27
Automated Amazon EC2 Cloud deployments with openQRM 5.1 on Debian Wheezy This HowTo is about how to manage Public- and Hybrid Cloud deployments with openQRM. As the deployment manager for Amazon EC2 and its API compatible derivatives (e.g Eucalyptus) openQRM is capable to fully automate Instance provisioning and to add additional value by attaching automated application deployment via Puppet, automated monitoring via Nagios and also highavailability on Infrastructure-Level to the providers cloud features. The whole workflow of Instance-deployment in openQRM is exactly the same as for local resources in the internal IT-environment. Requirements One physical Server. Alternatively the installation can be also done within a Virtual Machine at least 1 GB of Memory at least 100 GB of Diskspace optional VT (Virtualization Technology) enabled in the Systems BIOS so that the openQRM Server can run KVM Virtual Machines later Install openQRM 5.1 on Debian Wheezy Install a minimal Debian Wheezy on a physical Server Install and initialize openQRM 5.1 A detailed Howto about the above initial starting point is available at "Install openQRM 5.1 on Debian Wheezy (resources/documentation- howtos/howtos/install-openqrm-51-on-debian-wheezy.html)" For this howto we have used the same openQRM server as for the howto about 'Virtualization with KVM and openQRM 5.1 on Debian Wheezy'. That means with this howto we are going to add functionality to an existing openQRM setup. This is to show that openQRM manages all different virtualization and deployment types seamlessly. Actually this means you can use either use the "Install openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/install-openqrm- 51-on-debian-wheezy.html)" or "Virtualization with KVM and openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/virtualization- with-kvm-and-openqrm-51-on-debian-wheezy.html)" howto as starting point. Set a custom Domain name As the first step after the openQRM installation and initialization it is recommended to configure a custom domain name for the openQRM management network. In this Use-Case the openQRM Server has the private Class C IP address 192.168.178.5/255.255.255.0 based on the previous "Howto install openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/install-openqrm-51-on-debian-wheezy.html)". Since the openQRM management network is a private one any syntactically correct domain name can be used e.g. 'my123cloud.net'. The default domain name pre-configured in the DNS plugin is "oqnet.org". Best practice is to use the 'openqrm' commandline util to setup the domain name for the DNS plugin. Please login to the openQRM Server system and run the following command as 'root' in a terminal: /usr/share/openqrm/bin/openqrm boot-service configure -n dns -a default -k OPENQRM_SERVER_DOMAIN -v my123cloud.net The output of the above command will look like

Automated Amazon EC2 Cloud deployments with openQRM

Embed Size (px)

DESCRIPTION

This HowTo is about how to manage Public- and Hybrid Cloud deployments with openQRM. As the deployment manager for Amazon EC2 and its API compatible derivatives (e.g Eucalyptus) openQRM is capable to fully automate Instance provisioning and to add additional value by attaching automated application deployment via Puppet, automated monitoring via Nagios and also highavailability on Infrastructure-Level to the providers cloud features. The whole workflow of Instance-deployment in openQRM is exactly the same as for local resources in the internal IT-environment.

Citation preview

Page 1: Automated Amazon EC2 Cloud deployments with openQRM

Automated Amazon EC2 Cloud deployments with openQRM5.1 on Debian Wheezy

This HowTo is about how to manage Public- and Hybrid Cloud deployments with openQRM. As the deployment manager for Amazon EC2 and its API

compatible derivatives (e.g Eucalyptus) openQRM is capable to fully automate Instance provisioning and to add additional value by attaching automated

application deployment via Puppet, automated monitoring via Nagios and also highavailability on Infrastructure-Level to the providers cloud features.

The whole workflow of Instance-deployment in openQRM is exactly the same as for local resources in the internal IT-environment.

Requirements

One physical Server. Alternatively the installation can be also done within a Virtual Machineat least 1 GB of Memoryat least 100 GB of Diskspaceoptional VT (Virtualization Technology) enabled in the Systems BIOS so that the openQRM Server can run KVM Virtual Machines later

Install openQRM 5.1 on Debian Wheezy

Install a minimal Debian Wheezy on a physical ServerInstall and initialize openQRM 5.1

A detailed Howto about the above initial starting point is available at "Install openQRM 5.1 on Debian Wheezy (resources/documentation-

howtos/howtos/install-openqrm-51-on-debian-wheezy.html)"

For this howto we have used the same openQRM server as for the howto about 'Virtualization with KVM and openQRM 5.1 on Debian Wheezy'.

That means with this howto we are going to add functionality to an existing openQRM setup. This is to show that openQRM manages all different

virtualization and deployment types seamlessly.

Actually this means you can use either use the "Install openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/install-openqrm-

51-on-debian-wheezy.html)" or "Virtualization with KVM and openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/virtualization-

with-kvm-and-openqrm-51-on-debian-wheezy.html)" howto as starting point.

Set a custom Domain name

As the first step after the openQRM installation and initialization it is recommended to configure a custom domain name for the openQRM

management network.

In this Use-Case the openQRM Server has the private Class C IP address 192.168.178.5/255.255.255.0 based on the previous "Howto install

openQRM 5.1 on Debian Wheezy (resources/documentation-howtos/howtos/install-openqrm-51-on-debian-wheezy.html)". Since the openQRM

management network is a private one any syntactically correct domain name can be used e.g. 'my123cloud.net'.

The default domain name pre-configured in the DNS plugin is "oqnet.org".

Best practice is to use the 'openqrm' commandline util to setup the domain name for the DNS plugin. Please login to the openQRM Server system

and run the following command as 'root' in a terminal:

/usr/share/openqrm/bin/openqrm boot-service configure -n dns -a default -k OPENQRM_SERVER_DOMAIN -v my123cloud.net

The output of the above command will look like

Page 2: Automated Amazon EC2 Cloud deployments with openQRM

root@debian:~# /usr/share/openqrm/bin/openqrm boot-service configure -n dns -a default -k OPENQRM_SERVER_DOMAIN -v my123cloud.net

Setting up default Boot-Service Konfiguration of plugin dns

root@debian:~#

To (re)view the current configuration of the DNS plugin please run:

/usr/share/openqrm/bin/openqrm boot-service view -n dns -a default

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/01-openqrm-ec2.png)

Enabling PluginsFor this HowTo please enable and start the following plugins in the sequence below:

dns plugin - type Networkingdhcpd plugin - type Networkingtftpd plugin - type Networkingdevice-manager plugin - type Managementnfs-storage - type Storagelvm-storage - type Storagenagios3 - type Monitoringpuppet - type Deploymentsshterm plugin - type Managementhybrid-cloud - type Deployment

Hint: You can use the filter in the plugin list to find plugins by their type easily!

Install the latest Amazon EC2 ToolsGo to Plugins -> Deployment -> Hybrid-Cloud -> About

Page 3: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/02-openqrm-ec2.png)

There you can find the URLs and informations about the latest Amazon EC2 API- and AMI-Tools.

Here the steps to install the Amazon EC2 Tools. Please SSH-login to the openQRM server as 'root' and run the following commands:

wget s3.amazonaws.com/ec2-downloads/ec2-api-tools.zip

wget s3.amazonaws.com/ec2-downloads/ec2-ami-tools.zip

unzip ec2-api-tools.zip

unzip ec2-ami-tools.zip

mkdir /usr/local/ec2

cp -r ec2-ami-tools-1.4.0.9/* /usr/local/ec2/

cp -r ec2-api-tools-1.6.8.1/* /usr/local/ec2/

apt-get update && apt-get install default-jdk

Please notice: The version numbers may be different when newer EC2 Tools gets available!

Then please add the following to the system wide profile /etc/profile

# EC2 Tools

export EC2_HOME=/usr/local/ec2

export PATH=$PATH:$EC2_HOME/bin

export JAVA_HOME=/usr

The EC2 API- and AMI Tools are now installed and available in the system path.

Please notice: Now please logout of the openQRM server and re-login. This is to activate the new profile settings in the environment. After re-login

please restart the openQRM server to also activate the profile in its environment by running:

/etc/init.d/openqrm restart

To re-check the configuration please run:

ec2-describe-regions -O [your-aws-access-key] -W [your-aws-secret-key]

The output of the above command looks like:

root@debian:~# ec2-describe-regions -O XXXXXXXXXXXXXXXXXXXXX -W YYYYYYYYYYYYYYYYYYYYYYYY

REGION eu-west-1 ec2.eu-west-1.amazonaws.com

REGION sa-east-1 ec2.sa-east-1.amazonaws.com

Page 4: Automated Amazon EC2 Cloud deployments with openQRM

REGION us-east-1 ec2.us-east-1.amazonaws.com

REGION ap-northeast-1 ec2.ap-northeast-1.amazonaws.com

REGION us-west-2 ec2.us-west-2.amazonaws.com

REGION us-west-1 ec2.us-west-1.amazonaws.com

REGION ap-southeast-1 ec2.ap-southeast-1.amazonaws.com

REGION ap-southeast-2 ec2.ap-southeast-2.amazonaws.com

root@debian:~#

Configure which Amazon EC2 regions to useBest practice is to use the 'openqrm' commandline util to setup which Amazon regions to use for the hybrid-cloud plugin. Please login to the

openQRM Server system and run the following command as 'root' in a terminal:

/usr/share/openqrm/bin/openqrm boot-service configure -n hybrid-cloud -a default -k OPENQRM_PLUGIN_HYBRID_CLOUD_REGIONS -v "eu-west-1,

us-west-1"

To (re)view the current configuration of the Hybrid-Cloud plugin please run:

/usr/share/openqrm/bin/openqrm boot-service view -n hybrid-cloud -a default

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/03-openqrm-ec2.png)

Create a Hybrid-Cloud AccountGo to Plugins -> Deployment -> Hybrid-Cloud -> Actions and click on 'Add new Account'

Provide an account name and the AWS Access and Secret Key plus a description for the account. Then click on submit.

Page 5: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/04-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/05-openqrm-ec2.png)

Adding the account is then checking to get access via the provided credentials. If configured correctly the account is added as seen below.

You can now easily access all kind of Amazon EC2 functionalities through the different action buttons.

Choose AMIs for deploymentGo to Plugins -> Deployment -> Hybrid-Cloud -> About

Page 6: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/02-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/06-openqrm-ec2.png)

In the section 'Manage and automate public and private clouds' -> AMIs you can find a URL to some current Ubuntu AMIs. Please open the url and

find an AMI of your choice in the region of your choice. For this howto will will use a 'Ubuntu 13.04 64bit' AMI named 'ami-23a9b057'.

Please notice: Those AMIs are updated frequently so the AMI name may change!

Now go to Plugins -> Deployment -> Hybrid-Cloud -> Actions -> AMI. This will list available AMIs in the selected region.

Page 7: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/07-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/08-openqrm-ec2.png)

Click on the AMI filter 'U' button and find the AMI you have selected on the Ubuntu AMI page. Click on 'Add Image' for that AMI.

This creates a new available Image object in the openQRM server.

Page 8: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/09-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/10-openqrm-ec2.png)

Create a custom auto-configuration script to the EC2 Instance on S3The integration with Amazon EC2 in openQRM allows to attach a custom script to a starting Instance. The Instance is then running this script on

system startup. This can be used in combination with the Puppet integration to fully pre-configure an Instance in EC2. The easiest way to create such

a custom auto-configuration script is to use the S3 action in the account overview. This provides you with a File-Manager for S3 and allows to easily

upload files to S3. Those files, if set to 'public-read' permission is directly available via http. As an example we create a small bash-script which actually

just outputs some text to a file.

On your Desktop create a new file named 'my-custom-auto-configure.sh' with the following content:

#!/bin/bash

echo "Here custom commands are running on instance startup" > /tmp/my-custom-auto-configure.log

Now go to Plugins -> Deployment -> Hybrid-Cloud -> Actions -> S3 and create a new S3 bucket.

Click on 'Files in bucket' to list the files in the bucket.

Page 9: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/11-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/12-openqrm-ec2.png)

Click on 'Upload file' button to upload the custom 'my-custom-auto-configure.sh' script from your desktop.

Select the 'my-custom-auto-configure.sh' srcript from your desktop, set the File Permission to 'public-read' and submit.

Page 10: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/13-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/14-openqrm-ec2.png)

The 'my-custom-auto-configure.sh' srcript got uploaded to the S3 bucket and is available via http. Please copy the URL of the uploaded script, we are

going to paste the URL in the following 'Instance Add' dialog.

Pre-configure Nagios service checksNow go to Plugins -> Monitoring -> Nagios3 -> Services. and login to the embedded Nagios server with the openqrm credentials.

Page 11: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/32-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/33-openqrm-ec2.png)

Here the standard Nagios configuration after the Debian package is installed.

Now go to Plugins -> Monitoring -> Nagios3 -> Config -> Services. and click on 'Add new Service'

Page 12: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/34-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/36-openqrm-ec2.png)

Select the http service (Port 80) and click on 'Submit'

Here the available Nagios Service check list after adding the http service

Page 13: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/37-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/38-openqrm-ec2.png)

Here after adding some more service checks

Create a new Instance on Amazon EC2Go to Datacenter -> Server. and click on 'Add a new Server'

Page 14: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/15-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/16-openqrm-ec2.png)

Provide a name for the new server. Easiest is to use the 'Generate name' button.

In the Resource-Select please click on 'New Resource'

Page 15: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/17-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/18-openqrm-ec2.png)

Here the list of available Resource types. Please select 'Cloud (localboot) Virtual Machine'

This forwards to the Hybrid-Cloud plugin actions. Please click on 'Instances'

Page 16: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/19-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/20-openqrm-ec2.png)

The following screenshot shows the empty Instance list. Please click on 'Add Instance'

In the Instance-Add for please select the AMI, the availability zone, type, keypair and security group.

Hint: Keypairs can be managed via the 'Keypair' action, security groups can be managed with the 'Groups' action!

Click on submit when finished.

Page 17: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/21-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/22-openqrm-ec2.png)

Creating a new Instance automatically creates a new resource in openQRM and forward back into the server wizard. Please select the just created

new resource and click on 'Submit'

Next select the Image object created from the AMI before.

Page 18: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/23-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/24-openqrm-ec2.png)

On this screen please click on 'Submit' to edit the Image parameter.

The Image-Edit form allows to set a custom password for the server.

Page 19: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/25-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/26-openqrm-ec2.png)

Please notice: Normally SSH-Access to Amazon EC2 instances works only on behalf of a private- and public keypair. Amazon EC2 keypairs can be

easily managed through the 'keypair' action. Anyway openQRM also allows to simply set a password in the Image-Edit section. Setting a password

there automatically sets the password in the Instance AMI and enables to allow SSH-Login with password.

Here the final Server-Edit screen. Click on 'Submit' to save the server configuration.

Configure Puppet recipes for the EC2 InstanceGo again to Datacenter -> Server. and edit the just created server object.

Page 20: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/27-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/28-openqrm-ec2.png)

Click on Deployment -> Puppet to add a custom Puppet recipe to the server.

Here we choose the included 'webserver' puppet recipe which automatically installs and starts apache.

Page 21: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/29-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/30-openqrm-ec2.png)

The overview about the Puppet deployment configuration looks now like this:

Set up monitoring for the EC2 InstanceGo again to Datacenter -> Server and edit the just created server object. Click on Deployment -> Nagios3

Page 22: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/31-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/39-openqrm-ec2.png)

In the Service-Edit form please select the 'http' service and click on 'Submit'

The overview about the Nagios check configuration looks now like this:

Page 23: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/40-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/41-openqrm-ec2.png)

Starting the EC2 InstanceTo start the configured Amazon EC2 simply start its server object in Datacenter -> Server. This will create and start the Instance on the Amazon Public

Cloud, apply the Image password configuration, apply the puppet recipes, configure WebSSH and execute the custom auto-configuration script we

have attached to the Instance from S3.

Go to Datacenter -> Server. Select the new created server object and start it

The server object is now activated and the deployment of the Amazon EC2 instances has started.

Page 24: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/42-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/43-openqrm-ec2.png)

Here a screenshot of the Amazon EC2 console after we have started the deployment.

You can now use the 'ssh' button in the server list at Datacenter -> Server to easily login to the Instance.

Please notice: Your browser will warn because of a self-signed ssl certificate for the WebSSH login! Please accept to login.

Page 25: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/45-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/48-openqrm-ec2.png)

A quick check that the webserver is up+running

Here a screenshot of the embedded Nagios console with the http service check activated.

Page 26: Automated Amazon EC2 Cloud deployments with openQRM

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/46-openqrm-ec2.png)

(/fileadmin/Images/Documentation/Automated_Amazon_EC2_Cloud_deployments_with_openQRM_5.1_on_Debian_Wheezy/47-openqrm-ec2.png)

Also please re-check /tmp/my-custom-auto-configure.log on the Instance to see you custom script got executed.

And here the Datacenter Dashboard after we have created the Amazon EC2 Instance

You can now fully automate your Amazon EC2 deployment with openQRM 5.1.

Hope you enjoyed this Howto!

Add more functionalities to your openQRM SetupTo continue and further enhance your openQRM KVM Virtualization Setup there are several things to do:

Enable the highavailability plugin to automatically gain HA for your serverEnable the cloud plugin for a complete Self-Service deployment of your Server and Software stack to end-usersEnable further Virtualization plugins and integrate remote Virtulization hosts for a fully distributed Cloud environmentEnable further Storage and Deployment plugins to automatically provision your Virtualization Hosts and other physical systems... and more.

Links

Page 27: Automated Amazon EC2 Cloud deployments with openQRM

openQRM Community: http://www.openqrm.com/ (http://www.openqrm.com/)openQRM Project at sourceforge: http://sourceforge.net/projects/openqrm/ (http://sourceforge.net/projects/openqrm/)openQRM Enterprise: http://www.openqrm-enterprise.com/ (http://www.openqrm-enterprise.com/)openQRM at Twitter: https://twitter.com/openQRM (https://twitter.com/openQRM)openQRM at Facebook: https://www.facebook.com/pages/openQRM-Enterprise/324904179687(https://www.facebook.com/pages/openQRM-Enterprise/324904179687)Amazon EC2: http://aws.amazon.com/ec2/http://linuxcoe.sourceforge.net/(http://aws.amazon.com/ec2/http://linuxcoe.sourceforge.net/)