential if you select "HTTPS" or "SSL" in "Load Balancer Protocol".
6. Click "Add".
18.7 Delete Listener
You can delete listeners of load balancers from the displayed list screen.
18.8 Add Virtual Server
You can select a virtual server to which a load balancer distributes requests.
18.8.1 How to Add Virtual Server
1. From a virtual server list, select a server you want to add to a load balancer.
2. Click "Add".
18.9 Delete Virtual Server
109
You can delete a virtual server to which a load balancer distributes requests.
Just out of the load balancer distribution target, the virtual server itself will
remain.
18.9.1 How to Delete Virtual Server
1. From a virtual server list, select a server you want to delete from a load balancer.
2. Click "Delete".
18.10 Create Session Persistence Policy
You can create a session persistence policy for a load balancer.
1. Set the following items and click "Create".
・ Policy Name
・ Maximum time to maintain session (sec)
18.11 Create SorryServer Policy
You can create a policy to redirect to SorryServer when there is no destination
for a load balancer to distribute.
18.11.1 How to Create SorryServer policy
1. Set the following items and click "Create".
・ Policy Name
Redirect Destination Location URL
18.12 Create/Delete Policy
For a load balancer, you can set a session persistence policy created and a
SorryServer policy to set.
1. Set the following items and click "Set".
・ Load Balancer Port
・ Session Persistence Policy to set
・ SorryServer Policy to set
* The values of Session persistence policy and SorryServer policy are displayed by
selecting a policy.
110
18.13 Set Health Check Information
You can set health check information of a virtual server by a load balancer.
The items that can be set are as follows:
・ Health check consecutive success times judged as recovery
・ Health check execution time interval (sec)
・ Protocol (HTTP/HTTPS/TCP/SSL)
・ Port
・ URL
・ Health check response timeout time (sec)
・ Health check consecutive failed times judged as faulty
18.14 Set Security Group
You can set a security group on a load balancer.
1. Select a predefined security group you want to add to a load balancer displayed in "Security
Group", then move to "Security Group Settings", and click "Set".
18.15 Set Cipher Suite
You can set cipher suites on a load balancer. The method for setting is given
below.
1. Select "Add" or an action of the created cipher suite.
2. Select a cipher suite name and a cipher suite to use in the cipher suite add (edit) dialog.
3. Click "Set".
111
Chapter 19 Load Balancer (Western Japan Region 3)
19.1 Function Overview
This section explains the load balancer function that provides the load
distribution function. By using load balancers, it is possible to distribute the load
among multiple virtual servers when requests are received from the network.
This prevents specific virtual servers from having excessively high loads, and
enables continued provision of smooth speed.
However, the load balancers explained in this section, and the operation
screens displayed are those of the function provided in Western Japan Region
3. Please refer to Chapter 18 Load Balancer since the provided functions differ
from those of the regions other than Western Japan Region 3.
The provided functions are as follows:
・ Create Load Balancer
By creating load balancers and entering the load distribution settings as
shown in the Creation screens, it becomes possible to use load
balancers.
・ Refer to Load Balancer (List / Details )
It is possible to check the statuses of create load balancers on the List
screen, and to check their detailed information.
・ Delete Load Balancer
It is possible to delete created load balancers using the Action menu on
the List screen.
112
19.2 Method of Using Load Balancers
This section explains the method of using load balancers, from the creating of
load balancers, entry of settings for load distribution, up to confirming the settings
after creation.
Table 34 Load Balancer Creation Procedure
No. Creation Procedure Main Entry Content
1 Create a
Load
Balancer
Set Basic
Information
Set the load balancer name, and
information such as the subnet where
the load balancer is to be deployed, etc.
2 Load
Balancing
Settings
Load Balancing
Settings (1/2)
Set the Listener*1 name and the
protocols of the target requests, etc.
3 Load Balancing
Settings (2/2)
Set the Pool*2 name and the load
distribution algorithms, etc.
4 Select Virtual
Servers
Select the virtual servers that are
associated with the pool.
5 Health Monitor*3 Set the method for monitoring the
activity statuses of the virtual servers
that are associated with the pool.
6 Confirmation Confirm the content of settings, and set
load distribution.
7 Check After
Creation
Check Detailed
Information
From the Load Balancer List / Details
screens, confirm the detailed
information of load balancer settings.
*1 Listener: A process that checks for connection requests for the load balancer.
*2 Pool: The unit in which virtual servers that will handle requests are managed.
*3 Health Monitor: Performs "alive monitoring" for the virtual servers in the pool.
113
19.2.1 Create a Load Balancer
1. Display the Load Balancer List Screen
Press the [Load Balancers] menu to display the Load Balancer List screen.
On this screen it is possible to refer to information such as the load balancer
names, private IP addresses, provisioning statuses, and operation statuses of
each load balancer.
Click the "+" button on the upper-right of the Load Balancer List screen, and
transfer to the Create Load Balancer screen.
Figure 133 Load Balancer List Screen
2. Create a Load Balancer
After entering the basic information on the Create Load Balancer screen,
click the "Create" button to create the load balancer.
When there is already a load balancer that was created in advance, by
selecting the already created load balancer from "Reflected source
Loadbalancer", it is possible to reflect the settings of that load balancer on the
entry items. This makes it possible to create a load balancer with that setting
content.
Figure 134 Create Load Balancer Screen
114
The setting content that is necessary when creating a load balancer is as
follows:
Table 35 Setting Content when Creating a Load Balancer
Item Name Setting Content
Loadbalancer Name Set the name for the load balancer.
Description It is possible to set any desired character string.
Admin Status Set the management state for after creation is complete.
- UP: Active state (default value)
- DOWN: Inactive state
Private IP Address Specify the private IP address that will be used for requests
to the load balancer.
Subnet Specify the subnet that the virtual servers that will be
associated with the pool belong to.
After a load balancer is created, that load balancer will be displayed on the
Load Balancer List screen.
19.2.2 Load Balancing Settings
The statuses of created load balancers can be confirmed on the Load
Balancer List screen. When it has been confirmed that the Provisioning Status
of a load balancer is "ACTIVE", it is possible to perform load balancing settings
using "Load Balancing Setting" in the Action menu.
1. Loadbalancing Info (1/2)
On the Loadbalancing Info (1/2) screen, set the Listener Name, the protocol
to use for handling requests, etc., and create the listener.
When there is already a listener that was created in advance, by selecting
the already created listener from the "Reflected Source Listener Name" it is
possible to reflect the settings of that listener on the entry items. This makes it
possible to create a listener with that setting content.
115
Figure 135 Loadbalancing Info (1/2) Screen
The items to set are as follows:
Table 36 Setting Content of the Load Balancing Info (1/2) Screen
Item Name Setting Content
Listener Name Set the name for the listener.
Description It is possible to set any desired character string.
Admin Status Set the management state for after creation is complete.
- UP: Active state (default value)
- DOWN: Inactive state
Protocol Specify the communication protocols for the Front End and Back End
sides. The following four combinations of [Front End Protocol]-[Back
End Protocol] can be specified.
[Setting Values] HTTP-HTTP, HTTPS-HTTP, HTTPS-HTTPS, TCP-
TCP
Frontend Port Specify the port number that will be used for requests to the load
balancer.
Specifiable range of port numbers: 1 - 65535
Max Connections The maximum number of connections that the listener will process.
Specifiable values: 1 - 32768
SSL Certificate
URL
When using HTTPS communication, set the URL of the server
certificate.
116
After the listener is created, click "Next".
2. Loadbalancing Info (2/2)
On the Loadbalancing Info (2/2) screen, set the Pool Name, the Load
Distribution Algorithm, etc. and create the pool.
When there is already a pool that was created in advance, by selecting the
already created pool from the "Reflected Source Pool Name", it is possible to
reflect the settings of that pool on the entry items. This makes it possible to
create a pool with that setting content.
Figure 136 Loadbalancing Info (2/2) Screen
The items to set are as follows:
Table 37 Setting Content of the Loadbalancing Info (2/2) Screen
Item Name Setting Content
Pool Name Set the name of the pool.
Description It is possible to set any desired character string.
Load Balancing
Algorithm
Set the algorithm to use for load balancing to the virtual
servers.
Set one of the following values:
- ROUND_ROBIN: The round robin method.
Requests are distributed to virtual servers in order.
- LEAST_CONNECTIONS: The least connections
117
method.
Requests are distributed to the virtual server that currently
has the least connections.
- SOURCE_IP: The source IP address method.
Requests are distributed based on the source IP address.
Session Persistence
Policy
The session persistence policy applied to the pool. Set one of
the following values:
- HTTP_COOKIE
Maintains sessions using the cookies generated from
clients.
- APP_COOKIE
Maintains sessions using the cookies generated from
virtual servers.
- SOURCE_IP
Maintains sessions using the IP addresses of clients.
Back End Protocol The same value as the communication protocol that was
specified for the back end of the listener is displayed.
Backend Port The number of the TCP or UDP port for listening
When settings for the pool are complete, click "Next".
3. Select a Virtual Server
Select a virtual server to perform load distribution for. As shown in the
screen below, check the virtual server that you want to perform load
distribution for, and set the port for communication using the pull-down menu.
Figure 137 Select Virtual Server Screen
118
When selection of virtual servers is complete, click "Next".
4. Health Monitor
Perform settings for the load balancer to check the operational status of the
virtual server from the Health Monitor screen.
Figure 138 Health Monitor Screen
The items to set are as follows:
119
Table 38 Setting Content for the Health Monitor Screen
Item Name Setting Content
Check Method Set the monitoring method to use for the virtual server that is that
target of load balancing.
- PING/TCP/HTTP/HTTPS
Admin Status Specify the admin status after creation.
- UP: Enabled status (default value)
- DOWN: Disabled status
Check Interval (sec) Specify the execution interval for health checks, using a value of
1 – 99999.
Timeout (sec) Specify the length to time to timeout of health checks, using a
value of 1 – 99999.
* Set a value smaller than that of the Check Interval.
Abnormality
Detection Threshold
(times)
Set the number of consecutive times a health check must fail for
the virtual server that is the target of load balancing to be
considered as having failed, using a value of 1 - 99999.
HTTP Method Set the HTTP request method to use when executing health
checks, using one of the values below.
- DELETE/GET/POST/PUT
Check Path Set the path that is the target of the health check.
Assumed Response
Code
Set the response code to return when a health check is
successful.
- When there is one response code assumed, enter that value
- When there are multiple response codes assumed, enter the
values separated by commas
Example: 200, 204
- When the assumed response codes are a range, enter the
values connected by a hyphen
Example: 200-204
When selection of the health monitor is complete, click "Next".
5. Confirm
On the confirm screen, check each of the settings in order, and if there are
no corrections necessary, click "Create". A load balancer with these settings
will be created.
121
19.2.3 Confirmation after Creation
After creating a load balancer, it is possible to confirm it from the Load
Balancer List screen. When the created load balancer is displayed, clicking the
link of the load balancer name displays the content that was set when it was
created.
Figure 140 Load Balancer List Screen
Figure 141 Load Balancer Detail Screen
123
19.3 Points to Note
When editing each setting, it is necessary to do so using the API, or delete
the load balancer and create a new one.
124
Chapter 20 DNS
20.1 DNS Zone List
You can check the list and status of DNS zone which is created in project.
Figure 144 DNS Zone List
Table 39 Displayed Content of DNS Zone List Table
No. Item Name Displayed Content
1 DNS Zone Name Name of DNS zone
2 Number of Records Number of records registered in a zone
3 Name Server Name server assigned to the zone
4 Description Description of DNS zone
5 Action Various operation for DNS zone
125
20.1.1 About Operation
Figure 145 DNS zone action
The following items will be provided as the operation of DNS zone list.
1. Record Settings
Refer to 20.3, 20.4 and 20.6.
2. Zone Delete
Refer to 20.8.
20.2 DNS Zone Registration
DNS zone will newly be registered.
20.2.1 How to Register DNS Zone
1. Click the icon "+" at the upper right on the DNS zone list screen.
2. Enter appropriate information as below and click "Next".
Figure 146 Registration
126
・ DNS Zone Name
・ Description
3. Check the setting details you have entered so far on the confirmation screen. If there are
no problems, click "Create".
Figure 147 Confirmation of Setting Details
4. If "Confirmation authentication of DNS zone registration" dialog is displayed after it is
created, follow the displayed content and register DNS zone again. The successfully
registered DNS zone information and name server information can be confirmed using
the DNS Zone List screen.
Figure 148 "Confirmation Authentication of DNS Zone Registration" Dialog
127
20.3 Record List
You can move to this screen by selecting "Record Management" in the pull-down
menu of "Action" in the DNS zone you want to edit on the DNS zone list screen.
Figure 149 Record List
Table 40 Displayed Content of Record List Table
No. Item Name Displayed Content
1 Record Name Record Name
2 Type NS / A / AAAA / CNAME / MX / TXT / LBR / SRV
/ PTR
3 Value Value
4 TTL TTL Value
5 Policy None / Fail Over / Weighting
6 Action Various Operations for Record
128
20.3.1 About Operation
Figure 150 Record List Action
The below items will be provided as the operations of Record List.
・ Setting
Refer to 20.6 Editing Records.
・ Delete
Please refer to 20.7 Record Deletion.
20.4 Record Details
You can open record details by clicking the record name in the Record List.
You can check the detailed information that is not displayed directly in the record
list.
Figure 151 Record Details (When policy is "None")
129
Figure 152 Record Details (When policy is "Weighting")
Figure 153 Record Details (When policy is "Fail Over")
130
Table 41 Displayed Content of Record Details Table
No. Category Item Name Displayed Content
1 Record Details DNS Zone DNS Zone
2 Record Name Record Name
3 Type NS / A / AAAA / CNAME / MX /
TXT / LBR / SRV / PTR
4 TTL TTL Value
5 Value Value
6 Description Description of Records
7 Policy None/Fail-Over/Weighting
8 Weight Weight Weighting Value
9 Failover Failover PRIMARY / SECONDARY
10 Health Check
Preference
(If failover is selected)
IP Address Health Check Destination IP
Address
11 Port Health Check Destination Port
12 Protocol HTTP / HTTPS / TCP
13 Health Check
Path
Health Check Path
14 Health Check
Destination
Domain Name
Health Check Destination
Domain Name
20.5 Record Registration
Records can newly be registered.
20.5.1 How to register records
1 Click the icon "+" on the upper right of the Record List screen.
2 Enter the Record Information and click "Next".
Note: The setting items of Record Information differ depending on the Record Type. For
details of Record Information, refer to "Record Management Functions" of "DNS Service"
in the "IaaS Features Handbook".
The setting screens of Record Information for each type are shown below.
131
・ If type "A" or "AAAA" is selected, enter appropriate information on the screen below.
Figure 154 Create Record (Record Information: For type A)
Record Name
TTL
Value (Usable IPv4 address for type "A" and Usable IPv6 address for type "AAAA")
Description
Policy (No/Failover/Weight Settings)
Details of Failover (When Failover is selected in Policy)
Figure 155 Record Information (Failover Details)
Failover (PRIMARY / SECONDARY)
Health Check Setting (When Failover is selected in Policy)
132
Figure 156 Record Information (Health Check Settings)
IP
Port
Protocol (HTTP / HTTPS / TCP)
Health Check Path
Health Check Destination Domain Name
Weight Details (When Weight is selected in Policy)
Figure 157 Record Information (Weight Details)
133
・ Setting screen when the Type "NS" is selected
Figure 158 Record Registration (Record Information: When Type is NS)
・ Setting screen when the Type "CNAME" is selected
Figure 159 Record Registration (Record Information: When Type is CNAME)
134
・ Setting screen when the Type "MX" is selected
Figure 160 Record Registration (Record Information: When Type is MX)
・ Setting screen when the Type "TXT" is selected
Figure 161 Record Registration (Record Information: When Type is TXT)
135
・ Setting screen when the Type "LBR" is selected
Figure 162 Record Registration (Record Information: When Type is LBR)
・ Setting screen when the Type "SRV" is selected
Figure 163 Record Registration (Record Information: When Type is SRV)
136
・ Setting screen when the Type "PTR" is selected
Figure 164 Record Registration (When Type is PTR)
3 You can check the setting details you have entered so far on the confirmation screen. If
there are no problems, click "Create".
Figure 165 Record Registration (Confirmation)
137
20.6 Editing Records
You can edit the details of registered records.
20.6.1 How to edit records
1. On the Record List scree, click "Edit" from the pull-down menu of the record you want to
edit.
Figure 166 Record List (Edition)
2. You can edit the below information on the record edition screen. Depending on the type
you selected, the items to be edited are changed. Please refer to 20.5.1 for the edition
items of each type.
Figure 167 Record Edition
3. Click "Update" after edited.
138
20.7 Record Deletion
You can delete the registered records.
20.7.1 How to delete records
1. On the record list screen, click "Delete" by selecting from the pull-down menu of the
record you want to delete.
Figure 168 Record List (Delete)
2. Click the "Delete" button if there are no problems after you have checked the deletion
details.
Figure 169 Confirmation of Deletion
20.8 DNS Zone Deletion
You can delete the registered DNS zone.
20.8.1 How to delete DNS zone
1 On the DNS zone list screen, click "DNS Zone Deletion", selecting from the pull-down
menu of the DNS zone to be deleted.
139
Figure 170 DNS Zone List (DNS Zone Deletion)
2 Click the "Delete" button if there are no problems after you have checked deletion details.
Figure 171 Confirmation of Deletion
140
Chapter 21 VPN Service (SSL-VPN)
21.1 Function Overview
This function provides an SSL-VPN connection function for secure connections to virtual
environments created on the K5 system. This enables safe access from client terminals to
virtual servers on K5 using SSL-VPN.
The following functions are provided.
Creation of VPN services
Creation of SSL-VPN Connections
21.2 Usage Method of SSL-VPN Connections
Preparations are necessary to use SSL-VPN connections. The flow from preparation to
creation of an SSL-VPN connection is indicated below.
Figure 172 Flow of VPN Environment Configuration (SSL-VPN)
141
(1) Preparation (Required)
To create a VPN service, the preparations indicated below, such as creation of a virtual
router and changes to settings, are necessary.
1.1 Create a Virtual Router
Create a virtual router (Refer to Chapter 14 Virtual Router).
1.2 Configure the Gateway for the Virtual Router
Configure the gateway for the created virtual router (Refer to 14.4 Edit a Virtual
Router).
1.3 Create a Virtual Network
Create a virtual network (Refer to Chapter 13 Virtual Network).
1.4 Add an Interface to the Virtual Router
From the Details window of the virtual router created in 1.1, add an interface.
For the subnet, specify the subnet configured in 1.3.
For the IP address, specify the last unused IP address in the subnet.
(2) Configure a VPN Service
After preparations are complete, create a VPN service and an SSL-VPN connection.
2.1 Create a VPN Service
Press [Network] -> [VPN Service], and click the "+" button displayed on the VPN
Service List window.
Figure 173 Create VPN Service Window
142
The setting items necessary when creating a VPN service are given in the
following table.
Table 42 Setting Items for VPN Service Creation
Item Setting Content
AZ Select the same availability zone as that of the prepared
virtual router. * Selection of a virtual router becomes
possible after an AZ is selected.
Virtual Router Name Select the virtual router created in 1.1.
* Specification of a Subnet Name becomes possible after a
virtual router is selected.
Subnet Name Select the subnet configured in 1.3.
VPN Service Name Enter the name of the VPN service.
Description Enter the description of the VPN service.
Management State Select "true" or "false" (The default value is "true").
After the VPN service is created, it will be displayed in the VPN Service List
window.
Figure 174 VPN Service List Window
143
2.2 Create an SSL-VPN Connection
SSL-VPN connections can be created from the VPN Service Detail window.
Figure 175 VPN Service Detail Window
The setting items necessary when creating an SSL-VPN connection are given in
the following table.
Table 43 Setting Items for SSL-VPN Connections
Item Setting Content
SSL-VPN connection name Enter the name for the SSL-VPN connection.
Protocol Select "TCP" or "UDP" (The default value is "TCP").
In Western Japan Region 3, only "TCP" can be set.
Management State Select "true" or "false" (The default value is "true").
Credential Select the credential to use (The default value is the K5
credential).
When using a credential other than the K5 credential,
register the credential in advance.
Security Group Check the box of the security group to be used.
The number of security groups that can be registered is
6 or less.
Global IP Select the global IP to be used.
144
In Western Japan Region 3, only automatic allocation can
be set.
Client IP pool Configure the client IP pool in CIDR format (For example,
192.168.10.0/24).
[Important notice]
・ Please specify a network address that does not
conflict with the local network address connected to
the client PC.
・ The value of "192.168.122.0/24" can not be specified
as network address.
* In Western Japan Region 3, only one global IP address and one client IP pool can be set.
Click the add SSL-VPN connection icon and enter the items on each window.
Finally, click "Create" to create the SSL-VPN connection.
145
Figure 176 Create SSL-VPN Connection Window
(3) Firewall Setting (Optional)
The setting of firewall rules is optional. Setting of firewall rules is recommended in order to
enable safe connections with configured virtual environments.
3.1 Create a Firewall Rule
Create a firewall rule (Refer to Chapter 17 Firewall).
3.2 Create a Firewall Policy
Create a firewall policy that applies the created firewall rules.
3.3 Create a Firewall
Create a firewall (Refer to Chapter 17 Firewall).
3.4 When creating a firewall, select the firewall policy and virtual router.
146
21.3 Advisory Notes
・ When creating an SSL-VPN connection, if using a credential other than the
K5 credential, register that credential with the API in advance (Refer to the
K5 IaaS Features Handbook and the K5 IaaS API Reference - Management
Administration).
・ After creating an SSL-VPN connection, connect to the target virtual server
using an OpenVPN client, etc. For the installation method for an OpenVPN
client, refer to the "K5 IaaS Features Handbook".
147
Chapter 22 VPN Service (IPsec VPN)
22.1 Function Overview
This function provides an IPsec VPN connection function for secure
connections to virtual environments created on the K5 system. This enables
access from client terminals to virtual servers on K5, and access between virtual
servers to be performed more safely.
The following functions are provided.
Display of lists and details of IPsec VPN connections
Creation, editing, and deletion of IPsec VPN connections*
Creation of IKE policies
Creation of IPsec policies
*For creation of IPsec VPN connections, refer to "IPsec VPN Connection
Patterns" in the "IaaS Design and configuration Guide (Design
Pattern/Implementation Samples)".
148
22.2 Usage Method of IPsec VPN Connections
Preparations must be made in order to be able to use IPsec VPN connections.
The flow from preparation to creation of an IPsec VPN connection is indicated
below.
Figure 177 Flow of VPN Environment Configuration (IPsec VPN)
(1) Preparation (Required)
To use the same settings as the previous chapter, refer to 21.2 (1) Preparation
(Required). When using a configured environment, additional settings are not
necessary.
(2) Configure a VPN Service
After preparations are complete, create a VPN service and an IPsec VPN
connection.
(2.1) Create a VPN Service
Refer to 2.1 Create a VPN Service in the previous chapter.
149
(2.2) Create an IPsec VPN Connection
IPsec VPN connection list information can be referred to from the
VPN Service Details window.
Figure 178 VPN Service List Window
Click the "+" button of the IPsec VPN connection and configure the
following items on the Create IPsec VPN Connection Window.
Create an IPsec VPN connection
Configure an IKE policy and an IPsec policy
Configure connection information
150
Create an IPsec VPN connection.
Figure 179 Create IPsec VPN Connection Window (IPsec VPN Connection)
The setting items necessary when creating an IPsec VPN connection
are given in the following table.
151
Table 44 Setting Items for the Create IPsec VPN Connection Window
Item Setting Content
IPsec VPN
Connection Name
Enter the name of the IPsec VPN connection.
Description Enter the description of the IPsec VPN connection.
AZ Enter the availability zone.
Admin_State_Up Select the management status of the VPN connection.
When it is "false", the VPN connection will not transfer packets.
Pre Shared Key
(PSK)
Enter the Pre Shared Key (PSK)
Initiator Select an initiator mode.
- "bi-directional": Confirms the connection in both directions.
- "response-only": Confirms the connection on the response
side.
DPD-Action Select the action to take when traffic confirmation with the
connection destination using DPD fails.
- "hold":
Performs confirmation using DPD, and reconnects when
communication becomes possible again.
- "restart":
Performs confirmation using DPD, and reconnects
immediately when disconnected.
DPD-Interval Enter the interval for DPD detection, using seconds.
DPD-Timeout Enter the timeout for DPD detection, using seconds.
Select an IKE policy and an IPsec policy.
Figure 180 Create IPsec VPN Connection (Policy)
152
When there are no IKE policies, create one using the "+" button.
Figure 181 Create IKE Policy Window
The setting items necessary when creating an IKE policy are given in
the following table.
Table 45 Setting Items for IKE Policies
Item Setting Content
IKE Policy Name Enter the IKE policy name.
Description Enter the description of the IKE policy.
AZ Select an availability zone
IKE Phase1 Negotiation Mode Enter the key conversion mode
(The default value is "main")
Auth Algorithm Enter the encryption hash algorithm
(The default value is "sha1")
Encryption Algorithm Select an encryption algorithm
(The default value is "aes-128")
Perfect Forward Secrecy
(PFS)
Select Perfect Forward Secrecy
(The default value is "group5")
Lifetime Enter the lifetime of the security association (SA)
(The default value is "2000")
IKE Version Enter the IKE version
(The default value is "v1")
153
When there are no IPsec policies, create one using the "+" button.
Figure 182 Create IPsec Policy
The setting items necessary when creating an IPsec policy are given
in the following table.
Table 46 Setting Items for IPsec Policies
Item Setting Content
IPsec Policy Name Enter the IPsec policy name
Description Enter the description of the IPsec policy
AZ Select an availability zone
Transform Protocol Enter the transformation protocol being used
(The default value is "esp")
Auth Algorithm Enter the encryption algorithm
(The default value is "sha1")
Encapsulation Mode Select an encapsulation mode
(The default value is "tunnel")
Encryption Algorithm Select an encryption algorithm
(The default value is "aes-128")
Perfect Forward Secrecy (PFS) Enter the Perfect Forward Secrecy
(The default value is "group5")
Lifetime Enter the lifetime of the security association (SA)
(The default value is "3600")
154
Configure the connection information of the peer router.
Figure 183 Create IPsec VPN Connection Window (Connection destination information)
The setting items necessary when creating the connection
destination information of an IPsec VPN connection are given in the
following table.
Table 47 Setting Items for the Connection destination information of Create IPsec VPN
Connection
Item Setting Content
Peer Router: Global IP
Address
Specify the peer router's global IP address.
The possible entry methods include selection from a list of IP
addresses inside the K5 contract and direct entry of the IP
address.
Peer Router: Private IP
Address (CIDR)
Enter the private IP address of the peer router in CIDR format
155
Check the configured details, and then click "Create" to create the
IPsec VPN connection.
Figure 184 Create IPsec VPN Connection (Confirmation)
156
22.3 How to Delete IKE and IPsec Policies
Created IKE policies and IPsec policies cannot be deleted from the VPN
Service window. To delete them, do so from the API Execution window or by
executing an API.
This section explains the deletion method using the API Execution window.
(1) Obtain Policy List Information
Set the following values on the API Execution window, press the Execute
API button, and the policy list information will be displayed in the response
display section.
- HTTP Method: "GET"
- Endpoint: "networking"
- URI: "/v2.0/vpn/ikepolicies" For an IKE policy
"/v2.0/vpn/ipsecpolicies" For an IPsec policy
Figure 185 Obtain Policy List Information (For an IPsec policy)
(2) Check the Policy ID of the Policy to Delete
The policy ID of the policy to delete can be checked using the policy name
in the response display section of the policy list information.
157
Figure 186 Check the Policy ID (For an IPsec policy)
(3) Execute Policy Deletion
Set the following values on the API Execution window, and perform deletion
of the policy using API execution.
- HTTP Method: "DELETE"
- Endpoint: "networking"
- URI:"/v2.0/vpn/ikepolicies/{Policy_ID_of_deletion_target}" For an IKE policy
"/v2.0/vpn/ipsecpolicies/{Policy_ID_of_deletion_target}" For an IPsec policy
158
Figure 187 Execute Policy Deletion (For an IPsec policy)
22.4 Advisory Notes
・ Information of IKE policies and IPsec policies cannot be viewed or updated.
To view or update the information, do so from the API Execution window or
by executing an API.
・ When the status of an IPsec VPN connection is not ACTIVE, check from the
API Execution window or an API that the information of the connection
destination and the setting information match (for details, refer to the "IaaS
API Reference - Network").
159
Chapter 23 Database Virtual Server
23.1 Database Virtual Server List
You can check the list and status of the database virtual server created in
project.
Figure 188 Database Virtual Server List
Table 48 Displayed Content of Database Virtual Server List Table
No. Item Name Displayed Content
1 Database Virtual Server
Name
Database Virtual Server Name
2 Status Database Virtual Server Status
Refer to Table 49 Database Virtual
Server Status
3 Action Various Operations for database virtual
server
Table 49 Database Virtual Server Status
No. Status Description
1 Active SQL Statement Receiving State
2 Backup Back-up Status
3 Build DB Virtual Server Creating Status
4 Failed State where POST/PUT API execution
has failed
5 Error Illegal state
160
6 Deleted State where DB Virtual Server has
already been deleted but the snapshot
linked to the virtual server exists
7 Reboot Start-up State
8 Resize State where data volume is being
resized
9 Modifying State where an attribute is being
changed
10 Restart_Required State where restart is required
11 Degenerated State where one DB virtual server is in
degenerate operation
12 Switched State where original server is switched
with duplicate one due to DB fail-over
161
23.1.1 About Operation
Figure 189 Database Virtual Server List Action
See below for the operations of database virtual server list.
1. Start
Refer to 23.4.
2. Starting After Patch Application
Refer to 23.5.
3. Stop
Refer to 23.6.
4. Reboot
Refer to 23.7.
5. Rebooting After Patch Application
Refer to 23.8.
6. Delete
Refer to 23.9.
7. Show Parameters
Refer to 23.10.
8. Show Database Logs
Refer to 23.11 and 23.12.
162
23.2 Database Virtual Server Creation
Database Virtual Server is newly created.
23.2.1 How to create database virtual server
1. Click the icon "+" at the upper right on the Database Virtual Server List screen.
2. Enter the appropriate information as below and click "Next Page".
Figure 190 Database Virtual Server Information
・ Database Virtual Server Name
・ Database Master User Name
・ Database Master Password
・ Database Master Password Confirmation
・ Data Disk Size (GB)
・ Backup Retention Period (Days)
If you select "Set", you need to set the following information.
163
Figure 191 Backup Retention Period
Number of Days for Backup Retention (1 to 10 days)
・ Redundancy (Enabled/Disabled)
・ Description
3. Enter the appropriate information as below and click "Next Page".
Figure 192 Flavor Type
・ Flavor Type
4. Enter the appropriate information as below and click "Next Page".
Figure 193 DB Subnet Group
・ DB Subnet Group
164
5. Enter the appropriate information as below and click "Next Page".
Figure 194 Security Group
・ Security Group
165
6. You can check the setting details you have entered so far on the confirmation screen. If
there are no problems, click "Create". (*1)
Figure 195 Confirmation for Setting Content
*1
"Automatically generated parameters", which is displayed on the confirmation
screen for database creation, is automatically set from "recommended value of
database engine".
166
Table 50 Content of "Automatically generated parameters"
No. Item Name Displayed Content
1 shared_buffers Buffer size which is about 20% of the
memory size of selected flavor.
2 effective_cache_size Cache size which is about 50% of the
memory size of selected flavor.
3 log_line_prefix Log format for the database log.
23.3 Database Virtual Server Details
You can open the database virtual server details by clicking the database virtual
server name of database virtual server list.
The detailed information not displayed on the database virtual server list can
be checked.
Figure 196 Database Virtual Server Details (Database Virtual Server Information)
167
Figure 197 Database Virtual Server Details (Flavor Type Network Information)
Figure 198 Database Virtual Server Details (Database Information)
168
Figure 199 Database Virtual Server Details (Database Operation Information)
Figure 200 Database Virtual Server Details (Parameters to be changed at the time of next
reboot)
Table 51 Displayed Content of Database Virtual Server Details
No. Category Item Name Displayed Content
1 Database Virtual
Server Details
ID Database Virtual Server
ID
2 Database Virtual
Server Name
Database Virtual Server
Name
3 Status Database Virtual Server
Status.Refer to Table 49
Database Virtual Server
Status
4 Creation Time Created Date and Time
169
5 Update Time Update Date and Time
6 Data Storage Size Data Storage Size
7 Data Storage Type Data Storage Type
8 Availability Zone of
Master Running
Availability Zone where
the main server is
starting up
9 Redundancy true / false
10 Multi AZ Option true / false
11 Associated Read
Replica
Linked Read Replica
12 Original ID of Read
Replica
Replication Source
Database Virtual Server
ID
13 Availability Zone of
Slave Running
Availability Zone where
duplicate server is
starting up
14 Status of Read Replica Status of Read Replica
15 Security Group Security Group
16 Description Description
17 Flavor Type Flavor ID Flavor ID
18 Network
Information
Internal FQDN Internal FQDN
19 External FQDN External FQDN
20 Internal IP Address IP Address
21 Global IP Address Global IP Address
22 Connectable from
Internet
true / false
23 DB Subnet Group Subnet Group
24 Database
Information
Port Number Port Number
25 DB Encoding Database Encoding
26 DB Collation Order Checking Flow
27 DB Type Type
28 DB Version Version
29 DB Minor Version Minor Version
30 Database Master User
Name
Database Management
User Name
170
31 DB Parameter Group
ID
DB Parameter Group ID
32 Database
Operation
Information
Backup Retention
Period
Number of Days for
Backup Storage
33 Backup Retention
Period
Backup Time Range
34 Time Zone of Backups Maintenance Time Range
35 Recover Redundancy
Immediately
true / false
36 Automatic Recovery of
Redundancy Start At
Automatic Recovery Start
Time
37 Parameters to be
changed when
next rebooting
Data Storage Size Data Storage Size
38 Data Storage Type Data Storage Type
39 Backup Retention
Period
Number of Days for
Backup Storage
40 Flavor ID Flavor ID
41 ID Database Virtual Server
ID
42 Name Database Virtual Server
Name
43 DB Parameter Group
ID
DB Parameter Group ID
44 DB Version Database Version
45 Database Master User
Name
Database Management
User Name
46 Database Master
Password
Database Management
Password
47 Multi DB Option true / false
48 Multi AZ Option true / false
49 Port Number Port Number
50 Engine Minor Version Database Engine Minor
Version
51 Security Update Existence of Security
Update settings
171
23.4 Database Virtual Server Startup
You can start up Database Virtual Server.
23.4.1 How to start up Database Virtual Server
1. On the Database Virtual Server List screen, click "Start" selecting from the pull-down
menu of the database virtual server that is starting up.
Figure 201 Database Virtual Server List (Start)
2. If you check the start-up status and there are no problems, click the "Start" button.
Figure 202 Start-up Check
172
23.5 Starting the Database Virtual Server after Patch
Application
It is possible to start the database virtual server after application of patches.
23.5.1 How to start the database virtual server after patch application
1. On the Database Virtual Server List screen, select "Update patch and start" from the pull-
down menu of the database virtual server to start.
Figure 203 Database Virtual Server List (Start after Patch Application)
2. Check the content and there are no problems, click "Start".
Figure 204 Confirm Start After Patch Application
173
23.6 Database Virtual Server Stop
You can stop the database virtual server.
23.6.1 How to stop database virtual server
1. On the database virtual server list screen, click "Stop" selecting from the pull-down menu
of the database virtual server that you want to stop.
Figure 205 Database Virtual Server List (Stop)
2. If you check the stop status and there are no problems, click the "Stop" button.
Figure 206 Stop Check
23.7 Database Virtual Server Reboot
You can reboot the database virtual server.
174
23.7.1 How to reboot the database virtual server
1. On the database virtual server list screen, click "Reboot" selecting from the pull-down
menu of the database virtual server that you want to reboot.
Figure 207 Database Virtual Server List (Reboot)
2. If you check reboot status and there are no problems, click the "Reboot" button.
Figure 208 Reboot Check
175
23.8 Rebooting the Database Virtual Server after Patch
Application
It is possible to reboot the database virtual server after application of patches.
23.8.1 How to reboot the database virtual server after patch
application
1. On the Database Virtual Server List screen, click "Update patch and reboot" in the pull-
down menu of the database virtual server to reboot.
Figure 209 Database Virtual Server List (Reboot after Patch Application)
2. Check the content and if there are no problems, click "Reboot".
Figure 210 Confirm Reboot After Patch Application
176
23.9 Database Virtual Server Deletion
You can delete the database virtual server.
23.9.1 How to delete the database virtual server
1. On the database virtual server list screen, click "Delete" selecting from the pull-down
menu of the database virtual server that you want to delete.
Figure 211 Database Virtual Server List (Deletion)
2. If you check the deletion status and there are no problems, click the "Delete" button.
Figure 212 Deletion Check
177
23.10 DB Parameter Group Details
You can check the details of DB parameter group.
23.10.1 How to Check DB Parameter Group
1. On the database virtual server list screen, click "Show Parameters" selecting from the
pull-down menu of DB parameter group check.
Figure 213 Database Virtual Server List (Show Parameters)
2. DB Parameter Group Details screen is open.
You can check the detailed information on DB parameter group.
Figure 214 DB Parameter Group Details (Show Parameters)
178
Figure 215 DB Parameter Group Details (Parameter Details)
Table 52 Displayed Content of DB Parameter Group Details
No. Category Item Name Displayed Content
1 DB Parameter Group DB Parameter Group
Name
DB Parameter Group
Name
2 DB Parameter Group
ID
DB Parameter Group
ID
3 Parameter Group Details Parameter Name Parameter Name
4 DB Parameter Name DB Parameter Values
23.11 Database Log List
You can check the database log list.
Figure 216 Database Log List
23.11.1 How to see log
1. On the database virtual server list screen, click "Show Database Logs" selecting from the
pull-down menu of the database in which you want to see log.
179
Figure 217 Database Virtual Server List (Show Database Logs)
23.12 Database Log Details
Click the log file name of database log list to open database log details.
You can check the detailed information which is not displayed on the database
log list.
Figure 218 Database log details
Table 53 Displayed Content of Relational Database Log Details
No. Item Name Displayed Content
1 Log File Name Log File Name
2 Log Log
180
Chapter 24 Stack
24.1 Stack List
You can check a list and status of a stack created in a project.
Figure 219 Stack List
Table 54 Stack List Table
No. Item Name Description
1 Stack name Name of a stack
2 Description Description of a stack
3 Stack ID ID to identify a stack in unique
4 Status Status of a stack
5 Action Various operations on a stack
181
24.2 Stack Details
You can check a list and status of a stack created in a project.
Figure 220 Stack Details
Table 55 Stack Details Table
No. Classification Item Name Description
1 Information Description Description of a stack
2 Status Status
3 Date and time of
creation
Date and time of creation
4 Timeout (minutes) Timeout
5 Resource deletion
at stack creation
failure
Behavior at creation failure
6 Parameters Name Key
7 Value Value corresponding to the key
8 Outputs Outputs Outputs Information
182
24.3 Create Stack
24.3.1 How to Create Stack
1. Click an icon on Virtual Server List window.
2. Set the following and click "CREATE".
Figure 221 Create Stack
・ Stack Name
・ How to Specify Template
If you select "URL", specify the following.
"URL"
If you select "File", specify the following.
Drop a configuration file in "File".
If you select "YAML", specify the following.
"YAML"
・ Timeout ( minutes )
・ Resource deletion at stack creation failure (Delete or not)
183
24.4 Edit Stack
You can edit the created stack.
Figure 222 Edit Stack
You can edit the following. Click "UPDATE" after editing.
・ How to Specify Templates
・ Timeout
・ Parameter
184
Chapter 25 Monitoring
25.1 Monitoring Target Resource List
Monitoring Target Resource List is displayed.
Figure 223 Monitoring Target Resource List
Table 56 Displayed Content of Monitoring Target Resource List Table
No. Item Name Displayed Content
1 Resource Resource Name
2 Resource ID Resource ID
3 AZ Availability Zone
25.1.1 How to display target resource list
1. On the Monitoring Target Resource List screen, select the menu from the pull-down menu
of the audit menu.
Figure 224 Monitoring Target Resource List (Audit Item Sorting : Audit Menu)
185
・ Audit Menu
Compute
Storage
Database
Network
Custom
2. Select the resource from the pull-down menu of the target resource.
*By selecting any of the Audit Menu items, items are displayed in the pull-down menu of
Target Resource. The target resource that corresponds to the Audit Menu is as follows.
Figure 225 Monitoring Target Resource List (Audit Item Sorting : Target Resource)
・ Target Resource if "compute" is selected
Virtual Server
Image
・ Target Resource if "storage" is selected
Block Storage
Object Storage
・ Target Resource if "database" is selected
Database
・ Target Resource if "network" is selected
Port
Global IP
Load Balancer
・ Target Resource if "Custom" is selected
Custom Audit
3. Resource List is displayed.
186
Figure 226 Monitoring Target Resource List (After Audit Item Sorting)
25.2 Resource Audit Information
By clicking the resource name of the resource displayed on the Monitoring Target
Resource List, you can open the resource audit information screen. Here you can
check the detailed information not displayed on the target resource list.
Figure 227 Resource Audit Information (Resource Information)
Figure 228 Resource Audit Information (Graph)
187
Figure 229 Resource Audit Information (Sample Statistical Value)
Table 57 Displayed Content of Resource Audit Information
No. Category Item Name Displayed Content
1 Resource Information Resource Resource Name
2 Resource ID Resource ID
3 Graph Meter Refer to 25.3
4 Line Chart
5 Sample Statistical
Value
Minimum Value Minimum Value of Statistical
Value
6 Maximum Value Maximum Value of Statistical
Value
7 Average Value Average Value of Statistical
Value
25.3 Graph
The graph with the horizontal axis being time and vertical axis being sample
values is displayed.
25.3.1 How to change the displayed content of the graph
From the pull-down menu of Meter of the resource audit information, select the
meter for which you want to display a graph.
188
Figure 230 Resource Audit Information (Graph : Meter)
25.3.2 Graph Operation
If you move a cursor to a graph, the details of each time range (date, time, and
sample values) are displayed.
Figure 231 Resource Audit Information (Graph Details)
If you move the mouse wheel upwards on the graph you can zoom in, and when
you move the mouse wheel downwards it will zoom out.
189
Chapter 26 Alarm
26.1 Alarm List
You can check the list and status of the alarm created in project.
Figure 232 Alarm List
Table 58 Displayed Content of Alarm List Table
No. Item Name Displayed Content
1 Alarm Name Alarm Name
2 Type threshold / combination
3 Enable/Disable true / false
4 Status ok / insufficient data / alarm
5 Action Various Operations for Alarm
190
26.1.1 About Operations
Figure 233 Alarm List Action
The below are provided as the alarm list operations.
1. Update
Refer to 26.4 Action setting.
2. History
Refer to 26.5 History of Alarm.
3. Delete
Refer to 26.6 Alarm Deletion.
26.2 Alarm Creation
An alarm can newly be created.
26.2.1 How to create an alarm
1. Set the below information and click "Next Page".
2. Set the below information and click "Next Page".
Figure 234 Alarm Type
・ Alarm Type (threshold / combination)
191
3. Set the below information and click "Next".
Figure 235 Alarm Details
・ Alarm Name
・ Enable/Disable
・ How to Execute Action (Rerun / Do Not Rerun)
・ Description
4. Set the below information and click "Next".
If Alarm Type "threshold" is selected
Figure 236 Audit Item
・ Audit Item
Click the "Set" button and a pop-up window will be displayed. The below information
should be set.
192
Figure 237 Audit Item Setting
Resource Type
Virtual Server
Database
Global IP
Virtual Network
Virtual Router
Load Balancer
・ Threshold
Figure 238 Audit Item (Threshold)
Threshold
Operator for comparing threshold and sampling value
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
193
Threshold Evaluation Interval (sec)
Number of Threshold Evaluation Repeats
Statistics for comparing with threshold (Average Value/Number of
Samples/Maximum Value/Minimum Value/Total Value)
Treatment of data point when the number of samples is abnormally small
(Exclude/Does not exclude)
・ Query
If you click the "Add Query" button, a pop-up window will be displayed. Please set
the appropriate information.
Figure 239 Alarm Creation (Add Query)
Figure 240 Add Query
Field Name (Project Name/User Name)
Relative Operator
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
Value
If an alarm type "combination" is selected
・ How to evaluate a combination (AND condition / OR condition)
194
Figure 241 Alarm Selection (How to evaluate a combination)
・ Alarm List for Combination
If you click the "Add alarm" button, a pop-up window will be displayed. Please set
the information below.
Figure 242 Alarm Selection (Alarm List for combination)
Figure 243 Add alarm
Alarm to add
195
5. Please set the appropriate information and click "Next".
Figure 244 Alarm Evaluation Schedule (No setting)
To be set no matter whether the alarm type "threshold" or "combination" is selected
・ Setting/No Setting
If "setting" is selected, evaluation schedule can be added.
If you click the "Add evaluation schedule" button, a pop-up window will be
displayed. Set the below information.
Figure 245 Alarm Evaluation Schedule (Set)
196
Figure 246 Add evaluation schedule
・ Basic Setting
Setting name
Description
・ Start Date
If you select "Monthly", set the below information.
197
Figure 247 Start Date and Time (Monthly)
Day
Hour
minutes
Monitoring period (sec)
Time Zone
If "Weekly" is selected, set the below information.
Figure 248 Start Date (Weekly)
198
WEEK
Hour
minutes
Monitoring period (sec)
Time Zone
If you select "Daily", set the below information.
Figure 249 Start Date and Time (Daily)
Hour
minutes
Monitoring period (sec)
Time Zone
199
If "Hourly" is selected, set the below.
Figure 250 Start Date and Time (Hourly)
minutes
Monitoring period (sec)
Time Zone
If "cron" is selected, set the below.
Figure 251 Start Date and Time (cron)
CRON format
Monitoring period (sec)
Time Zone
200
6. Set the below information and click "Next".
Figure 252 Action Setting (Not Set)
To be set no matter whether the alarm type "threshold" or "combination" is selected
・ Setting / No Setting
If you select "Set", you can add "Action at alarm", "Action at OK", "What to do when
sufficient data is not collected". If you click the "Add action" button, a pop-up window
will be displayed. Please set the information below.
Figure 253 Action Setting (Set)
201
Figure 254 Add action at alarm
・ Service (compute / mail)
If you select "compute", set the below.
Figure 255 Add action at alarm (compute)
Parameter 1
Parameter 2
Figure 256 Add Action when OK
202
・ Service (compute / mail)
If you select "compute", set the below.
Figure 257 Add Action when OK (compute)
Parameter 1
Parameter 2
Figure 258 Add Action when data is lacking
・ Service (compute / mail)
If you select "compute", set the below.
203
Figure 259 Add Action when sufficient data is not collected (compute)
Parameter 1
Parameter 2
7. The setting content you have entered so far can be checked on the confirmation screen.
If there are no problems, click "Create".
Figure 260 Create Alarm
204
26.3 Alarm Details
If you click the alarm name of alarm list, you can open the alarm details. The
detailed information not displayed on alarm list can be checked.
Figure 261 Alarm Details (Alarm Type and Alarm Details)
Figure 262 Alarm Details (Monitoring Item and Threshold)
205
Figure 263 Alarm Details (Query and Alarm evaluation schedule)
Figure 264 Alarm Details (Select alarm and Alarm evaluation schedule)
Figure 265 Alarm Details (Action at alarm, Action at OK, and What to do when sufficient
data is not collected)
206
Table 59 Displayed Content of Alarm Details
No. Category Item Name Displayed Content
1 Alarm Type Alarm Type threshold / combination
2 Alarm Details Alarm Name Alarm Name
3 Resource ID Resource ID
4 Enable/Disable true / false
5 How to Execute
Action
true / false
6 Description Alarm Description
7 Monitoring Item Monitoring Item Monitoring Item
8 Threshold Threshold Threshold
9 Operator for
comparing threshold
and sampling value
equal/larger than/equal
to or larger
than/smaller
than/equal to or
smaller than
10 Threshold
Evaluation Interval
Number of seconds
11 Number of
Threshold
Evaluation Repeats
Number of Threshold
Evaluation Repeats
12 Statistics for
comparing with
threshold
Average value/Number
of samples/Maximum
value/Minimum
value/Total value
13 Treatment of data
point when the
number of samples
is abnormally small
Exclude/Does not
exclude
14 Query Field Name Project Name/User
Name
15 Relative Operator equal/larger than/equal
to or larger
than/smaller than/equal
to or smaller than
16 Value Value
207
17 Select alarm Condition of
combination
AND condition / OR
condition
18 Alarm Name Names of alarm to be
evaluated in the
combination
19 Alarm Type Type of each alarm:
threshold / combination
20 Enable / Disable True / false
21 Status The latest status of
each alarm:
ok / insufficient data /
alarm
22 Alarm evaluation
schedule
Setting name Setting name
23 Start Date Start Date
24 Monitoring period
(sec)
Number of seconds
25 Time Zone Time Zone
26 Description Description of Alarm
evaluation schedule
27 Action at alarm Service compute / mail
28 Parameter 1 Parameter 1
29 Parameter 2 Parameter 2
30 Action at OK Service compute / mail
31 Parameter 1 Parameter 1
32 Parameter 2 Parameter 2
33 What to do when
sufficient data is not
collected
Service compute / mail
34 Parameter 1 Parameter 1
35 Parameter 2 Parameter 2
208
26.4 Action setting
You can edit the created alarm.
26.4.1 How to set an alarm
1. On the alarm list screen, click "Update" selecting from the pull-down menu of the alarm
you want to edit.
Figure 266 Alarm List (setting)
2. On the alarm setting screen, you can set the below. Items to be edited change depending
on the alarm type you selected. Please refer to 20.2 for the items to be edited of each
type.
Figure 267 Alarm Setting (Alarm type and alarm details)
・ Alarm Type (threshold / combination)
・ Alarm Name
・ Resource ID
・ Enable/Disable
・ How to Execute Action (Rerun / Do Not Rerun)
・ Description
209
Figure 268 Alarm Setting (Monitoring Item and threshold)
Figure 269 Alarm Setting (Query)
・ Alarm Type (if threshold is selected)
Monitoring Item
Threshold
Operator for comparing threshold and sampling value
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
Threshold Evaluation Interval (sec)
Number of Threshold Evaluation Repeats
Statistics for comparing with threshold
Treatment of data point when the number of samples is abnormally small
(Exclude / Not Exclude)
Query
210
Figure 270 Alarm Setting (Select alarm)
・ If an alarm type "combination" is selected
Select alarm (And / Or)
Combination alarm list
Figure 271 Alarm Setting (Alarm evaluation schedule)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Set/Not Set
Figure 272 Alarm Setting (Action setting)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Set/Not Set
211
Figure 273 Alarm Setting (Action at alarm, Action at OK, What to do when sufficient data
is not collected)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Action at alarm
・ Action at OK
・ What to do when sufficient data is not collected
3. Click "Update" after edition.
212
26.5 History of Alarm
The alarm history is displayed.
Figure 274 History of Alarm
Table 60 Displayed Content of Alarm History
No. Item Name Displayed Content
1 Alarm Name Alarm Name
2 Filtering conditions See 26.5.1
3 Date and time Alarm date and time
4 Alarm Type creation / rule change / state transition /
deletion / action
5 Description Description of Alarm
26.5.1 How to display the history of alarm
1. Click "history" of the pull-down menu of the alarm that displays the history of alarm on
the Alarm List screen.
Figure 275 Alarm List (History)
213
2. Set the below information under the filtering conditions on the alarm history screen, and
click the "View" button.
Figure 276 History of Alarm (Filtering Conditions "time stamp")
・ If a time stamp is selected, set the below.
Start Date
Click next to the text form of Start Date and select a date.
Figure 277 Time Stamp (Start Date)
End date
Click next to the text form of Start Date and select a date.
214
Figure 278 Time Stamp (End date)
・ If "alarm type" is selected, set the below.
Figure 279 History of Alarm (Filtering conditions "Alarm Type")
Alarm Type
creation
rule change
state transition
deletion
action
215
26.6 Alarm Deletion
You can delete an alarm. On the alarm list screen, click "Delete" of the pull-
down menu of the action of the alarm that will be deleted.
26.6.1 How to delete an alarm
1. On the alarm list screen, click "delete" of the pull-down menu of the alarm that will be
deleted.
Figure 280 Alarm List (Deletion)
2. Click the "Delete" button if there are no problems after you have checked the content to
be deleted.
Figure 281 Deletion of Alarm
216
Chapter 27 Operation Log
27.1 Function Overview
This function provides the functionality for checking the history of operations
performed on the IaaS service portal. The history of operations performed in the
last three days can be referred to.
The following functions are provided.
・ List Display of Operation Logs
Search function
Select a period from the last three days to filter the displayed operation
log. The displayed items are those listed in Table 61. Clicking a displayed
request ID displays the details of the relevant operation log.
- Specifiable range of date and time to search: The last three days
- Amount of operation logs displayable at once: One day's worth
- Date and time specification format: UTC time
Export function
The list information of displayed operation logs can be output in csv
format.
- File format: csv
・ Detailed Display of Operation Logs
Clicking a specific request ID in the list of the operation log displays the
detailed information indicated in Table 61. This enables checking of API
request parameters and response bodies.
217
The items displayed in the Operation Log List Display screen and the Detailed
Display screen is indicated below.
Table 61 Operation Log Display Items (List Display and Detailed Display)
Item Description List
Display
Detailed
Display
Operation time
(UTC)
The time the request was sent
from the screen
Yes Yes
Session ID The ID that indicates the
uniqueness of the browser
Yes Yes
Request ID The ID assigned to the request
sent from the screen
Yes Yes
Screen name The name of the screen that sent
the request
Yes Yes
Operation The sent request Yes Yes
Status code The HTTP status code
corresponding to the request
Yes Yes
User name The user that executed the
request
Yes Yes
HTTP request The content of the sent request No Yes
HTTP response The body of the response to the
request
No Yes
Yes: Displayed
No: Not displayed
218
27.2 Usage Method of Operation Logs
1. List Display of Operation Logs
Enter the date and time to use as the search scope (in UTC time), and
then click the "Search" button.
The operation log for the specified search scope is displayed.
To save the search results, click the "Export" button to save the results as a
file in csv format.
Figure 282 Operation Log List Screen
2. Detailed Display of Operation Logs
To check the details of an operation log, click the Request ID.
219
Figure 283 Operation Log Details Screen
27.3 Advisory Notes
・ This function cannot store operation logs covering long periods of time.
If you need to store logs covering long periods of time, regularly export the operation
log.
・ The export function for the operation log only outputs the list information.
The detailed information of the Operation log cannot be output.
・ When specifying a time in a search of the operation log, searches are performed using
times rounded down to the nearest 5-minute interval.
For example: 12:09 will be handled as 12:05.
・ The details of operations are recorded in the operation log, but it may take some time
until it is possible to search them.
220
Chapter 28 API Execution
28.1 Function Overview
This function is for executing APIs from the IaaS Service Portal and displaying
the response results on the portal. It can be used when executing functions not
provided by the IaaS Service Portal, or when there is no environment for
executing APIs using the command line. In addition, up to 10 executed APIs are
saved in the history function3.
Note: This function is not guaranteed to work with all APIs. If it does not work
correctly, please use the API.
Refer to the following URL for the "API Reference".
https://k5-doc.jp-east-1.paas.cloud.global.fujitsu.com/doc/en/iaas/document/list/doclist_iaas.html
28.2 Usage Example
This chapter explains examples of the following two methods that can be
executed using APIs. For other methods, use them after referring to the "API
Reference".
・ GET method: An example of virtual server list acquisition is explained.
・ POST method: An example of virtual server creation is explained.
28.2.1 Information Necessary for API Execution
The following information is necessary on the API execution window. The example explains
the methods for confirming and setting this information.
3 The history is deleted when the project or region is changed.
221
Table 62 Information Necessary for API Execution
Item Description Required /
Optional
Region Select the region to execute the API in. A specific
region or Global can be selected.
Required
HTTP Method Select the HTTP method to be used when
executing the API.
Required
Endpoint Select the component to use for API execution.
Refer to 28.2.2 Endpoint List.
Required
URI Refer to the "API Reference", and then enter the
URI.
Required
Query Parameters Enter the Key and Value of the query.
Refer to the "API Reference", and then enter the
Key and Value.
Optional
HTTP Header Enter the key and value of the HTTP header. Optional
Request Body Enter the HTTP request body. Optional
28.2.2 Endpoint List
The endpoints available when a specific region and Global is selected are different. Refer
to the tables below for details and then specify the endpoint.
Table 63 Endpoint List (Regional Service)
Endpoint Service Name Note
autoscale Auto-Scaling
blockstoragev2 Block Storage
compute Compute (Standard Service)
compute-b Compute (Service for SAP HANA) Only available with SAP
HANA contracts
compute-w Compute (Service for SAP)
database Database
dns DNS Service
identityv3 Regional User Management
image Image Management
import-export Virtual Server Import and Export
keymanagement Key Management
loadbalancing Load Balancer
222
networking Virtual Network
networking-ex Virtual Network Expansion
objectstorage Object Storage
orchestration Template Management
(Orchestration)
software Software Management
telemetry Monitoring
appmanagement Application Management
Not available
blockstorage Block Storage
certificate Certificate Management
contract Regional Contract Management
identity Regional User Management
queue Queue Management
vmimport Virtual Server Import
global-identity Global User Management Not available
* When using global-
identity, use the endpoint
of Global Service.
Note: Different endpoints are provided in each region.
Table 64 Endpoint List (Global Service)
Endpoint Name of Service Note
global-billing Billing Management
global-catalog Product Management
global-cdn Content Delivery Service
global-contract Contract Management
global-identity User Management (Global)
global-rolemanagement Role Management Not available
Note: Different endpoints are provided in each region.
223
28.2.3 Example of Virtual Server List Acquisition
This section explains the method for acquiring a list of the virtual servers in a project.
Figure 284 Example of Entry on the API Execution Window
1. Select the region to execute the API in. You can select the currently selected region or
Global. When acquiring a list of virtual servers, select the currently selected Region.
For the relationship between regional and global services, refer to the "Features
Handbook 1.2 Location Services".
2. Specify the HTTP method, the URI, query parameters, the HTTP header, and the request
body.
Search in the "API Reference - Foundation Service" for the explanation of the desired API.
Figure 285 Extract from API Reference - Foundation Service
TenantID
/v2/ /serversTenantID
224
As shown in Figure 285, set the following for the HTTP method.
- HTTP Method: "GET"
It is possible to specify changes since, image, flavor, name, status, and host in the Query
Parameters, but this example filters the virtual servers to those with the status "ACTIVE".
- Query Parameters
Key : "status"
Value : "ACTIVE"
- HTTP Header: Setting is unnecessary
- Request Body: Setting is unnecessary
3. Select the Endpoint
Refer to Endpoint List and select the relevant endpoint. To acquire the list information of
virtual servers, select "compute".
4. Execute the API
After all of the necessary information has been entered, click the "Execute API" button.
5. Execution Results
The execution results are displayed in the response field.
Figure 286 API Response
225
28.2.4 Example of Virtual Server Creation
This section explains the method for creating virtual servers in a project.
Figure 287 Entry Example
Figure 288 Response Example
TenantID
/v2/ /serversTenantID
226
1. Select the Region
When creating a virtual server, select the currently selected Region.
2. Select the Endpoint
As in the preceding Example of Virtual Server List Acquisition, select "compute".
3. Specify the HTTP Method, the URI, the Query Parameters, the HTTP Header, and the
Request Body
Search in the "API Reference - Foundation Service" for the explanation of the desired
API.
Figure 289 Extract from API Reference - Foundation Service
As shown in Figure 289, set the following for the HTTP method.
- HTTP Method: "POST"
- URI : "/v2/{tenant_id}/servers"
- Query Parameters: Setting is unnecessary
- HTTP Header: Setting is unnecessary
- Request Body: Create the body referring to the following section in the "API Reference".
227
Figure 290 Extract from API Reference - Foundation Service
Figure 291 Example of Request Body Creation
Remainder
omitted
228
4. Execute the API
After all of the necessary information has been entered, click the "Execute API" button.
5. Execution Results
6. The execution results are displayed in the response field.
Figure 292 API Response
229
Chapter 29 VM Import and Export
29.1 Function Overview
This function provides the functions (VM import and export) for importing and
exporting virtual server images (vmdk format) that are stored on object storage
to and from the K5 service. For details on the environment settings necessary for
VM import and export, refer to "Virtual Server Import" and "Virtual Server Export"
in the "IaaS Features Handbook".
The OSs supported by VM import and export are as follows:
VM import and export only support the following OSs:
Windows Server 2008 R2 SE
Windows Server 2008 R2 EE
Windows Server 2012 SE
Windows Server 2012 R2 SE
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
CentOS
Ubuntu
230
29.2 Usage Example
This section explains execution examples of the following:
VM Import : Explains an example of import of a virtual server image.
VM Export : Explains an example of export of a virtual server image.
29.2.1 VM Import
This section explains the confirmation and setting methods for VM import.
1. Display the VM Import List window
Clicking [Import / Export] -> [VM Import] displays the VM Import List window.
Using this window it is possible to refer to the import status of each image that
has been imported. Clicking the "Import" button on the VM Import List window
displays the VM Import window.
There are four types of VM import status:
succeeded
failed
processing
queued
Figure 293 VM Import List Window
2. Information necessary for VM import
After entering each item on the VM Import window, click the "Import" button and
import the image.
231
Figure 294 VM Import Window
The following table indicates the items necessary for VM import.
Table 65 VM Import Window Display Items
No. Item Description Required/
Optional
1 Image Name Enter the image name. Required
2 Container
Name
Select the name of the container to import.
*When there are no containers, transfer to the
Create Container window using the text link, and
then create a container. Refer to 11.2.1 Create a
Container.
Required
3 Object Name Select the name of the object to import.
*When there are no objects, transfer to the
Create Object window using the text link, and
then create an object.
Refer to 11.2.2 Create an Object.
Required
4 OS Type Select the OS type.
* Specify an OS type that matches that of the
OS to be imported.
Required
5 Check Sum
(SHA1)
Enter the value of the check sum. Optional
6 Min Disk Enter the minimum disk value. Optional
7 Min RAM Enter the minimum RAM value. Optional
232
3. Check from the VM Import Detail window
Clicking the desired image name on the VM Import List window displays the
VM Import Detail window. You can refer to detailed information such as object
pass, etc.
Figure 295 VM Import Detail Window
233
29.2.2 VM Export
This section explains the confirmation and setting methods for VM export.
1. Display the VM Export List window
Clicking [Import / Export] -> [VM Export] displays the VM Export List window.
Using this window it is possible to refer to the export status of each image that
has been exported. Clicking the "Export" button on the VM Export List window
displays the VM Export window.
There are six types of VM export status:
succeeded
failed
processing
queued
cancelling
canceled
Figure 296 VM Export List Window
234
2. Information necessary for VM export
After entering each item on the VM Export window, click the "Export" button
and export the image.
Figure 297 VM Export Window
The following table indicates the items necessary for VM export.
Table 66 VM Export Window Display Items
No. Item Description Required/
Optional
1 Image Name Enter the image name. Required
2 Container
Name of
Object
Storage
Select the container name of the
object storage where exported image
files will be stored.
*When there are no containers, transfer to
the Create Container window using the
text link, and then create a container.
Refer to 11.2.1 Create a Container.
Required
235
3. Check from the VM Export Detail window
Clicking the desired image name on the VM Export List window displays the
VM Export Detail window. You can refer to detailed information such as
container pass, etc.
Figure 298 VM Export Detail Window
29.3 Advisory Notes
The retention period of the status of VM import and export processing is
seven days from the completion of the VM import or VM export process.