i
Preface
Purpose of This Document
This guide describes the operating procedures of the IaaS Service Portal for
the services provided by FUJITSU Cloud Service K5.
You are recommended to also refer to the following related manuals.
- IaaS Features Handbook
- IaaS API References
Abbreviations in the present document
In this document, product names are written as follows.
Official Name Abbreviation
FUJITSU Cloud Service K5 IaaS K5 IaaS
Microsoft Windows Server Windows Server Windows
Microsoft Windows Server 2016 Windows 2016
Microsoft Windows Server 2012 R2 Windows 2012 R2
Microsoft Windows Server 2012 Windows 2012
Microsoft Windows Server 2008 R2 Windows 2008 R2
Microsoft Windows Server 2008 Windows 2008
Windows 10 Windows 10
Windows 8.1 Windows 8.1
Windows 7 Windows 7
Red Hat® Enterprise Linux 6.x (for Intel64) (x
is a number)
RHEL 6.x (x is a
number)
Linux
Red Hat Enterprise Linux 7.x (for Intel64) (x is
a number)
RHEL 7.x (x is a
number)
Red Hat OpenShift Container Platform 3.x
(English) (x is a number)
RHOCP 3.x (x is a
number)
Community Enterprise Operating System 6.x
(x is a number)
CentOS 6.x (x is a
number)
CentOS
ii
Official Name Abbreviation
Community Enterprise Operating System 7.x
(x is a number)
CentOS 7.x (x is a
number)
Red Hat Update Infrastructure RHUI
Red Hat Enterprise Linux AUS (AMC Update
Support)
RHEL AUS
SUSE Linux Enterprise Server 12 Service
Pack 1 for AMD64 & Intel64
SLES 12 SP1 Linux
SUSE Linux Enterprise Server SLES
Windows Server Update Services WSUS
VMware vSphere VMware vSphere VMware
VMware ESX ESX
VMware ESXi ESXi
VMware vCenter Server vCenter Server
VMware vSphere Client vSphere Client
VMware Tools VMware Tools
Trademarks
・ Microsoft, Windows, Windows Server and other Microsoft product names and
model names are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
・ Java is a registered trademark of Oracle Corporation and its subsidiaries or
affiliates in the United States and/or other countries.
・ Xeon is a trademark of Intel Corporation in the United States and/or other countries.
・ Linux® is a registered trademark of Linus Torvalds in the United States and/or
other countries.
・ Red Hat, Red Hat Enterprise Linux, and OpenShift are trademarks of Red
Hat, Inc. registered in the United States and/or other countries.
・ Ubuntu is a registered trademark of Canonical Ltd.
・ The OpenStack Word Mark is either a registered trademark/service mark or
trademark/service mark of the OpenStack Foundation, in the United States
and other countries and is used with the OpenStack Foundation's permission.
・ VMware and VMware product names are either trademarks or registered
trademarks of VMware, Inc. in the United States and/or other countries.
・ SAP and SAP logos, SAP R/3, mySAP.com, mySAP Business Suite, and
iii
other SAP products are either trademarks or registered trademarks of SAP
AG in Germany and/or other countries.
・ Akamai and Akamai Intelligent Platform are either trademarks or registered
trademarks of Akamai Technologies, Inc.
・ Novell is a registered trademark of Novell Inc. in the United States and/or
other countries; SUSE and SUSE logos are either trademarks or registered
trademarks of SUSE LLC in the United States and/or other countries.
・ Other company names and product names mentioned in this manual are
trademarks or registered trademarks of their respective companies.
In addition, the company name and product name described in this document are
trademarks or registered trademarks of each company.
Compliance with Export Control Regulations
When exporting this document or providing it to a third party, check the export
control laws and regulations of your country and the U.S. and take necessary
procedures.
Notices
- The content of this manual is subject to change without notice.
- The content of this manual shall not be reproduced without express written
permission from FUJITSU LIMITED.
- FUJITSU LIMITED shall bear no responsibility for any claims of violation of
a third party's patent or other rights arising from the use of the data described
in this document.
iv
Document history
Version Date Edited places Description
2.0 April 4, 2017 Whole Initial Release
2.1 April 21, 2017 Ch. 11 and 13 Added descriptions.
2.2 May 19, 2017 Whole Modification of section number
Ch. 6 Addition of "Confirm and Cancel
Resize/Migrate" menu.
Ch. 10 Addition of volume type in Table
14.
Addition of storage action (Connect
and Disconnect Storage)
2.3 May 31, 2017 Ch. 10 Update of Table 14 and Table 15
Ch. 12 Table 20 Addition of the link to
Subnet Detail
Ch. 12.2.2 Addition of Delete action
in the Port.
Ch. 12.5 Addition of Subnet
2.4 June 30, 2017 Ch. 23 Addition of the API execution
function
2.5 July 18, 2017 Ch. 16 Addition of functions for
creation/editing/deletion of the
following firewall features.
- Firewalls
- Firewall policies
- Firewall rules
2.5.1 August 1, 2017 Ch. 2 Updated Figure 1
Ch. 3 Overall correction focusing on
Paging and Update button function
addition
Ch. 6 Added explanation of required
entry items in "6.3.1 How to Create
Virtual Server"
2.6 September 1, 2017 Ch. 19 Added VPN Service
v
2.7 September 28, 2017 Ch. 24 Added Operation Log
2.8 December 13, 2017 Ch. 1 Modified the OpenStack
Foundation trademark information
Ch. 11 Added Object Storage
Ch. 27 Added Virtual Server Import and
Export
2.9 March 22, 2018 Ch. 6
Ch. 6.1.1 Added the "Edit
metadata" Action
Ch. 6.3 Added the metadata
function of Creating Virtual Server
Ch. 11 Removed the restriction regarding
object storage in 11.4
Ch. 21 Added the IPsec VPN function
Ch. 23 Updated Table 49
Ch. 27
Ch. 27.1 Added the history function
of API Execution
2.9.1 April 20, 2018 Ch. 15 Ch. 15.5.1 Corrected the port
number of Security Group Rule
(MS SQL)
Ch. 19 Ch. 19.5 Added SRV to the
supported records
2.9.2 April 26, 2018 Ch. 11 Ch. 11.3 Added advisory note
regarding object list display
2.10 June, 1, 2018 Ch. 4 Ch. 4.2 Added Advisory Notes
Ch. 6 Ch. 6.6 Added the Port Creation
Function
Ch. 12 Ch. 12.2.1 Added the Snapshot
Restoration Function
Ch. 14 Ch. 14.4 Added the Routing Setting
Function
Ch. 19 Ch. 19.1 Added display content to
the DNS Zone list
3.0 June 29, 2018 Ch. 1 Ch. 1.2 Added the Functions
Provided by the IaaS Service
Portal
vi
Ch. 19 Added the Load Balancer
(Western Japan Region 3)
Function
Ch. 20 Ch. 20.5 Added PTR to Record
Registration
Ch. 21 Updated Table 43
Ch. 23 Ch. 23.5 Added Starting the
Database Virtual Server After
Patch Application
Ch. 23.8 Added Rebooting the
Database Virtual Server After
Patch Application
3.0.1 July 18, 2018 Ch. 19 Ch. 19.3 Added How to Delete
Load Balancer
3.1 July 31, 2018 Ch. 1 Ch. 1.2 Added Eastern Japan
Region 3
Ch. 3 Ch. 3.1.1 Added the Logout
Function
Ch. 6 Ch. 6.7 Added Create Private
Image
Ch. 18 Ch. 18.8 Updated Add Virtual
Server
Ch. 30 Added Bare Metal Service
(Shared Disks)
3.2 October 12, 2018 Ch. 11 Response for Eastern Japan
Region 3/Western Japan Region
Ch. 22 Response for Eastern Japan
Region 3/Western Japan Region
Ch. 27 Added Alarm (Eastern Japan
Region 3/Western Japan Region
3)
vii
Contents
Preface .................................................................................................................................... i
Document history ................................................................................................................. iv
Chapter 1 Introduction ......................................................................................................... 1
IaaS Service Portal Overview ................................................................................... 1
1.1.1 IaaS Service Portal ......................................................................................... 1
1.1.2 Recommended Environment .......................................................................... 1
1.1.3 Privilege Required for Operation ................................................................... 1
Functions Provided by the IaaS Service Portal ....................................................... 2
Chapter 2 Overall Structure ................................................................................................ 5
GUI Structure ............................................................................................................ 5
Chapter 3 Common Operations ........................................................................................... 6
Description .................................................................................................................. 6
3.1.1 System Area Common Operations ................................................................. 6
3.1.2 Display Area Common Operations ................................................................. 7
Chapter 4 Login .................................................................................................................... 8
How to Login .............................................................................................................. 8
Advisory Notes ........................................................................................................... 9
Chapter 5 Top ...................................................................................................................... 10
Alarm ........................................................................................................................ 10
5.1.1 Select Alarm ................................................................................................... 11
5.1.2 Alarm History ................................................................................................. 11
5.1.3 Graph ............................................................................................................. 12
Service Usage ........................................................................................................... 12
5.2.1 Select Graph of Service Usage ..................................................................... 13
5.2.2 Graph ............................................................................................................. 13
5.2.3 Ranking .......................................................................................................... 14
Resource Usage ........................................................................................................ 15
Chapter 6 Virtual Server .................................................................................................... 16
Virtual Servers List ................................................................................................. 16
6.1.1 Action ............................................................................................................. 17
Virtual Server Details .............................................................................................. 19
6.2.1 Action ............................................................................................................. 21
viii
Create Virtual Server .............................................................................................. 22
6.3.1 How to Create Virtual Server ....................................................................... 22
Edit Virtual Server................................................................................................... 26
6.4.1 How to Edit Virtual Server ........................................................................... 26
Resize Virtual Server ............................................................................................... 27
6.5.1 How to Resize Virtual Server ....................................................................... 27
Port Creation ............................................................................................................ 28
6.6.1 How to Create a Port .................................................................................... 28
Create Private Image ............................................................................................... 31
6.7.1 How to Create Virtual Server Image ........................................................... 31
Chapter 7 Key Pair ............................................................................................................. 32
Key Pair List ............................................................................................................ 32
Key Pair Creation ...................................................................................................... 32
7.2.1 How to Create a Key Pair ............................................................................... 32
Key Pair Import .......................................................................................................... 33
7.3.1 How to import the key pair .............................................................................. 33
Key Pair Details ......................................................................................................... 35
Key Pair Deletion ..................................................................................................... 36
7.5.1 How to delete a key pair ................................................................................. 36
Chapter 8 Image .................................................................................................................. 37
Image List ................................................................................................................. 37
8.1.1 Action ............................................................................................................. 38
Image Details ........................................................................................................... 39
Chapter 9 Schedule ............................................................................................................. 40
Schedule List ............................................................................................................ 40
Create Schedule ....................................................................................................... 40
9.2.1 How to Create Schedule................................................................................ 40
Schedule Details ........................................................................................................ 44
Schedule Deletion ..................................................................................................... 45
9.4.1 How to delete Schedule ................................................................................. 45
Chapter 10 Storage ............................................................................................................. 46
Storage List .............................................................................................................. 46
10.1.1 Action ............................................................................................................. 47
Storage Details ......................................................................................................... 48
Create Storage .......................................................................................................... 50
10.3.1 How to Create Storage .................................................................................. 50
ix
Edit Storage .............................................................................................................. 51
10.4.1 How to Edit Storage ...................................................................................... 51
Disconnect Storage ................................................................................................... 51
Connect Storage ....................................................................................................... 51
Create Snapshot ....................................................................................................... 51
10.7.1 How to Create Snapshot ............................................................................... 51
Chapter 11 Object Storage ................................................................................................. 52
Function Overview ................................................................................................... 52
Usage Methods of Object Storage ........................................................................... 54
11.2.1 Create a Container ........................................................................................ 54
11.2.2 Create an Object ............................................................................................ 59
11.2.3 Download an Object ...................................................................................... 65
11.2.4 Import a VM Image ....................................................................................... 65
Advisory Notes ......................................................................................................... 66
Chapter 12 Snapshot .......................................................................................................... 67
Snapshot List Screen ............................................................................................... 67
12.1.1 Action ............................................................................................................. 68
Snapshot Details Screen .......................................................................................... 68
12.2.1 Restore a Snapshot ....................................................................................... 69
Edit Snapshot Screen .............................................................................................. 70
Advisory Notes ......................................................................................................... 70
Chapter 13 Virtual Network .............................................................................................. 71
Virtual Network List ................................................................................................ 71
13.1.1 Action ............................................................................................................. 72
Virtual Network Details .......................................................................................... 72
13.2.1 Action for Subnet........................................................................................... 74
13.2.2 Action for Port ............................................................................................... 74
Create Virtual Network ........................................................................................... 74
13.3.1 How to Create Virtual Network ................................................................... 74
Edit Virtual Network ............................................................................................... 78
13.4.1 How to Edit Virtual Network ....................................................................... 78
Add Subnet ............................................................................................................... 78
Chapter 14 Virtual Router ................................................................................................. 79
Virtual router list ..................................................................................................... 79
14.1.1 Action ............................................................................................................. 80
Virtual Router Overview ......................................................................................... 80
x
14.2.1 Action ............................................................................................................. 81
Virtual Router Creation ........................................................................................... 82
14.3.1 How to create a virtual router ...................................................................... 82
Edit a Virtual Router ............................................................................................... 82
14.4.1 How to edit a virtual router ......................................................................... 82
Add interface ............................................................................................................ 83
Chapter 15 Security Group ................................................................................................ 84
Security Group List .................................................................................................. 84
15.1.1 About Operation ............................................................................................ 84
Security Group Creation .......................................................................................... 85
15.2.1 How to create a security group..................................................................... 85
Security Group Details ............................................................................................ 86
Manage Security Group Rules ................................................................................ 87
15.4.1 How to Transfer to the Rule Management Screen...................................... 88
Addition of Security Group Rules ........................................................................... 89
15.5.1 How to Add Security Group Rules ............................................................... 89
Export Security Group Rules .................................................................................. 91
15.6.1 How to Export Rules ..................................................................................... 91
Import Security Group Rules .................................................................................. 91
15.7.1 How to Import Rules ..................................................................................... 91
Deletion of Security Group Rules ........................................................................... 92
15.8.1 How to Delete Rules ...................................................................................... 92
Editing a Security Group ......................................................................................... 93
15.9.1 How to Edit a Security Group ...................................................................... 93
Deletion of Security Group ............................................................................... 94
15.10.1 How to Delete a Security Group .................................................................. 94
Chapter 16 Global IP .......................................................................................................... 95
Global IP List ........................................................................................................... 95
16.1.1 Action ............................................................................................................. 95
Reserved Global IP ................................................................................................... 95
Allocate Global IP .................................................................................................... 96
Deallocate Global IP ................................................................................................ 97
Release Global IP ..................................................................................................... 97
Chapter 17 Firewall ............................................................................................................ 98
Function Overview ................................................................................................... 98
Firewall List Screen ................................................................................................. 99
xi
Firewall Creation Procedure ................................................................................. 100
17.3.1 Firewall Rule Sorting Operation ................................................................ 102
Advisory Notes ....................................................................................................... 104
Chapter 18 Load Balancer................................................................................................ 105
Load Balancer List ................................................................................................. 105
18.1.1 Action ........................................................................................................... 105
Load Balancer Details ........................................................................................... 106
Create Load Balancer ............................................................................................ 109
18.3.1 How to Create Load Balancer .................................................................... 109
Add Subnet .............................................................................................................. 111
18.4.1 How to Add Subnet ...................................................................................... 111
Delete Subnet .......................................................................................................... 112
18.5.1 How to Delete Subnet .................................................................................. 112
Add Listener ............................................................................................................ 112
18.6.1 How to Add Listener .................................................................................... 112
Delete Listener ........................................................................................................ 112
Add Virtual Server .................................................................................................. 112
18.8.1 How to Add Virtual Server .......................................................................... 112
Delete Virtual Server .............................................................................................. 113
18.9.1 How to Delete Virtual Server ...................................................................... 113
Create Session Persistence Policy .................................................................. 113
Create SorryServer Policy ............................................................................... 113
18.11.1 How to Create SorryServer policy............................................................... 113
Create/Delete Policy ........................................................................................ 113
Set Health Check Information ........................................................................ 114
Set Security Group .......................................................................................... 114
Set Cipher Suite ............................................................................................... 114
Chapter 19 Load Balancer (Eastern Japan Region 3/Western Japan Region 3) .......... 115
Function Overview .................................................................................................. 115
How to Use Load Balancer ..................................................................................... 116
19.2.1 Create a Load Balancer ............................................................................... 117
19.2.2 Load Balancing Settings .............................................................................. 118
19.2.3 Confirmation after Creation ....................................................................... 125
How to Delete Load Balancer ................................................................................ 127
Points to Note ......................................................................................................... 127
Chapter 20 DNS ................................................................................................................ 128
xii
DNS Zone List ........................................................................................................ 128
20.1.1 About Operation .......................................................................................... 129
DNS Zone Registration .......................................................................................... 129
20.2.1 How to Register DNS Zone ......................................................................... 129
Record List .............................................................................................................. 131
20.3.1 About Operation .......................................................................................... 132
Record Details ........................................................................................................ 132
Record Registration ............................................................................................... 134
20.5.1 How to register records ............................................................................... 134
Editing Records ...................................................................................................... 141
20.6.1 How to edit records ..................................................................................... 141
Record Deletion ...................................................................................................... 142
20.7.1 How to delete records .................................................................................. 142
DNS Zone Deletion ................................................................................................. 142
20.8.1 How to delete DNS zone ............................................................................. 142
Chapter 21 VPN Service (SSL-VPN) ............................................................................... 144
Function Overview ................................................................................................. 144
Usage Method of SSL-VPN Connections .............................................................. 144
Advisory Notes ....................................................................................................... 150
Chapter 22 VPN Service (IPsec VPN) ............................................................................. 151
Function Overview ................................................................................................. 151
Usage Method of IPsec VPN Connections ............................................................ 152
How to Delete IKE and IPsec Policies .................................................................. 162
Advisory Notes ....................................................................................................... 164
Chapter 23 Database Virtual Server ............................................................................... 165
Database Virtual Server List ................................................................................ 165
23.1.1 About Operation .......................................................................................... 167
Database Virtual Server Creation ........................................................................ 168
23.2.1 How to create database virtual server ....................................................... 168
Database Virtual Server Details ........................................................................... 172
Database Virtual Server Startup .......................................................................... 177
23.4.1 How to start up Database Virtual Server.................................................. 177
Starting the Database Virtual Server after Patch Application .......................... 178
23.5.1 How to start the database virtual server after patch application ........... 178
Database Virtual Server Stop ............................................................................... 179
23.6.1 How to stop database virtual server .......................................................... 179
xiii
Database Virtual Server Reboot ........................................................................... 179
23.7.1 How to reboot the database virtual server ................................................ 180
Rebooting the Database Virtual Server after Patch Application........................ 181
23.8.1 How to reboot the database virtual server after patch application ......... 181
Database Virtual Server Deletion ......................................................................... 182
23.9.1 How to delete the database virtual server ................................................ 182
DB Parameter Group Details......................................................................... 183
23.10.1 How to Check DB Parameter Group .......................................................... 183
Database Log List ........................................................................................... 184
23.11.1 How to see log .............................................................................................. 184
Database Log Details...................................................................................... 185
Chapter 24 Stack............................................................................................................... 186
Stack List ................................................................................................................ 186
Stack Details .......................................................................................................... 187
Create Stack ........................................................................................................... 188
24.3.1 How to Create Stack ................................................................................... 188
Edit Stack ............................................................................................................... 189
Chapter 25 Monitoring ..................................................................................................... 190
Monitoring Target Resource List .......................................................................... 190
25.1.1 How to display target resource list ............................................................ 190
Resource Audit Information .................................................................................. 192
Graph ...................................................................................................................... 193
25.3.1 How to change the displayed content of the graph ................................... 193
25.3.2 Graph Operation ......................................................................................... 194
Chapter 26 Alarm .............................................................................................................. 195
Alarm List ............................................................................................................... 195
26.1.1 About Operations ........................................................................................ 196
Alarm Creation ....................................................................................................... 196
26.2.1 How to create an alarm .............................................................................. 196
Alarm Details ......................................................................................................... 210
Action setting ......................................................................................................... 214
26.4.1 How to set an alarm .................................................................................... 214
History of Alarm ..................................................................................................... 218
26.5.1 How to display the history of alarm .......................................................... 218
Alarm Deletion ....................................................................................................... 221
26.6.1 How to delete an alarm ............................................................................... 221
xiv
Chapter 27 Alarm (Easter Japan Region 3/Western Japan Region 3) .......................... 222
Function Outline .................................................................................................... 222
Alarm List ............................................................................................................... 223
27.2.1 About Operations ........................................................................................ 224
Alarm Details ......................................................................................................... 225
Alarm Creation ....................................................................................................... 227
27.4.1 How to create an Alarm .............................................................................. 227
Alarm Editing ......................................................................................................... 230
27.5.1 How to edit an alarm .................................................................................. 230
Delete Alarm ........................................................................................................... 232
27.6.1 How to delete an alarm ............................................................................... 232
History of Alarm ..................................................................................................... 233
27.7.1 How to display History of Alarm ................................................................ 234
Alarm Details ......................................................................................................... 236
Chapter 28 Operation Log ................................................................................................ 239
Function Overview ................................................................................................. 239
Usage Method of Operation Logs .......................................................................... 241
Advisory Notes ....................................................................................................... 242
Chapter 29 API Execution ................................................................................................ 243
Function Overview ................................................................................................. 243
Usage Example ....................................................................................................... 243
29.2.1 Information Necessary for API Execution ................................................. 243
29.2.2 Endpoint List ............................................................................................... 244
29.2.3 Example of Virtual Server List Acquisition .............................................. 246
29.2.4 Example of Virtual Server Creation .......................................................... 248
Chapter 30 VM Import and Export ................................................................................. 252
Function Overview ................................................................................................. 252
Usage Example ....................................................................................................... 253
30.2.1 VM Import ................................................................................................... 253
30.2.2 VM Export ................................................................................................... 256
Advisory Notes ....................................................................................................... 258
Chapter 31 Bare Metal Service (Shared Disks) .............................................................. 259
Function Overview ................................................................................................. 259
How to Use a Shared Disk ..................................................................................... 260
31.2.1 Shared Disk List Display ............................................................................ 260
31.2.2 Shared Disk Detailed Display .................................................................... 260
xv
Advisory Notes ....................................................................................................... 261
1
Chapter 1 Introduction
IaaS Service Portal Overview
1.1.1 IaaS Service Portal
IaaS Service Portal is a GUI application for using FUJITSU Cloud Service (IaaS) service.
On the IaaS Service Portal, you can operate on some of the IaaS resources.
1.1.2 Recommended Environment
The recommended environment for the integrated service portal is as follows.
Table 1 Recommended Operating Environment
OS Windows 7/8.1
Browser Microsoft Internet Explorer 11
1.1.3 Privilege Required for Operation
To operate the IaaS Service Portal, you need the privilege "System Owner Role
(cpf_systemowner)".
If you operate with other privilege, it may not be displayed correctly.
2
Functions Provided by the IaaS Service Portal
The functions available on the IaaS Service Portal vary depending on the
Region. This section explains the available regions and the available functions.
Available Regions
The relationships of the Region Names and the Region Identifiers are
shown below.
Table 2 List of Available Regions
Country Region Name Abbreviation Region
Identifier
Number of
Availability
Zones (AZ)
Japan Eastern Japan Region 1 Japan East 1 jp-east-1 2
Eastern Japan Region 2 Japan East 2 jp-east-2 2
Eastern Japan Region 3 Japan East 3 jp-east-3 1
Western Japan Region 1 Japan West 1 jp-west-1 2
Western Japan Region 2 Japan West 2 jp-west-2 2
Western Japan Region 3 Japan West 3 jp-west-3 1
UK UK Region 1 UK uk-1 2
Finland Finland Region 1 Finland fi-1 2
Germany Germany Region 1 Germany de-1 2
Spain Spain Region 1 Spain es-1 2
US US Region 1 US us-1 2
*For details on regions, refer to the "IaaS Features Handbook – Region".
Available Functions
A list of the available functions in each region is given below.
Table 3 List of Available Functions by Region
[Legend] ✓: Available
- : Not available as at July 2018 (Includes functions to be released later)
3
No Function Eastern Japan
Region 1/Region 2
Western Japan
Region 1/Region 2
UK/US
Finland
Germany/Spain
Eastern Japan
Region 3
Western Japan
Region 3
1 Top ✓ -
2 Virtual Servers ✓ ✓
3 Key Pairs ✓ ✓
4 Images ✓ ✓
5 Schedule ✓ -
6 Storage ✓ ✓
7 Object Storage ✓ ✓
8 Snapshots ✓ ✓
9 Virtual Networks ✓ ✓
10 Virtual Routers ✓ ✓
11 Security Groups ✓ ✓
12 Global IPs ✓ ✓
13 Firewalls ✓ ✓
14 Load Balancers ✓(*1) ✓(*1)
15 DNS ✓(*2) ✓(*2)
16 VPN Service (SSL-VPN) ✓ ✓
17 VPN Service (IPsec VPN) ✓ ✓
18 Database Virtual Servers ✓ -
19 Stacks ✓ -
20 Monitoring ✓ -
21 Alarms ✓ ✓
22 Operation Logs ✓ ✓
23 API Execution ✓ ✓
24 VM Import/Export ✓ -
25 Bare Metal Service
(Shared Disks)
- Only Eastern Japan
Region 3
*1: The functions available in Eastern Japan Region 3/Western Japan Region 3
and the operation screens differ from the other regions indicated in Table 2
4
List of Available Regions.
*2: Only provided in Eastern Japan Region 1
Points to Note
As there is only one AZ in Eastern Japan Region 3/Western Japan
Region 3, AZ information is not displayed on the screen.
Even though functions may be common between regions, depending
on the region the layouts of screens differ slightly. Unless otherwise
noted, the screens shown in this guide are those of Eastern Japan
Region 1.
5
Chapter 2 Overall Structure
GUI Structure
GUI of K5 IaaS service portal is configured as follows.
Table 4 Area Name
No. Name Details
1 System Area Displays a service name, a user name, etc.
2 Side Bar Select a resource and display it in the display area.
3 Display Area Display information on the selected resource.
Figure 1 Service Portal
6
Chapter 3 Common Operations
Description
This section explains the common operations of the IaaS Service Portal window.
3.1.1 System Area Common Operations
Figure 2 System Area Common Operations
・ Switch Language
Selecting a language from the pull-down menu enables switching of the
display language between Japanese and English.
・ Switch Region
Selecting a region name from the pull-down menu enables switching of
regions.
・ Logout
Clicking a user name displays "Logout" in the pull-down menu. Clicking
"Logout" logs you out of the IaaS service portal.
7
3.1.2 Display Area Common Operations
Figure 3 Display Area Common Operations
・ Switch Side Bar Display
Switches between display/non-display of the side bar. When the side bar is
not displayed, the display area is enlarged.
・ Switch Project
Selecting a project name from the pull-down menu enables switching of
projects. There are cases when it is not possible to switch projects, such as
when resources are being created.
・ Update Button
Clicking this button updates (refreshes) the information in the Display Area.
There are cases where updating of information is not possible, such as when
resources are being created.
・ Add Resource
Clicking this displays the Add Resource window.
・ Filter
The items displayed in a list can be filtered using an entered string.
・ Paging
This enables division of a list into multiple pages when there are many
records. The following operations switch the page.
Changing the number of pages.
Clicking the previous or next page button.
8
Chapter 4 Login
How to Login
Enter the contract number, user name, and password, then press the "Login"
button.
Figure 4 Login
In case there are input error of the contract number, user name or password,
following error message is displayed.1
Figure 5 Login with an error message
1 From a security point of view, if login fails five times consecutively, you cannot log in for 30 minutes.
9
Advisory Notes
When an authentication error occurs during login, the browser's cache may
be the cause. Take corrective action following the procedure below.
1. Delete the cache of IE 11.
From the Tool Bar, select "Tools" > "Internet Options" > "General Tab",
and "Delete" in the "Browsing history".
Check "Cookies and website data", and press "Delete".
2. Close all IE 11 windows.
3. Start IE 11 again and log in.
11
5.1.1 Select Alarm
Select an alarm whose graph you want to display from alarm list.
Figure 8 Select Alarm
5.1.2 Alarm History
Table 5 Items of Alarm
No Item Name Description
1 Insufficient Number of alarms with insufficient condition
settings
2 Action Succeeded Number of successful alarms
3 Action Failed Number of failed alarms
Figure 9 Result of Alarm Collection
Most of data that are highly likely to be conditional settings as meaningless
alarms are distributed to Insufficient.
12
5.1.3 Graph
The graph on the horizontal axis shows time and the vertical axis shows the
number of alarms. When you move the cursor closer to the graph, you can check
the details of each time zone.
Figure 10 Alarm Graph Details
If you move the mouse wheel upwards on the graph you can zoom in, and when
you move the mouse wheel downwards it will zoom out.
Service Usage
You can check the usage of each service in the project by graph or ranking.
Figure 11 Service Usage
13
5.2.1 Select Graph of Service Usage
You can select service usage graphs from the following five.
・ Virtual Server (Default)
・ Block Storage
・ Image
・ Load Balancer
・ Network
Figure 12 Select Service
5.2.2 Graph
The graph on the horizontal axis shows time and the vertical axis shows the
operation time. The graph display period can be selected from the following three.
・ This Month (Default)
・ 6 Months
・ 12 Months
Figure 13 Graph after switching display period
Also, by moving the cursor closer to the graph, you can check the details of each
time zone. When "This month" is selected, daily details are displayed, when "6
months" or "12 months" is selected, monthly details are displayed.
14
Figure 14 Service Usage Graph Details (This Month)
5.2.3 Ranking
We will display usage status of this month in ranking format. The color of the
ranking corresponds to the color of the graph.
Figure 15 Ranking of Service Usage
15
Resource Usage
You can check the number of each item created in the project.
Table 6 Resource Usage List
No. Item Name Description
1 Virtual Server (Green) Number of running virtual server resources
2 Virtual Server (Red) Error number of virtual server resources
3 Virtual Network Number of virtual network resources
4 Port Number of resources on port
5 IP Address Number of global IP address resources
6 Block Storage Number of block storage resources
7 Total Storage Total block storage capacity
Figure 16 Resource Usage List
16
Chapter 6 Virtual Server
Virtual Servers List
You can check the list and status of the virtual servers created in the project.
Figure 17 Virtual Server List
Table 7 Virtual Server List Table
No. Item Name Description
1 Virtual Server Name Name of a virtual server
2 Status Refer to Table 8 Virtual Server Status
3 IP Address IP address of a virtual server
Display multiple lines if you have multiple IP
addresses
4 AZ The availability zone in which virtual servers
reside
5 Dedicated Display of dedicated virtual servers
"true" will be displayed for dedicated virtual
servers
6 Action Various operations on virtual servers
Table 8 Virtual Server Status
No. Status Description
1 ACTIVE Active State
2 BUILD Build State
3 DELETED Deleted State
4 ERROR Error State
5 HARD_REBOOT Forced Reboot State
6 MIGRATING Migration State
17
7 PASSWORD Password Setting State
8 PAUSED Paused state
9 REBOOT Reboot State
10 REBUILD Rebuild State
11 RESCUE Rescue State
12 RESIZE Resize State
13 REVERT_RESIZE Revert Resize State
14 SHELVED Released State (Resource
Pending)
15 SHELVED_OFFLOADED Released State
16 SHUTOFF Stopped State
17 SOFT_DELETED Deleted State (Disk is
suspended)
18 SUSPENDED Suspend State
19 UNKNOWN Unknown State
20 VERIFY_RESIZE Verify Resize State
6.1.1 Action
Figure 18 Virtual Server Action
18
We will provide the following as actions of the virtual server list.
1. Resize
Refer to 6.5 Resize Virtual Server.
2. Soft Reboot
Restart a virtual server.
3. Hard Reboot
Turn off an instance, then turn it back on
4. Shutdown
Shutdown a virtual server.
5. Release
Release a virtual server.
6. Remote Console
Open Remote Console.
Some browsers are blocked by pop-ups. In that case please allow pop-ups.
7. Edit
Refer to 6.4 Edit Virtual Server.
8. Edit Metadata
Edit (Add/Display/Update/Delete) metadata of a virtual server.
9. Create Image
Refer to 6.7 Create Private Image.
10. Delete
Delete a virtual server.
11. Start-up
Start a virtual server.
12. Restore
Restore a virtual server.
13. Confirm Resize/Migration
Execute to resize/migrate a virtual server.
14. Cancel Resize/Migration
Cancel to resize/migrate a virtual server.
19
Virtual Server Details
You can open virtual server details by clicking a virtual server name in a virtual
server list.
Detailed information on a virtual server not displayed in a virtual server list is
displayed.
Figure 19 Virtual Server Details
20
Table 9 Virtual Server Details
No. Classification Item Name Description
1 Information Virtual Server Name Name of a virtual server
2 Virtual Server ID Unique value
3 Status Status of a virtual server
4 AZ Availability Zone
5 Dedicated Display of dedicated
virtual servers
"true" will be displayed
for dedicated virtual
servers
6 Key Pair Key Pair
7 Image Name Image Name
8 Date and Time of
Creation
Date and Time of
Creation
9 Spec Virtual Server Type Specification of a virtual
server
10 Memory Memory Size
11 Virtual CPU Number of CPUs
12 Connected Disk Access Point Connection Block
Storage
13 Connection Destination Connection Destination
Volume
14 Port Port Name Port Name
15 Virtual Network Name Virtual Network Name
16 Private IP Address Private IP Address
17 Global IP Address Displayed when a global
IP address is set.
18 Security Group Security Group Name
19 Action Various operations on
ports
20 Metadata Key Key set for virtual server
metadata
21 Value Value set for virtual
server metadata
21
6.2.1 Action
Figure 20 Port Action
As a port action it provides the following.
1. Edit
2. Security Group Settings
3. Allocate Global IP
4. Deallocate Global IP
5. Delete
22
Create Virtual Server
This is the GUI when creating a new virtual server. Click Create icon of Virtual
Server List.
6.3.1 How to Create Virtual Server
When creating a Virtual Server, it is necessary to create a virtual network in advance.
1. Click an icon of Virtual Server list
2. Set the following and click "Next".
Figure 21 Create Virtual Server (Virtual Server)
Entry of items marked with * (asterisk) to the right of the label is required. (Common to all
windows)
・ AZ
・ Virtual Server Name
・ Virtual Server Type
・ Boot Source
When "Storage" is selected, set the following.
Storage of AZ
Device name
When "Image" is selected, set the following.
Image
23
Device Size
Device Name
When "Snapshot" is selected, set the following.
Storage Snapshot
Device Name
3. Set the following and then click "Next".
Figure 22 Create Virtual Server (Virtual Network)
・ Virtual Network
4. Set the following and click "Next".
Figure 23 Create Virtual Server (Access and Security)
24
・ Key Pair
・ Security Group
5. Set the following and then click "Next".
Figure 24 Create Virtual Server (Optional)
・ Provisioning Script
・ Metadata(Up to 10 items)
Note: You can add, update, and delete the metadata from the virtual server list action
"Edit metadata".
25
6. Confirm the settings so far on the confirmation window. If there are no problems, click
"Create".
Please return to the virtual server list and make sure that the state of the created virtual
server is "BUILD". It will become available when the status is changed to "Active".
Figure 25 Create Virtual Server (Confirmation)
26
Edit Virtual Server
You can edit a server name of a virtual server. You can make transition from
"Edit" in the pull-down of the action of the virtual server you want to edit on the
virtual server list window.
6.4.1 How to Edit Virtual Server
1. Click the "Edit" from the pull-down of the virtual server that you want to edit on the virtual
server list window.
Figure 26 Virtual Server List
2. On the Edit Virtual Server window, enter a new virtual server name and click "Update".
Figure 27 Edit Virtual Server
27
Resize Virtual Server
You can change the specifications (number of virtual CPUs etc.) of a Virtual
Server. You can make transition from "Resize" of the action pull down of the
virtual server you want to change on the virtual server list window.
6.5.1 How to Resize Virtual Server
1. Click "Resize" from the pull-down of the virtual server you want to edit on the virtual server
list window.
Figure 28 Resize
2. Select a new Flavor, the number of Virtual CPUs and Memory allocated to this Flavor will
be shown under the Flavor Details section.
Figure 29 Resize Virtual Server
3. If there are no problems with the new flavor, click the "Resize" button.
4. This completes resizing a virtual server. Return to the server list window, and it will become
available when the status is changed to "ACTIVE".
28
Port Creation
Assign a new port to a virtual server. It is possible to add multiple ports to a
single virtual server.
6.6.1 How to Create a Port
1. Display the port list information from the Virtual Server Details screen
Click the "+" button on the Port List on the Virtual Server Details screen to transfer to the
Create Port screen.
Figure 30 Virtual Server Details Screen(Ports)
29
2. Create a Port
After entering the setting items on the Create Port screen, press the "Create" button to
create the port.
Figure 31 Create Port Screen
The items displayed on the Create Port screen are indicated in the table below.
Table 10 Displayed Content of Create Port Screen
No. Item Name Description
1 Port Name Name of the Port
2 AZ Availability zone where the port is created
3 Management State Management state of the port (true/false)
4 Network Name Select the Network to connect the Port to
5 Subnet Name Select the Subnet of the Network to connect the Port
to
6 Private IP Address Private IP Address settings
Perform settings in the IPv4 format.
*When an IP address that is already in use is specified,
port creation will fail.
30
3. Check the Port Details Screen
Clicking a port name on the port list on the Virtual Server Details screen displays the
Port Details screen. Here it is possible to check detailed information such as the Port ID,
etc.
Figure 32 Port Details Screen
*Operations for ports (editing/setting of security groups/allocation of global IP
addresses/deleting) can be performed from each action in 6.2.1 Action of the Virtual
Server Details screen.
31
Create Private Image
It is possible to create private images of virtual servers.
6.7.1 How to Create Virtual Server Image 1. From the pull-down menu of the target virtual server on the Virtual Server List screen,
click "Create Image". *"Create Image" is displayed when virtual servers are in the
stopped state.
Figure 33 Virtual Server List
2. After setting the image name and the target volume on the Create Virtual Server Image
screen, click the "Create" button to create an image.
Figure 34 Create Virtual Server Image Screen
3. The created image will be displayed with "private" as the visibility on the Image List
screen (For details, refer to 8.1Image List).
Figure 35 Image List Screen
32
Chapter 7 Key Pair
Key Pair List
You can check the list and status of the key pair created in a project.
Figure 36 Key Pair List
Table 11 Displayed Content of Key Pair List Table
No. Item Name Description
1 Key Pair Name Key Pair Name
2 Fingerprint Fingerprint of key pair
3 AZ The Availability Zone the key pair is in
4 Action Deletion of key pair
Key Pair Creation
Newly create the key pair to be used at the time of logging in to the virtual server.
7.2.1 How to Create a Key Pair
1. Click the creation icon "+" on the key pair list screen and display the key pair creation
screen.
33
2. On the "Key Pair Details" step screen, set the below information and click "Next Page".
Figure 37 (Entry of Key Pair Details information)
・ Key Pair Name
・ AZ
3. Check the setting content you have entered so far on "Confirmation" screen. If there are
no problems, click "Create".
Figure 38 (Confirmation for Setting Content)
4. If a key pair has been created, a private key is then started to be downloaded. Keep it in
a secure location.
Key Pair Import
Import the key pair created in another place in order to use it in the virtual server
of IaaS. Here register a public key only.
7.3.1 How to import the key pair
1. Click "Import Key Pair" on the Key Pair List screen.
2. Set the below information and click "Create"
34
Figure 39 Entry of key pair details information
・ Key Pair Name
・ Public Key
・ AZ
3. Check the setting content you have entered so far on the confirmation screen. If there
are no problems, click "Create".
Figure 40 Confirmation of Setting Content
35
Key Pair Details
Click the key pair name on the key pair list to open "Key Pair Details" screen.
Check the detailed information not displayed on the key pair list.
Figure 41 Key Pair Details
Table 12 Displayed Content of Key Pair Details
No. Category Item Name Displayed Content
1 Key Pair Details Key Pair Name Key Pair Name
2 Created At Created At
3 Fingerprint Fingerprint of Key Pair
4 Public Key A string of the key of a key pair
5 AZ Availability Zone where a key
pair exists
36
Key Pair Deletion
You can delete a key pair.
7.5.1 How to delete a key pair
1. On "Key Pair List" screen, click the "Delete" button of the key pair you want to delete.
Figure 42 Key Pair List (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 43 Confirmation Dialog of Deletion
37
Chapter 8 Image
Image List
You can check an available image list and status, etc.
*Images that have "shared" as their visibility are not displayed in the image list.
Figure 44 Image List
Table 13 Image List Table
No. Item Name Description
1 Image Name Name of an image
2 Status Status of an image
3 Visibility Visibility of an image
4 Protection Protected or not
5 Disk Format Format of an image disk
6 Action Various operations on an image
38
8.1.1 Action
Figure 45 Images Action
Provides the following as an action of an image list.
1. Create Virtual Server
Create a virtual server based on the selected image. For the virtual server
creation, refer to 6.3 Create Virtual Server.
2. Create Storage
Create storage based on the selected image. For the storage details, refer to
10.2 Storage Details.
39
Image Details
You can open image details by clicking an image name on an image list.
Detailed information on an image not displayed in an image list is displayed.
Figure 46 Image List
Table 14 Image Details
No. Classification Item Name Description
1 Information Image Name Image Name
2 Image ID ID to identify an image in unique
3 Status Status
4 Visibility Visibility
5 Protection Protection
6 Checksum Checksum of an image
7 Date and Time
of Creation
Date and Time of Creation
8 Date Updated Date Updated
9 Spec Size Size
10 Storage Format Storage Format
11 Disk Format Disk Format
12 Minimum Disk Minimum Disk Size
40
Chapter 9 Schedule
Schedule List
You can check a list and status of schedule created in a project.
Figure 47 Schedule List
Table 15 Schedule List Table
No. Item Name Description
1 Schedule Name Name of a Schedule
2 Time of Execution Time of Schedule Execution
3 Action Deletion of Schedule
Create Schedule
This is the GUI when creating a new schedule .Click Create icon of Schedule List
9.2.1 How to Create Schedule
When creating a Schedule, it is necessary to create a stack including a scaling policy.
1. Click an icon of schedule list
2. Set the following and click "Next".
41
Figure 48 Entry of Schedule Details information
Schedule Name
Time of Execution
Click "Setting" and set the following.
If "Monthly" is selected, set the below information
Figure 49 Time of Execution Setting(Monthly)
42
If "Weekly" is selected, set the below information
Figure 50 Time of Execution Setting(Weekly)
If "Daily" is selected, set the below information
Figure 51 Time of Execution Setting(Daily)
43
If "Hourly" is selected, set the below information
Figure 52 Time of Execution Setting(Hourly)
If "cron" is selected, set the below information
Figure 53 Time of Execution Setting (cron)
3. Set the following and click "Next"
Figure 54 Setting Execution URL
44
・ Stack
・ Resource
・ Execution URL
Execution URL is automatically set from "Stack" and "Resource".
4. Confirm the settings so far on the confirmation window. If there are no problems, click
"Create"
Figure 555 Confirmation for Setting Content
Schedule Details
Click the schedule name on the schedule list to open "Schedule Details" screen.
Check the detailed information not displayed on the schedule list.
Figure 56 Schedule Detail
45
Table 16 Displayed Content of Schedule Details
No. Category Item Name Displayed Content
1 Schedule Details Schedule Name Schedule Name
2 Time of Execution Time of Schedule
Execution
3 Execution URL Execution URL
Schedule Deletion
You can delete a schedule.
9.4.1 How to delete Schedule
On "Schedule List" screen, click the "Delete" button of the schedule you want to delete
Figure 57 Schedule List
1. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 58 Confirmation Dialog of Deletion
46
Chapter 10 Storage
Storage List
You can check a list and status of block storage created in a project.
Figure 599 Block Storage List
Table 17 Block Storage List Table
No. Item Name Description
1 Volume Storage Name of the volume
2 Status Major Storage Status
・ in-use : In use
・ creating : Creating
・ available : Available
3 Connected Virtual
Server
Access point when connected to a virtual server.
4 Size (GB) Volume Capacity
5 Type Type of volume
6 AZ The availability zone in which block storage
reside
7 Action Various operations for a volume
47
10.1.1 Action
Figure 60 Storage Action
Provide the following as actions of a storage list.
1. Edit Storage
Refer to 10.4 Edit Storage.
2. Delete Storage
Delete a storage.
3. Disconnect Storage
Refer to 10.5 Disconnect Storage.
4. Edit Connection
Refer to 10.6 Connect Storage.
5. Create Snapshot
Refer to 10.7 Create Snapshot.
48
Storage Details
You can open storage details by clicking a volume name of a storage list.
Detailed information on a storage not displayed in a storage list is displayed.
Figure 61 Storage Details
49
Table 18 Virtual Server Details
No. Classification Item Name Description
1 Information
Volume Name Volume Name
2 Volume ID Volume ID
3 Description Description of the volume
4 Status The volume status, in-use, etc.
5 Connected
Virtual Server
The connected virtual server
6 Size(GB) Volume capacity
7 Type Volume type
8 AZ Availability Zone
9 Date and Time
of Creation
Created date of Volume
10 readonly Readonly mode
11 attached_mode Read, write, execute
12 Snapshot Date and Time
of Creation
Created date of Snapshot
13 Snapshot
Name
Name of Snapshot
14 Description Snapshot description input by a user
15 Size (GB) Capacity of Snapshot
16 Action Various operations on a snapshot
50
Create Storage
This is the GUI when creating a new storage. You can make transition from an
icon on a storage list window.
10.3.1 How to Create Storage
1. Click an icon on a storage list window.
2. Set the following and click "Create".
Figure 62 Create Storage
・ Volume Name
・ Description
・ Size (GB)
・ Storage Source
Select a type and an AZ if you select "None".
Select a snapshot name to use if you select "snapshot".
Select an image to use, a type, and an AZ if you select "image".
Select a storage to use if you select "storage".
51
Edit Storage
10.4.1 How to Edit Storage
Figure 63 Edit Storage
You can edit the following. Click "UPDATE" after editing.
・ Volume Name
・ Description
Disconnect Storage
If a selected volume is connected to a Virtual Server, you can detach it from the
Virtual Server.
Connect Storage
It is possible to connect selected volumes to a Virtual Server.
Create Snapshot
10.7.1 How to Create Snapshot
1. Enter the following in Create Snapshot window, and click "CREATE".
Figure 64 Create Snapshot
・ Snapshot Name
・ Description
52
Chapter 11 Object Storage
Function Overview
This function provides the functionality for object storage on the IaaS Service
Portal. It enables use of online storage in which data can be stored and
retrieved on an object (their content and metadata) basis.
The functions provided are as follows:
・ Containers
Display of lists and details of containers
Creation, editing, and deletion of containers
Setting of access policies (ACL) for containers *1
Creation and deletion of container metadata *2
・ Objects
Display of lists and details of objects
Creation and deletion of objects
Re-upload of objects
Editing of object metadata *2
Download of objects
Importing of object VMs (Virtual Servers) *2
53
*1 The setting of access policies (ACL) for containers is a function that
enables the setting of container read privileges (X-Container-Read)
and write privileges (X-Container-Read). Using these settings it is
possible control access to containers by the following:
- Projects/users
- Referer headers included in HTTP requests
*2 These functions are not provided in Eastern Japan Region 3 and
Western Japan Region 3.
54
Usage Methods of Object Storage
This chapter explains the following usage methods:
・ Create a container
・ Create an object
・ Download an object
・ Import a VM image
11.2.1 Create a Container
1. Display the Containers List window
Clicking [Storage] -> [Object Storage] displays the Containers List window.
On this window it is possible to refer to the container name, the number of
objects, the amount of usage, and the access policies (ACL) of each
container.
Clicking the "+" button on the Containers List window displays the Create
Container window.
Figure 65 Containers List Window
2. Create a container
After entering each item on the Create Container window, click the "Create"
button and create the container. The created container will be displayed in the
Containers List window.
55
Figure 66 Create Container Window
The setting items listed below are those required when creating a
container.
Table 19 Entry Items for Container Creation
No. Item *1 Description
1 Container Name The name of the container
2 X-Container-Read The access policy (ACL) settings for read
privileges
3 X-Container-Write The access policy (ACL) settings for write
privileges
4 X-Versions-Location *2 The name of the container for versioning
management
5 Container Metadata *2 The key and value to set for the container
metadata
X-Container-Meta-
Access-Control-Allow-
Origin *2
"*" : Initial value
Note: If this value is changed uploading and
downloading of files from the portal is not
possible.
X-Container-Meta-
Access-Control-Max-Age
*2
"3628800" : Initial value
56
*1: For details on each item, refer to the "API Reference - Foundation Service".
*2: These items are not displayed in Eastern Japan Region 3 and Western Japan Region 3.
*3: Container names specified in Eastern Japan Region 3 and Western Japan Region 3 must
be unique within those regions.
3. Check the Container Detail window
The detailed information of a container can be referred to by clicking the
container name on the Containers List window. The Container Detail window
displays objects, container information, and container metadata.
Figure 677 Container Detail Window
57
The following table indicates the items displayed on the Container Detail
window.
Table 20 Container Detail Window Display Items
No. Category Item Description
1 Objects Object Name The name of the object
2 Size The size of the object
3 Content-Type The MIME type of the
object
4 Update Date and
Time (UTC)
The date and time when
the object was created or
metadata was changed
5 Container Info Container Name The name of the container
6 Object Counts The total number of
objects in the container
7 Size The size (in bytes) of the
objects in the container
8 X-Container-Read The access control (ACL)
for read privileges
9 X-Container-Write The access control (ACL)
for write privileges
10 X-Versions-
Location *1
The name of the container
for versioning
management
11 X-Trans-Id The ID assigned to the
request
12 Execution Date
and Time (UTC) *2
The date and time the
transaction is to be
executed
13 X-Fcx-Endpoint-
Request *2
The number indicating
that the request was
received as an API
endpoint
14 X-
Timestamp(UTC)
*2
The time the request was
processed
58
15 Container
Metadata
Container
Metadata Key *1
The key to set for the
container metadata
16 Container
Metadata Value *1
The value to set for the
container metadata
*1: This item is not displayed in Easter Japan Region 3 or Western Japan Region 3.
*2: These items are only displayed in Easter Japan Region 3 and Western Japan Region
59
11.2.2 Create an Object
1. Display the object list information from the Container Detail window
The object list information can be referred to from the Container Detail
window. The object name, size, Content-Type, and Update Date and Time
(UTC) are displayed in the object list information.
Clicking the "+" button on the Container Detail window displays the Create
Object window.
Figure 68 Container Detail Window (Object Section)
Another method for transferring to the Create Object window is to click
"Create Object" in the Action menu on the Containers List window.
60
2. Create an object
After entering each item on the Create Object window, click the "Create"
button and create the object. If the name matches that of an existing object, a
dialog checking whether to update the object will be displayed.
Figure 69 Create Object Window
61
The following table indicates the items displayed on the Create Object
window.
Table 21 Create Object Window Display Items
No. Item* Description
1 Object Name The name of the object
2 File The file to register
The maximum file size is 1 GB.
*When registering a file larger than 1 GB, the
setting for a large object is necessary.
*Please split files by yourself.
3 X-Detect-Content-
Type *2
Automatic and manual setting of the MIME
type of the object
4 Content-Type The MIME type setting of the object
5 X-Copy-From
Container *2
The name of the container of the source object
6 X-Copy-From Object
*2
The name of the source object
7 ETag The setting for the MD5 check sum value of
the object
8 Content-Disposition
*2
The setting for the behavior of the browser
9 Delete At Date (UTC) Specification of the time and date for deletion
of the object, in UTC format
10
Large Object *2
The setting regarding large objects
There are the following three methods
No settings The setting when not handling as a large
object
X-Object-Manifest The setting for dynamic large objects
Sets the container name/object name.
multipart-manifest The setting for static large objects
Sets using JSON format.
11 Object Metadata *2 The key and value to set for the object
metadata
*1: For details on each item, refer to the "API Reference - Foundation Service".
*2: These items are not displayed in Eastern Japan Region 3 and Western Japan Region 3.
62
3. Check the Object Detail window
Clicking the object name in the Object List on the Container Detail window
displays the Object Detail window. You can refer to detailed information such
as object metadata, etc.
Figure 70 Object Detail Window
63
The following table indicates the items displayed on the Object Detail
window.
Table 22 Object Detail Window Display Items
No. Item Description
1 Object Name The name of the object
2 Size The size of the object
3 Content-Type The MIME type of the object
4 Update Date The date and time when the object was
created or metadata was changed
5 ETag The MD5 check sum value of the object/
"A character string consisting of the ETag of
each segment of the manifest combined with
the value of the MD5 check sum" (for manifest
objects)
6 Content-Encoding
*1
The Content-Encoding meta data value
7 Content-Disposition
*1
The setting value for the behavior of the
browser
8 Delete At Date (UTC)
*1
The scheduled time and date for deletion of the
object
9 X-Object-Manifest
*1
The setting for dynamic large objects (the
container name and the prefix name of the split
object)
10 X-Static-Large-Object
*1
If the object is the manifest object of a static
large object, "True" will be returned
11 X-Trans-Id The ID assigned to the request
12 Transaction Date The date and time the transaction is to be
executed
13 URL The URL of the download target object
14 Object Metadata Key
*1
The key to set for the object metadata
15 Object Metadata
Value *1
The value to set for the object metadata
16 Connection *2 The status of persistent connection.
17 X-Fcx-Endpoint-
Request *2
The number indicating that the request was
received as an API endpoint
64
18 X-Timestamp(UTC)
*2
The time the request was processed
*1: These items are not displayed in Easter Japan Region 3 or Western Japan Region 3.
*2: These items are only displayed in Easter Japan Region 3 and Western Japan Region 3.
65
11.2.3 Download an Object
There are the following two methods for downloading an object.
Clicking the "Download" button on the Object Detail window
Selecting from the Action menu of the object list on the Container Detail
window
Figure 71 Object Action Menu on the Container Detail Window
Advisory Notes
・ It is necessary to configure the following setting in IE 11:
Click [Tools] > [Internet options] > [Security] > [Custom level], and then
select "Enable" for [Access data sources across domains].
Uploading and downloading of files may take approximately 90 minutes per
GB depending on the time of day, the amount of data, and the distance to the
target region the data is being transferred to.
Note: By viewing [F12 developer tools] > [Network] in IE 11, it is possible to
confirm the processing status of each API issued from the portal.
11.2.4 Import a VM Image
It is possible to select VM Import from the Action menu on the Container
Detail window to import a virtual server image to the IaaS service. Selecting
"VM Import" on the Action menu transfers you to the VM Import window. For
details on VM import, refer to 30.2.1 VM Import.
66
Advisory Notes
With the container deletion function, it is only possible to perform "Delete"
from the Action menu on the Container List window when the number of
objects in a container is "0".
Regarding the access policy (ACL) settings, as setting permission for
referrer makes reading possible without authentication using a token, it
is not recommended as it lowers the security level. For details, refer to
the "API Reference - Foundation Service".
When you want to register split objects as a single object, perform
settings for a large object. This integrates split objects, enabling batch
download as a single object and VM import.
The maximum number of objects that can be displayed on the Container
Detail window is 10,000. If it is necessary to obtain a list of objects when
the maximum has been exceeded, obtain the list using an API.
67
Chapter 12 Snapshot
Snapshot List Screen
You can display a list of snapshots created in a project and perform operations for
(edit/delete) the snapshots.
Figure 72 Snapshot List
Table 23 Displayed Content of Snapshot List Table
No. Item Name Description
1 Snapshot Name Name of a snapshot
2 Description Description set by a user
3 Capacity(GB) Capacity of snapshot a snapshot (GB)
4 Status Snapshot Status
5 AZ Availability Zone in which a snapshot resides.
6 Action Various Operations for a snapshot
68
12.1.1 Action
Figure 73 Snapshot Action
The following are provided as the actions toward a list of snapshots.
1. Edit
Refer to 12.3 Edit Snapshot Screen.
2. Delete
Delete a snapshot.
Snapshot Details Screen
Click a specific Snapshot Name on the Snapshot List screen and you can check the
detailed information on the snapshot.
Figure 74 Snapshot Details
69
Table 24 Displayed Content of a Snapshot Details Table
No. Classification Item Name Description
1 Information Snapshot Name Name of a snapshot
2 Snapshot ID Unique value attached to a snapshot
3 Description Description set by a user
4 Status Snapshot Status
5 Volume ID The ID of the volume from which a
snapshot is obtained
6 Connected
Virtual Server
The name of the connected virtual
server
7 AZ Availability Zone in which a snapshot
resides
8 Spec Capacity Capacity of snapshot a snapshot (GB)
9 Date and Time of
Creation
Date and time in UTC time when a
snapshot was created
12.2.1 Restore a Snapshot
It is possible to restore block storage from a snapshot. Click the "Restore"
button on the Snapshot Detail screen.
Figure 75 Restore a Snapshot
70
Edit Snapshot Screen
You can edit the following information. After you have edited it, click "UPDATE".
Figure 76 Edit Snapshot
・ Snapshot Name
・ Description
Advisory Notes
Snapshots can only be restored when the following conditions are met.
- The Status of the snapshot is "available"
- The Status of the volume is "in-use"
- The Status of the server is "SHUTOFF"
71
Chapter 13 Virtual Network
Virtual Network List
You can check the list and status of Virtual Networks created in the project.
Figure 77 Virtual Network List
Table 25 Virtual Network List
No. Item Name Description
1 Virtual Network Name Name of a virtual network
2 Status Network Status
3 Allocated Subnet Allocated Subnet
4 AZ Availability Zone in which a virtual network
resides
5 Shared Shared Status
6 Management State Management State
7 Action Various operations on a virtual network
72
13.1.1 Action
Figure 78 Virtual Network Action
As actions of a virtual network list we provide the following.
1. Edit
Refer to 13.4 Edit Virtual Network.
2. Delete
Delete a virtual network.
Virtual Network Details
You can open virtual network details by clicking a virtual network name in the
virtual network list.
Display detailed information on a virtual network that is not displayed in a
virtual network list.
Figure 79 Virtual Network Details
73
Table 26 Virtual Network Details
No. Classification Item Name Description
1 Virtual Network
Overview
Virtual Network Name Name of a virtual server
2 Virtual Network ID Unique Value
3 Project ID Virtual Server Status
4 AZ Availability Zone
5 Status Always ACTIVE
6 Management State UP / DOWN
7 Shared Yes / No
8 External Virtual Network Yes / No
9 Provider Virtual Network -
10 Subnet Subnet Name Subnet Name
Link to Subnet Detail
11 Virtual Network Address Virtual Network Address
12 IP Version IPv4 / IPv6
13 Gateway IP Set Gateway IP
14 Action Various operations on
subnet
15 Port Port Name Port Name
16 Private IP Private IP
17 Connected Device Type of Connected
Device
18 Connected Virtual Server Virtual Server ID
19 Status ACTIVE, etc.
20 Management State UP / DOWN
21 Action Edit operation for port
74
13.2.1 Action for Subnet
Figure 80 Subnet Action
As subnet actions, it provides the following.
1. Edit (edit subnet name, select Gateway "Yes" or "No")
2. Delete
13.2.2 Action for Port
Figure 81 Port Action
As port actions, it provides the following.
1. Edit (edit a port name, select an management state "UP" or "DOWN", edit a private IP
address)
2. Delete
Create Virtual Network
This is a screen to create a new virtual network. Click Create icon of Virtual
Network List window.
13.3.1 How to Create Virtual Network
1. Click an icon of virtual server list window.
75
2. Set the following and click "Next".
Figure 82 Create Virtual Network (Virtual Network)
・ AZ
・ Virtual Network Name
・ Management State
3. Set the following and click "NEXT".
Figure 83 Create Virtual Network (Subnet)
・ Create Subnet (Yes/No)
・ Subnet Name
・ Virtual Network Address (e.g. 192.168.0.0/24)
・ Gateway (Yes/No)
・ Gateway IP
Existing
Existing
76
4. Set the following and click "Create".
Figure 84 Create Virtual Network (Subnet Details)
・ DHCP (Enable/Disable)
・ IP Address Allocation Pool
Click "Add" to assign multiple address ranges.
・ DNS Server
Click "Add" to set multiple DNS servers.
・ Adding a Routing Setting
Click "Add" to set multiple routes.
5. Confirm the settings so far on the confirmation window. If there are no problems, click
"CREATE".
78
Edit Virtual Network
13.4.1 How to Edit Virtual Network
You can edit the following. After editing, click "UPDATE".
Figure 86 Edit Virtual Network
・ Virtual Network Name
・ Management State (UP/ DOWN)
Add Subnet
In case user does not create subnet in the timing of "Create Virtual Network"
operation, it is possible to add subnet from Virtual Network Detail Window.
79
Chapter 14 Virtual Router
Virtual router list
On the Virtual router list screen, you can display a list of virtual routers
created in a project and perform operations (Newly create/Delete/Gateway
settings/Delete gateway) for the virtual routers.
Figure 87 Virtual router list
Table 27 Displayed Content of a Virtual Router List Table
No. Item Name Description
1 Virtual router name Name of a virtual router
2 Status Virtual router status
*ACTIVE : In operation
3 AZ Availability Zone in which a virtual router is
located
4 Action Various operations for a virtual router
80
14.1.1 Action
Figure 88 Virtual Router Actions
The following are provided as the actions for a list of virtual routers.
1. Edit
Edit virtual router.
2. Delete
Delete a virtual router.
Virtual Router Overview
Click a specific Virtual Router Name on the Virtual router list screen and you
can check the detailed information on the snapshot. If ports exist, you can
display a list of ports and perform operations (Delete/Edit/Allocate Global IP) for
the ports.
Figure 89 Virtual Router Overview
81
Table 28 Displayed Content of a Virtual Router Details Table
No. Classification Item Name Description
1 Virtual Router
Overview
Virtual Router Name Name of a virtual router
2 Virtual Router ID Unique value attached to a virtual
router
3 AZ Availability Zone
4 Status Virtual router status
5 External Gateway IP address of an external gateway
6 Routing
Configuration
Destination Destination network address(CIDR)
7 Nexthop Nexthop IP address
8 Interface Port Name Name of a port
9 Private IP Private IP
10 Global IP Global IP
11 Classification network:router_interface, etc.
12 Management State true / false
13 Status Interface Status
ACTIVE, etc.
14 Action Various operations for an interface
14.2.1 Action
Figure 90 Interface actions
The following are provided as the actions for an interface.
1. Delete
Deletes a port.
2. Edit
Edits a port.
3. Allocate Global IP
Allocates a global IP.
82
Virtual Router Creation
On the Create a new router screen, you can newly create a virtual router.
14.3.1 How to create a virtual router
1. Click the icon of the Virtual router list.
2. Set the below information and click "CREATE".
・ AZ
・ Virtual router name
Figure 91 Create a new router
Edit a Virtual Router
On the Edit Virtual Router screen, it is possible to edit the gateway settings and
the routing configuration.
14.4.1 How to edit a virtual router
1. On the Virtual Router Detail screen, click the "Edit" Action of the virtual router to edit.
2. On the Edit Virtual Router screen, you can edit the following. After editing, click "Update".
・ Gateway Setting
You can select a candidate External Virtual Network from the pull-down menu.
・ Routing Configuration
Routing can be added by clicking "Add" after configuring the Destination and
Nexthop.
Routing can be deleted by clicking "Delete".
83
Figure 92 Edit Virtual Router
Add interface
You can newly add an interface on the Virtual Router Overview screen. See below
for the Add interface screen.
Figure 93 Add interface
84
Chapter 15 Security Group
Security Group List
You can check the list and status of the Security Group created in a project.
Figure 94 Security Group List
Table 29 Displayed Content of Security Group List Table
No. Item Name Description
1 Security Group Name Security Group Name
2 Description Description of Security Group
3 Action Various Operations for Security Group
15.1.1 About Operation
Figure 95 Security Group Action
85
See below for the operations for security group.
1. Manage Rules
Refer to 15.4, 15.5, 15.6, and 15.7.
2. Edit a Security Group
Refer to 15.9.
3. Delete
Refer to 15.10.
Security Group Creation
Newly create a security group.
15.2.1 How to create a security group
1. Click the creation icon "+" at the upper right on the security group list screen.
2. Set the below information and click "Next Page".
Figure 96 (Security Group Details)
・ Security Group Name
・ Description
3. Check the setting content you have entered so far on the confirmation screen. If there
are no problems, click "Create".
86
Figure 97 Confirmation for Setting Content
Security Group Details
Click Security Group Name on the security group list to open the Security Group
Details.
You can check the detailed information not displayed on the security group list.
Figure 98 Security Group Details
87
Table 30 Displayed Content of Security Group Details
No. Category Item Name Description
1 Security Group Details Security Group Name Security Group Name
2 Security Group ID Security Group ID
3 Description Description of Security
Group
4 Applied Rule Direction ingress/egress
5 IP Version IPv4/IPv6
6 Protocol TCP / UDP / ICMP /
Other protocols
7 Port Range Port Range
* In case of "ICMP"
specified as protocol,
this value should be
ICMP type and code.
8 Connected to Connected to
Manage Security Group Rules
You can check the list and status of the security group and add/import/export
rules.
Figure 99 Security Group Rule Management
88
Table 31 Displayed Content of Manage Security Group Rules
No. Item Name Description
1 Security Group Name Security Group Name
2 Direction ingress/egress
3 IP Version IPv4/IPv6
4 Protocol HTTP / HTTPS / TCP / SSL
5 Port Range Port Range
6 Connected to Destination of Connection
7 Action Deletion of security group rules
15.4.1 How to Transfer to the Rule Management Screen
On the security group list, select "Manage Rules" from the pull-down menu of the
security group you want to manage for its rules, or click the "Manage Rules"
button on the Security Group Details screen to go to the Rule Management
screen.
Figure 100 Security Group List (Rule Management)
Figure 101 Security Group Details (Rule Management)
89
Addition of Security Group Rules
You can newly add the rules to an existing security group.
15.5.1 How to Add Security Group Rules
1. Click the "Add Rule" button on the Manage Security Group Rules screen.
Figure 102 Rule Management (Rule Addition)
2. Set the below information and click "Add". (*1)
Figure 103 Add Rule
・ Rule
If "Custom TCP Rule" or "Custom UDP Rule" is selected, set the below information.
Direction (Receive/Send)
Open Port (Port/Port Range)
Connected to (CIDR/Security Group)
If "Custom ICMP Rule" is selected, set the below information.
Direction (Receive/Send)
Type
Code
Connected to (CIDR/Security Group)
If you select "Other Protocols", set the below information.
90
Direction (Receive/Send)
IP Protocol
Connected to (CIDR/Security Group)
If you select "ALL ICMP", "ALL TCP(1-65535)", or "ALL UDP(1-65535)", set the
information below.
Direction (Receive/Send)
Connected to (CIDR/Security Group)
If you select "DNS(53)", "HTTP(80)", "HTTPS(443)", "IMAP(143)", "IMAPS(993)",
"LDAP(389)", "MS SQL(1433)", "MYSQL(3306)", "POP3(110)", "POP3S(995)",
"RDP(3389)", "SMTP(25)", "SMTPS(465)", or "SSH(22)", set the information
below.
Connected to (CIDR/Security Group)
*1
In "Add Rule", you cannot add the same rule as the one added by default when
a security group is created. If you want to add the same rule, export the default
rule and import it. Please refer to 15.6 for how to export and 15.7 for how to
import.
Figure 104 Rule Management (Default Rules)
91
Export Security Group Rules
You can export security group rules.
15.6.1 How to Export Rules
1. Click the "Export" button on the Manage Security Group Rules screen.
Figure 105 Rule Management (Export)
2. The security group rule list is downloaded in the JSON format.
Figure 106 Rule Management (Export File Download)
Import Security Group Rules
You can import security group rules.
15.7.1 How to Import Rules
1. Click the "Import" button on the Manage Security Group Rules screen.
Figure 107 Rule Management (Import)
2. Click the "Import" button and select a file to import.
Figure 108 Confirmation of Importing Rules
92
3. A security group rule is created from an imported file.
Deletion of Security Group Rules
You can delete security group rules.
15.8.1 How to Delete Rules
1. Click the "Delete" button of the rule to be deleted on the Manage Security Group Rules
screen.
Figure 109 Manage Security Group Rules (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 110 Confirmation of Deletion
93
Editing a Security Group
You can edit the group name and description of a security group.
15.9.1 How to Edit a Security Group
1. On the Security Group List screen, select "Edit a Security Group" from the pull-down
menu of the security group to be edited.
Figure 111 Security Group List (Edition)
1 On the Edit a Security Group screen, enter the new security group name and description
and click "Update".
Figure 112 Edit a Security Group
94
Deletion of Security Group
You can delete a security group.
15.10.1 How to Delete a Security Group
1. On the security group list screen, select "Delete" from the pull-down menu of the security
group to be deleted.
Figure 113 Security Group List (Deletion)
2. If you check the content to be deleted and there are no problems, click the "Delete" button.
Figure 114 Confirmation of Deletion
95
Chapter 16 Global IP
Global IP List
You can refer to a list of reserved global IP.
Figure 115 Global IP List
16.1.1 Action
Figure 116 Global IP Action
Reserved Global IP
You can allocate global IP from a port action of virtual server details. Click "Add"
from a global IP list window when you get a new global IP.
1. Select Global IP Pool and click "NEXT".
Figure 117 Reserved Global IP (Reserved Global IP)
96
2. When you want to associate the acquired global IP with a port, select
"Global IP Address assignment port", and click "Next".
If you do not assign to a port, leave a "Global IP Address assignment port"
blank and click "Next".
Figure 118 Reserved Global IP (port assignment)
3. Confirm the settings so far on the confirmation window. If there are no problems, click
"SETTING".
Figure 119 Reserved Global IP (Confirmation)
Allocate Global IP
Select a resource to be allocated from the global IP address assignment port, and click
"SETTING".
Figure 120 Allocate Global IP
97
Deallocate Global IP
Deallocate the global IP assigned to the resources like a virtual server from the
resource.
Figure 121 Deallocate Global IP
Release Global IP
IP addresses that are no longer needed will be released from the global IP pool
by clicking "Release".
Figure 122 Release Global IP
98
Chapter 17 Firewall
Function Overview
This function provides the functionality for managing firewalls. The following
functions are provided.
・ Firewall
Display of lists and details of firewalls
Creation, editing, and deletion of firewalls
Association of firewalls and virtual routers
Association of firewalls and firewall policies
・ Firewall Policy
Display of lists and details of policies
Creation, editing, and deletion of policies
Association of policies and firewall rules (Registration, deletion, and
sorting)
・ Firewall Rule
Display of lists and details of rules
Creation, editing, and deletion of rules
The created firewall, firewall rule, firewall policy, and virtual router must be in
the same availability zone to be used.
99
Firewall List Screen
Selecting [Side Bar]-[Networking]-[Firewall] displays the Firewall List screen
(Refer to "Figure 123 Firewall List"). This section explains the screen that is
initially displayed.
Figure 123 Firewall List
Create a Firewall
Display Firewall Details
Display Policy Details
Display Firewall Rule List
Operate the Firewall
Display Firewall Policy List
100
Firewall Creation Procedure
The procedure for creating a firewall is given below.
(1) Confirm a Virtual Router
When creating a firewall, associate the firewall with a virtual router. Confirm
that the virtual router has been created in advance. If it has not been
created, refer to "14.3 Virtual Router Creation" and create a virtual router.
Figure 124 Virtual Router List
(2) Create a Firewall Rule
Click the "Rule List" button on the Firewall List screen. Clicking the "+"
button on the Firewall Rule List screen creates a firewall rule.
Figure 125 Firewall Rule List
z
z
z
101
(3) Create a Firewall Policy
Click the "Policy List" button on the Firewall List screen. Clicking the "+"
button on the Firewall Policy List screen creates a firewall policy. On the
Create Firewall Policy screen, select the firewall rule created in (2). Clicking
the "Sort" button enables sorting of the selected rules into the desired order.
For the sorting method, refer to "17.3.1 Firewall Rule Sorting Operation".
図 1 ファイアーウォールポリシー一覧
(4) Create a Firewall Policy
It is possible to register multiple firewall rules with a firewall policy. The
validity of registered rules is verified in ascending order, and if verification is
successful the action set for the rule (Allow/Deny) is performed. If you want
to change the order of rule application, selecting the following menu displays
the Sort Firewall Rule screen (Refer to "Figure 119 Sorting Firewall Rules").
- Click "Reflect order display" on the Create Firewall Policy screen.
- Click "Reflect order display" on the Edit Firewall Policy screen".
Figure 126 Firewall Policy List
102
(5) Create a Firewall
Clicking the "+" button on the Firewall List screen creates the firewall. On the
Create Firewall screen, set the firewall policy created in (3) and the already
created virtual router from (1).
Figure 127 Firewall List
17.3.1 Firewall Rule Sorting Operation
It is possible to register multiple firewall rules with a firewall policy. The validity
of registered rules is verified in ascending order, and if verification is successful
the action set for the rule (Allow/Deny) is performed. If you want to change the
order of rule application, selecting the following menu displays the Sort Firewall
Rule screen (Refer to "Figure 128 Sorting Firewall Rules").
- Click "Reflect order display" on the Create Firewall Policy screen
- Click "Reflect order display" on the Edit Firewall Policy screen
Figure 128 Sorting Firewall Rules
103
This section explains the operation procedure for the Sort screen.
(1) Set the values in the "Sort" text field in the desired order. An example of sorting
is given in the following figure.
*The default value (integer) of the order of sorting is the same as the order
defined on this portal. It has no connection to the upper limit of rules.
*If you need to set a higher sorting priority than 1, it is possible to do so by
specifying a minus integer for sorting. [Input value: Integers in the range of -
999 (high priority) to 999 (low priority)]
*If the same value is set at the same time in multiple rules, reordering of those
rules will not be performed.
Example:
When moving FirewallRuleA to between FirewallRuleC and FirewallRuleD.
(2) Clicking the "Reflect order display" button sorts the rules in the order of the
specified values.
(3) After confirming the rules are in the desired order, click the "Fix" button to
close the window. If the "Fix" button is clicked even without the "Reflect order
display" button being clicked, the order settings will be reflected anyway.
Change
FirewallRuleA's order to
Reflect order
104
Advisory Notes
This section explains the advisory notes for each function.
・ Indication of "Source IP [Port]" and "Destination IP [Port]" on the Firewall Rule
List
If an IP address and port number are not set, "(any)" will be displayed in the
"Source IP [Port]" and "Destination IP [Port]" fields. If the source or
destination port is set, "[the_port_number]" or
"[the_range_of_port_numbers]" will be displayed.
105
Chapter 18 Load Balancer
Load Balancer List
The load balancers explained in this section are provided for Japan East
1/Japan East 2/Japan East 3/Japan West 1/Japan West
2/UK/Finland/Germany/Spain/US region. Please refer to Chapter 19 Load
Balancer (Eastern Japan Region 3/Western Japan Region 3) when using
Eastern Japan Region 3 or Western Japan Region 3.
You can check a list and status of load balancers created in the project.
Figure 129 Load Balancers List
Table 32 Load Balancer List Table
No. Item Name Description
1 Load Balancer Name Name of a load balancer
2 DNS Name FQDN for accessing a load balancer
3 Status Status of a load balancer (In Service, etc.)
4 Action Various operations on a load balancer
18.1.1 Action
Figure 130 Load Balancer Action
You can select the necessary Action based on the content of each target screen.
106
Load Balancer Details
You can open load balancer details by clicking a load balancer name in a load
balancer list.
Detailed information on a load balancer not displayed in a load balancer list is
displayed.
Figure 131 Load Balancer Details
Table 33 Load Balancer Detailed
No. Classification Item Name Description
1 Load Balancer
Information
Load Balancer Name Name of a load balancer
2 Type public / internal
3 Grade Standard / Middle / High
4 Listener Load Balancer
Protocol
HTTP / HTTPS / TCP /
SSL
5 Load Balancer Port Listen Port Number of a
load balancer
6 Virtual Server
Protocol
HTTP / HTTPS / TCP /
SSL
7 Virtual Server Port Listen Port Number of a
virtual server
8 Certificate Select for HTTPS, SSL
107
9 Session Persistence
Policy
Policy Name
10 SorryServer Redirect
Policy
Policy Name
11 Subnet Information Subnet Subnet Name
12 Security Group
Information
Security Group Security Group Name
13 Health Check
Information
Health check
consecutive success
times judged as
recovery
Times
14 Health check
execution time
interval (sec)
Seconds
15 Protocol HTTP / HTTPS / TCP /
SSL
16 Port Port Number
17 URL Health check target URL
18 Health check
response timeout
time (sec)
Seconds
19 Health check
consecutive failed
times judged as faulty
Times
20 Virtual Server
Information
Virtual Server Name Virtual server name of
distribution target
21 IP Address IP Address
22 Status Virtual Server Status
23 AZ Availability Zone
24 Dedicated Display Dedicated Virtual
Servers
"true" is displayed for
dedicated virtual servers.
25 Policy Information Policy Name Policy Name
108
26 Session
Persistence Policy
Information
Maximum time to
maintain session
(sec)
Seconds
27 Policy Information
Policy Information
to redirect to
SorryServer
Policy Name Policy Name
28 Redirect Destination
Location URL
URL
109
Create Load Balancer
This is the GUI when creating a new load balancer. You can make transition
from an icon on a load balancer list window.
18.3.1 How to Create Load Balancer
1. Click an icon of load balancer list.
2. Set the following and click "NEXT".
Figure 132 Create Load Balancer (Load Balancer Definition)
・ Load Balancer Name
・ Type (public/internal)
・ Grade (Standard, Middle or High)
・ Load Balancer Protocol (HTTP/HTTPS/TCP/SSL)
・ Listen Port Number of a load balancer
・ Virtual Server Protocol (HTTP/HTTPS/TCP/SSL)
・ Listen Port Number of a virtual server
・ Certificate (if you select HTTPS or SSL as a load balancer protocol)2
2 Certificate cannot be registered on IaaS Service Portal. For certificate registration, please use API.
110
3. Set the Subnet and click "NEXT".
Figure 133 Create Load Balancer (Subnet Settings)
4. Perform settings for the Security Group then click "NEXT".
Figure 134 Create Load Balancer (Security Group Settings)
111
5. Confirm the settings so far on the confirmation window. If there are no problems, click
"CREATE".
Figure 135 Create Load Balancer (Confirmation)
Add Subnet
You can select a subnet to add to a load balancer.
18.4.1 How to Add Subnet
1. Select a predefined subnet you want to add to a load balancer displayed in the "Subnet"
then move to the "Selected Subnet".
2. Click "Add".
112
Delete Subnet
You can select a subnet to remove from a load balancer.
18.5.1 How to Delete Subnet
1. Select the deletion target from the subnet displayed in the list and click "Delete".
Add Listener
You can select a listener to add to a load balancer.
18.6.1 How to Add Listener
It is possible to select the listener to add to a load balancer. The method for adding
a listener is indicated below.
1. In "Load Balancer Protocol", select a protocol accepted by a load balancer. (HTTP/HTTPS/
TCP/SSL).
2. Enter a port number acceptable for a load balancer in "Load Balancer Port".
3. Select a protocol to communicate from a load balancer to a virtual server in "Virtual Server
Protocol". (HTTP/HTTPS/TCP/SSL)
4. Enter a port number acceptable for a virtual server in "Virtual server port".
5. Select a credential if you select "HTTPS" or "SSL" in "Load Balancer Protocol".
6. Click "Add".
Delete Listener
You can delete listeners of load balancers from the displayed list screen.
Add Virtual Server
You can select a virtual server to which a load balancer distributes requests.
18.8.1 How to Add Virtual Server
1. From a virtual server list, select a server you want to add to a load balancer.
2. Select a port, and confirm the IP address that will be the target of load distribution by the
load balancer.
3. Click "Add".
113
Delete Virtual Server
You can delete a virtual server to which a load balancer distributes requests.
Just out of the load balancer distribution target, the virtual server itself will
remain.
18.9.1 How to Delete Virtual Server
1. From a virtual server list, select a server you want to delete from a load balancer.
2. Click "Delete".
Create Session Persistence Policy
You can create a session persistence policy for a load balancer.
1. Set the following items and click "Create".
・ Policy Name
・ Maximum time to maintain session (sec)
Create SorryServer Policy
You can create a policy to redirect to SorryServer when there is no destination
for a load balancer to distribute.
18.11.1 How to Create SorryServer policy
1. Set the following items and click "Create".
・ Policy Name
Redirect Destination Location URL
Create/Delete Policy
For a load balancer, you can set a session persistence policy created and a
SorryServer policy to set.
1. Set the following items and click "Set".
・ Load Balancer Port
・ Session Persistence Policy to set
114
・ SorryServer Policy to set
* The values of Session persistence policy and SorryServer policy are displayed by
selecting a policy.
Set Health Check Information
You can set health check information of a virtual server by a load balancer.
The items that can be set are as follows:
・ Health check consecutive success times judged as recovery
・ Health check execution time interval (sec)
・ Protocol (HTTP/HTTPS/TCP/SSL)
・ Port
・ URL
・ Health check response timeout time (sec)
・ Health check consecutive failed times judged as faulty
Set Security Group
You can set a security group on a load balancer.
1. Select a predefined security group you want to add to a load balancer displayed in "Security
Group", then move to "Security Group Settings", and click "Set".
Set Cipher Suite
You can set cipher suites on a load balancer. The method for setting is given
below.
1. Select "Add" or an action of the created cipher suite.
2. Select a cipher suite name and a cipher suite to use in the cipher suite add (edit) dialog.
3. Click "Set".
115
Chapter 19 Load Balancer (Eastern Japan Region
3/Western Japan Region 3)
Function Overview
This section explains the load balancer function that provides the load
distribution function. By using load balancers, it is possible to distribute the load
among multiple virtual servers when requests are received from the network.
This prevents specific virtual servers from having excessively high loads, and
enables continued provision of smooth speed.
However, the load balancers explained in this section, and the operation
screens displayed are those of the function provided in Eastern Japan Region
3/Western Japan Region 3. Please refer to Chapter 18 Load Balancer since the
provided functions differ from those of the regions other than Eastern Japan
Region 3/Western Japan Region 3.
The provided functions are as follows:
・ Create Load Balancer
By creating load balancers and entering the load distribution settings as
shown in the Creation screens, it becomes possible to use load
balancers.
・ Refer to Load Balancer (List / Details )
It is possible to check the statuses of create load balancers on the List
screen, and to check their detailed information.
・ Delete Load Balancer
It is possible to delete created load balancers (for details, refer to the
"19.3How to Delete Load Balancer").
.
116
How to Use Load Balancer
This section explains the method of using load balancers, from the creating of
load balancers, entry of settings for load distribution, up to confirming the settings
after creation.
Table 34 Load Balancer Creation Procedure
No. Creation Procedure Main Entry Content
1 Create a
Load
Balancer
Set Basic
Information
Set the load balancer name, and
information such as the subnet where
the load balancer is to be deployed, etc.
2 Load
Balancing
Settings
Load Balancing
Settings (1/2)
Set the Listener*1 name and the
protocols of the target requests, etc.
3 Load Balancing
Settings (2/2)
Set the Pool*2 name and the load
distribution algorithms, etc.
4 Select Virtual
Servers
Select the virtual servers that are
associated with the pool.
5 Health Monitor*3 Set the method for monitoring the
activity statuses of the virtual servers
that are associated with the pool.
6 Confirmation Confirm the content of settings, and set
load distribution.
7 Check After
Creation
Check Detailed
Information
From the Load Balancer List / Details
screens, confirm the detailed
information of load balancer settings.
*1 Listener: A process that checks for connection requests for the load balancer.
*2 Pool: The unit in which virtual servers that will handle requests are managed.
*3 Health Monitor: Performs "alive monitoring" for the virtual servers in the pool.
117
19.2.1 Create a Load Balancer
1. Display the Load Balancer List Screen
Press the [Load Balancers] menu to display the Load Balancer List screen.
On this screen it is possible to refer to information such as the load balancer
names, private IP addresses, provisioning statuses, and operation statuses of
each load balancer.
Click the "+" button on the upper-right of the Load Balancer List screen, and
transfer to the Create Load Balancer screen.
Figure 136 Load Balancer List Screen
2. Create a Load Balancer
After entering the basic information on the Create Load Balancer screen,
click the "Create" button to create the load balancer.
When there is already a load balancer that was created in advance, by
selecting the already created load balancer from "Reflected source
Loadbalancer", it is possible to reflect the settings of that load balancer on the
entry items. This makes it possible to create a load balancer with that setting
content.
Figure 137 Create Load Balancer Screen
118
The setting content that is necessary when creating a load balancer is as
follows:
Table 35 Setting Content when Creating a Load Balancer
Item Name Setting Content
Loadbalancer Name Set the name for the load balancer.
Description It is possible to set any desired character string.
Admin Status Set the management state for after creation is complete.
- UP: Active state (default value)
- DOWN: Inactive state
Private IP Address Specify the private IP address that will be used for requests
to the load balancer.
Subnet Specify the subnet that the virtual servers that will be
associated with the pool belong to.
After a load balancer is created, that load balancer will be displayed on the
Load Balancer List screen.
19.2.2 Load Balancing Settings
The statuses of created load balancers can be confirmed on the Load
Balancer List screen. When it has been confirmed that the Provisioning Status
of a load balancer is "ACTIVE", it is possible to perform load balancing settings
using "Load Balancing Setting" in the Action menu.
1. Loadbalancing Info (1/2)
On the Loadbalancing Info (1/2) screen, set the Listener Name, the protocol
to use for handling requests, etc., and create the listener.
When there is already a listener that was created in advance, by selecting
the already created listener from the "Reflected Source Listener Name" it is
possible to reflect the settings of that listener on the entry items. This makes it
possible to create a listener with that setting content.
119
Figure 138 Loadbalancing Info (1/2) Screen
The items to set are as follows:
Table 36 Setting Content of the Load Balancing Info (1/2) Screen
Item Name Setting Content
Listener Name Set the name for the listener.
Description It is possible to set any desired character string.
Admin Status Set the management state for after creation is complete.
- UP: Active state (default value)
- DOWN: Inactive state
Protocol Specify the communication protocols for the Front End and Back End
sides. The following four combinations of [Front End Protocol]-[Back
End Protocol] can be specified.
[Setting Values] HTTP-HTTP, HTTPS-HTTP, HTTPS-HTTPS, TCP-
TCP
Frontend Port Specify the port number that will be used for requests to the load
balancer.
Specifiable range of port numbers: 1 - 65535
Max Connections The maximum number of connections that the listener will process.
Specifiable values: 1 - 32768
SSL Certificate
URL
When using HTTPS communication, set the URL of the server
certificate.
120
After the listener is created, click "Next".
2. Loadbalancing Info (2/2)
On the Loadbalancing Info (2/2) screen, set the Pool Name, the Load
Distribution Algorithm, etc. and create the pool.
When there is already a pool that was created in advance, by selecting the
already created pool from the "Reflected Source Pool Name", it is possible to
reflect the settings of that pool on the entry items. This makes it possible to
create a pool with that setting content.
Figure 139 Loadbalancing Info (2/2) Screen
The items to set are as follows:
Table 37 Setting Content of the Loadbalancing Info (2/2) Screen
Item Name Setting Content
Pool Name Set the name of the pool.
Description It is possible to set any desired character string.
Load Balancing
Algorithm
Set the algorithm to use for load balancing to the virtual
servers.
Set one of the following values:
- ROUND_ROBIN: The round robin method.
Requests are distributed to virtual servers in order.
- LEAST_CONNECTIONS: The least connections
121
method.
Requests are distributed to the virtual server that currently
has the least connections.
- SOURCE_IP: The source IP address method.
Requests are distributed based on the source IP address.
Session Persistence
Policy
The session persistence policy applied to the pool. Set one of
the following values:
- HTTP_COOKIE
Maintains sessions using the cookies generated by load
balancer.
- APP_COOKIE
Maintains sessions using the cookies generated from
virtual servers.
- SOURCE_IP
Maintains sessions using the IP addresses of clients.
Back End Protocol The same value as the communication protocol that was
specified for the back end of the listener is displayed.
Backend Port The number of the TCP or UDP port for listening
When settings for the pool are complete, click "Next".
3. Select a Virtual Server
Select a virtual server to perform load distribution for. As shown in the
screen below, check the virtual server that you want to perform load
distribution for, and set the port for communication using the pull-down menu.
Figure 140 Select Virtual Server Screen
122
When selection of virtual servers is complete, click "Next".
4. Health Monitor
Perform settings for the load balancer to check the operational status of the
virtual server from the Health Monitor screen.
Figure 141 Health Monitor Screen
The items to set are as follows:
123
Table 38 Setting Content for the Health Monitor Screen
Item Name Setting Content
Check Method Set the monitoring method to use for the virtual server that is that
target of load balancing.
- PING/TCP/HTTP/HTTPS
Admin Status Specify the admin status after creation.
- UP: Enabled status (default value)
- DOWN: Disabled status
Check Interval (sec) Specify the execution interval for health checks, using a value of
1 – 99999.
Timeout (sec) Specify the length to time to timeout of health checks, using a
value of 1 – 99999.
* Set a value smaller than that of the Check Interval.
Abnormality
Detection Threshold
(times)
Set the number of consecutive times a health check must fail for
the virtual server that is the target of load balancing to be
considered as having failed, using a value of 1 - 99999.
HTTP Method Set the HTTP request method to use when executing health
checks, using one of the values below.
- DELETE/GET/POST/PUT
Check Path Set the path that is the target of the health check.
Assumed Response
Code
Set the response code to return when a health check is
successful.
- When there is one response code assumed, enter that value
- When there are multiple response codes assumed, enter the
values separated by commas
Example: 200, 204
- When the assumed response codes are a range, enter the
values connected by a hyphen
Example: 200-204
When selection of the health monitor is complete, click "Next".
124
5. Confirm
On the confirm screen, check each of the settings in order, and if there are
no corrections necessary, click "Create". A load balancer with these settings
will be created.
Figure 142 Confirm Screen
125
19.2.3 Confirmation after Creation
After creating a load balancer, it is possible to confirm it from the Load
Balancer List screen. When the created load balancer is displayed, clicking the
link of the load balancer name displays the content that was set when it was
created.
Figure 143 Load Balancer List Screen
Figure 144 Load Balancer Detail Screen
127
How to Delete Load Balancer
To delete load balancer, you need to delete each item in the following steps.
Step 1: Delete pool
On the Listener Detail screen, click action menu and then select "Delete".
Step 2: Delete listener
On the Load Balancer Detail screen, click action menu and then select "Delete".
Step 3: Delete load balancer
On the Load Balancer List screen, click action menu and then select "Delete".
Points to Note
When editing each setting, it is necessary to do so using the API, or delete
the load balancer and create a new one.
128
Chapter 20 DNS
DNS Zone List
You can check the list and status of DNS zone which is created in project.
Figure 147 DNS Zone List
Table 39 Displayed Content of DNS Zone List Table
No. Item Name Displayed Content
1 DNS Zone Name Name of DNS zone
2 Number of Records Number of records registered in a zone
3 Name Server Name server assigned to the zone
4 Description Description of DNS zone
5 Action Various operation for DNS zone
129
20.1.1 About Operation
Figure 148 DNS zone action
The following items will be provided as the operation of DNS zone list.
1. Record Settings
Refer to 20.3, 20.4 and 20.6.
2. Zone Delete
Refer to 20.8.
DNS Zone Registration
DNS zone will newly be registered.
20.2.1 How to Register DNS Zone
1. Click the icon "+" at the upper right on the DNS zone list screen.
2. Enter appropriate information as below and click "Next".
Figure 149 Registration
130
・ DNS Zone Name
・ Description
3. Check the setting details you have entered so far on the confirmation screen. If there are
no problems, click "Create".
Figure 150 Confirmation of Setting Details
4. If "Confirmation authentication of DNS zone registration" dialog is displayed after it is
created, follow the displayed content and register DNS zone again. The successfully
registered DNS zone information and name server information can be confirmed using
the DNS Zone List screen.
Figure 151 "Confirmation Authentication of DNS Zone Registration" Dialog
131
Record List
You can move to this screen by selecting "Record Management" in the pull-down
menu of "Action" in the DNS zone you want to edit on the DNS zone list screen.
Figure 152 Record List
Table 40 Displayed Content of Record List Table
No. Item Name Displayed Content
1 Record Name Record Name
2 Type NS / A / AAAA / CNAME / MX / TXT / LBR / SRV
/ PTR
3 Value Value
4 TTL TTL Value
5 Policy None / Fail Over / Weighting
6 Action Various Operations for Record
132
20.3.1 About Operation
Figure 153 Record List Action
The below items will be provided as the operations of Record List.
・ Setting
Refer to 20.6 Editing Records.
・ Delete
Please refer to 20.7 Record Deletion.
Record Details
You can open record details by clicking the record name in the Record List.
You can check the detailed information that is not displayed directly in the record
list.
Figure 154 Record Details (When policy is "None")
133
Figure 155 Record Details (When policy is "Weighting")
Figure 156 Record Details (When policy is "Fail Over")
134
Table 41 Displayed Content of Record Details Table
No. Category Item Name Displayed Content
1 Record Details DNS Zone DNS Zone
2 Record Name Record Name
3 Type NS / A / AAAA / CNAME / MX /
TXT / LBR / SRV / PTR
4 TTL TTL Value
5 Value Value
6 Description Description of Records
7 Policy None/Fail-Over/Weighting
8 Weight Weight Weighting Value
9 Failover Failover PRIMARY / SECONDARY
10 Health Check
Preference
(If failover is selected)
IP Address Health Check Destination IP
Address
11 Port Health Check Destination Port
12 Protocol HTTP / HTTPS / TCP
13 Health Check
Path
Health Check Path
14 Health Check
Destination
Domain Name
Health Check Destination
Domain Name
Record Registration
Records can newly be registered.
20.5.1 How to register records
1 Click the icon "+" on the upper right of the Record List screen.
2 Enter the Record Information and click "Next".
Note: The setting items of Record Information differ depending on the Record Type. For
details of Record Information, refer to "Record Management Functions" of "DNS Service"
in the "IaaS Features Handbook".
The setting screens of Record Information for each type are shown below.
135
・ If type "A" or "AAAA" is selected, enter appropriate information on the screen below.
Figure 157 Create Record (Record Information: For type A)
Record Name
TTL
Value (Usable IPv4 address for type "A" and Usable IPv6 address for type "AAAA")
Description
Policy (No/Failover/Weight Settings)
Details of Failover (When Failover is selected in Policy)
Figure 158 Record Information (Failover Details)
Failover (PRIMARY / SECONDARY)
Health Check Setting (When Failover is selected in Policy)
136
Figure 159 Record Information (Health Check Settings)
IP
Port
Protocol (HTTP / HTTPS / TCP)
Health Check Path
Health Check Destination Domain Name
Weight Details (When Weight is selected in Policy)
Figure 160 Record Information (Weight Details)
137
・ Setting screen when the Type "NS" is selected
Figure 161 Record Registration (Record Information: When Type is NS)
・ Setting screen when the Type "CNAME" is selected
Figure 162 Record Registration (Record Information: When Type is CNAME)
138
・ Setting screen when the Type "MX" is selected
Figure 163 Record Registration (Record Information: When Type is MX)
・ Setting screen when the Type "TXT" is selected
Figure 164 Record Registration (Record Information: When Type is TXT)
139
・ Setting screen when the Type "LBR" is selected
Figure 165 Record Registration (Record Information: When Type is LBR)
・ Setting screen when the Type "SRV" is selected
Figure 166 Record Registration (Record Information: When Type is SRV)
140
・ Setting screen when the Type "PTR" is selected
Figure 167 Record Registration (When Type is PTR)
3 You can check the setting details you have entered so far on the confirmation screen. If
there are no problems, click "Create".
Figure 168 Record Registration (Confirmation)
141
Editing Records
You can edit the details of registered records.
20.6.1 How to edit records
1. On the Record List scree, click "Edit" from the pull-down menu of the record you want to
edit.
Figure 169 Record List (Edition)
2. You can edit the below information on the record edition screen. Depending on the type
you selected, the items to be edited are changed. Please refer to 20.5.1 for the edition
items of each type.
Figure 170 Record Edition
3. Click "Update" after edited.
142
Record Deletion
You can delete the registered records.
20.7.1 How to delete records
1. On the record list screen, click "Delete" by selecting from the pull-down menu of the
record you want to delete.
Figure 171 Record List (Delete)
2. Click the "Delete" button if there are no problems after you have checked the deletion
details.
Figure 172 Confirmation of Deletion
DNS Zone Deletion
You can delete the registered DNS zone.
20.8.1 How to delete DNS zone
1 On the DNS zone list screen, click "DNS Zone Deletion", selecting from the pull-down
menu of the DNS zone to be deleted.
143
Figure 173 DNS Zone List (DNS Zone Deletion)
2 Click the "Delete" button if there are no problems after you have checked deletion details.
Figure 174 Confirmation of Deletion
144
Chapter 21 VPN Service (SSL-VPN)
Function Overview
This function provides an SSL-VPN connection function for secure connections to virtual
environments created on the system. This enables safe access from client terminals to virtual
servers on the system using SSL-VPN.
The following functions are provided.
Creation of VPN services
Creation of SSL-VPN Connections
Usage Method of SSL-VPN Connections
Preparations are necessary to use SSL-VPN connections. The flow from preparation to
creation of an SSL-VPN connection is indicated below.
Figure 175 Flow of VPN Environment Configuration (SSL-VPN)
145
(1) Preparation (Required)
To create a VPN service, the preparations indicated below, such as creation of a virtual
router and changes to settings, are necessary.
1.1 Create a Virtual Router
Create a virtual router (Refer to Chapter 14 Virtual Router).
1.2 Configure the Gateway for the Virtual Router
Configure the gateway for the created virtual router (Refer to 14.4 Edit a Virtual
Router).
1.3 Create a Virtual Network
Create a virtual network (Refer to Chapter 13 Virtual Network).
1.4 Add an Interface to the Virtual Router
From the Details window of the virtual router created in 1.1, add an interface.
For the subnet, specify the subnet configured in 1.3.
For the IP address, specify the last unused IP address in the subnet.
(2) Configure a VPN Service
After preparations are complete, create a VPN service and an SSL-VPN connection.
2.1 Create a VPN Service
Press [Network] -> [VPN Service], and click the "+" button displayed on the VPN
Service List window.
Figure 176 Create VPN Service Window
146
The setting items necessary when creating a VPN service are given in the
following table.
Table 42 Setting Items for VPN Service Creation
Item Setting Content
AZ Select the same availability zone as that of the prepared
virtual router. * Selection of a virtual router becomes
possible after an AZ is selected.
Virtual Router Name Select the virtual router created in 1.1.
* Specification of a Subnet Name becomes possible after a
virtual router is selected.
Subnet Name Select the subnet configured in 1.3.
VPN Service Name Enter the name of the VPN service.
Description Enter the description of the VPN service.
Management State Select "true" or "false" (The default value is "true").
After the VPN service is created, it will be displayed in the VPN Service List
window.
Figure 177 VPN Service List Window
147
2.2 Create an SSL-VPN Connection
SSL-VPN connections can be created from the VPN Service Detail window.
Figure 178 VPN Service Detail Window
The setting items necessary when creating an SSL-VPN connection are given in
the following table.
Table 43 Setting Items for SSL-VPN Connections
Item Setting Content
SSL-VPN connection name Enter the name for the SSL-VPN connection.
Protocol Select "TCP" or "UDP" (The default value is "TCP").
In Eastern Japan Region 3/Western Japan Region 3, only
"TCP" can be set.
Management State Select "true" or "false" (The default value is "true").
Credential Select the credential to use (The default value is the K5
credential).
When using a credential other than the K5 credential,
register the credential in advance.
Security Group Check the box of the security group to be used.
The number of security groups that can be registered is
6 or less.
148
Global IP Select the global IP to be used.
In Eastern Japan Region 3/Western Japan Region 3, only
automatic allocation can be set.
Client IP pool Configure the client IP pool in CIDR format (For example,
192.168.10.0/24).
[Important notice]
・ Do not specify the following network addresses.
Used network address
Local network address connected by client PC
If above network address is set, communication may
not be possible. Please contact the help desk.
・ The value of "192.168.122.0/24" can not be specified
as network address.
* In Eastern Japan Region 3/Western Japan Region 3, only one global IP address and one
client IP pool can be set.
Click the add SSL-VPN connection icon and enter the items on each window.
Finally, click "Create" to create the SSL-VPN connection.
149
Figure 179 Create SSL-VPN Connection Window
(3) Firewall Setting (Optional)
The setting of firewall rules is optional. Setting of firewall rules is recommended in order to
enable safe connections with configured virtual environments.
3.1 Create a Firewall Rule
Create a firewall rule (Refer to Chapter 17 Firewall).
3.2 Create a Firewall Policy
Create a firewall policy that applies the created firewall rules.
3.3 Create a Firewall
Create a firewall (Refer to Chapter 17 Firewall).
3.4 When creating a firewall, select the firewall policy and virtual router.
150
Advisory Notes
・ When creating an SSL-VPN connection, if using a credential other than the
K5 credential, register that credential with the API in advance (Refer to the
IaaS Features Handbook and the IaaS API Reference - Management
Administration).
・ After creating an SSL-VPN connection, connect to the target virtual server
using an OpenVPN client, etc. For the installation method for an OpenVPN
client, refer to the "IaaS Features Handbook".
151
Chapter 22 VPN Service (IPsec VPN)
Function Overview
This function provides an IPsec VPN connection function for secure
connections to virtual environments created on the system. This enables access
from client terminals to virtual servers on the system, and access between virtual
servers to be performed more safely.
The following functions are provided.
Display of lists and details of IPsec VPN connections
Creation, editing, and deletion of IPsec VPN connections*
Creation of IKE policies
Creation of IPsec policies
*For creation of IPsec VPN connections, refer to "IPsec VPN Connection
Patterns" in the "IaaS Design and configuration Guide (Design
Pattern/Implementation Samples)".
152
Usage Method of IPsec VPN Connections
Preparations must be made in order to be able to use IPsec VPN connections.
The flow from preparation to creation of an IPsec VPN connection is indicated
below.
Figure 180 Flow of VPN Environment Configuration (IPsec VPN)
(1) Preparation (Required)
To use the same settings as the previous chapter, refer to 21.2 (1) Preparation
(Required). When using a configured environment, additional settings are not
necessary.
(2) Configure a VPN Service
After preparations are complete, create a VPN service and an IPsec VPN
connection.
(2.1) Create a VPN Service
Refer to 2.1 Create a VPN Service in the previous chapter.
153
(2.2) Create an IPsec VPN Connection
IPsec VPN connection list information can be referred to from the
VPN Service Details window.
Figure 181 VPN Service List Window
Click the "+" button of the IPsec VPN connection and configure the
following items on the Create IPsec VPN Connection Window.
Create an IPsec VPN connection
Configure an IKE policy and an IPsec policy
Configure connection information
154
Create an IPsec VPN connection.
Figure 182 Create IPsec VPN Connection Window (IPsec VPN Connection)
The setting items necessary when creating an IPsec VPN connection
are given in the following table.
155
Table 44 Setting Items for the Create IPsec VPN Connection Window
Item Setting Content
IPsec VPN
Connection Name
Enter the name of the IPsec VPN connection.
Description Enter the description of the IPsec VPN connection.
AZ Enter the availability zone.
Admin_State_Up Select the management status of the VPN connection.
* When it is "false", the VPN connection will not transfer packets.
Pre Shared Key
(PSK)
Enter the Pre Shared Key (PSK)
Initiator Select an initiator mode.
- "bi-directional": Confirms the connection in both directions.
- "response-only": Confirms the connection on the response
side.
* This item is not displayed in Easter Japan Region 3 or
Western Japan Region 3.
DPD-Action Select the action to take when traffic confirmation with the
connection destination using DPD fails.
- "hold":
Performs confirmation using DPD, and reconnects when
communication becomes possible again.
- "restart":
Performs confirmation using DPD, and reconnects
immediately when disconnected.
DPD-Interval Enter the interval for DPD detection, using seconds.
DPD-Timeout Enter the timeout for DPD detection, using seconds.
* This is fixed as 120 seconds in Eastern Japan Region 3 and
Western Japan Region 3.
IKE Version Enter the IKE version (The default value is "v1")
* This item is only displayed in Easter Japan Region 3 and
Western Japan Region 3.
Select an IKE policy and an IPsec policy.
157
When there are no IKE policies, create one using the "+" button.
Figure 184 Create IKE Policy Window
The setting items necessary when creating an IKE policy are given in
the following table.
Table 45 Setting Items for IKE Policies
Item Setting Content
IKE Policy Name Enter the IKE policy name.
Description Enter the description of the IKE policy.
AZ Select an availability zone
IKE Phase1 Negotiation Mode Enter the key conversion mode
(The default value is "main")
Auth Algorithm Enter the encryption hash algorithm
(The default value is "sha1")
Encryption Algorithm Select an encryption algorithm
(The default value is "aes-128")
Perfect Forward Secrecy
(PFS)
Select Perfect Forward Secrecy
(The default value is "group5")
Lifetime Enter the lifetime of the security association (SA)
(The default value is "2000")
IKE Version Enter the IKE version
(The default value is "v1")
* These item is not displayed in Easter Japan Region
3 and Western Japan Region 3.
158
When there are no IPsec policies, create one using the "+" button.
Figure 185 Create IPsec Policy
The setting items necessary when creating an IPsec policy are given
in the following table.
Table 46 Setting Items for IPsec Policies
Item Setting Content
IPsec Policy Name Enter the IPsec policy name
Description Enter the description of the IPsec policy
AZ Select an availability zone
Transform Protocol Enter the transformation protocol being used
(The default value is "esp")
Auth Algorithm Enter the encryption algorithm
(The default value is "sha1")
Encapsulation Mode Select an encapsulation mode
(The default value is "tunnel")
Encryption Algorithm Select an encryption algorithm
(The default value is "aes-128")
Perfect Forward Secrecy (PFS) Enter the Perfect Forward Secrecy
(The default value is "group5")
Lifetime Enter the lifetime of the security association (SA)
(The default value is "3600")
159
Initiator Select the initiator mode
- "bi-directional": Connection is confirmed in both
directions
- "response-only": Connection is confirmed on the
response side
* This is only displayed in Easter Japan Region 3
and Western Japan Region 3.
160
Configure the connection information of the peer router.
Figure 186 Create IPsec VPN Connection Window (Connection destination information)
The setting items necessary when creating the connection
destination information of an IPsec VPN connection are given in the
following table.
Table 47 Setting Items for the Connection destination information of Create IPsec VPN
Connection
Item Setting Content
Peer: Global IP Address Specify the peer's global IP address
* The possible entry methods include selection from a list of
IP addresses inside the IaaS contract and direct entry of the
IP address.
Peer: Private IP Address
(CIDR)
Enter the private IP address of the peer in CIDR format
161
Check the configured details, and then click "Create" to create the
IPsec VPN connection.
Figure 187 Create IPsec VPN Connection (Confirmation)
162
How to Delete IKE and IPsec Policies
Created IKE policies and IPsec policies cannot be deleted from the VPN
Service window. To delete them, do so from the API Execution window or by
executing an API.
This section explains the deletion method using the API Execution window.
(1) Obtain Policy List Information
Set the following values on the API Execution window, press the Execute
API button, and the policy list information will be displayed in the response
display section.
- HTTP Method: "GET"
- Endpoint: "networking"
- URI: "/v2.0/vpn/ikepolicies" For an IKE policy
"/v2.0/vpn/ipsecpolicies" For an IPsec policy
* In Eastern Japan Region 3 and Western Japan Region 3, specify the
following:
- Endpoint: "nfv"
- URI:
"/vpn/nfv/ikepolicies" For an IKE policy
"/vpn/nfv/ipsecpolicies" For an IPsec policy
Figure 188 Obtain Policy List Information (For an IPsec policy)
(2) Check the Policy ID of the Policy to Delete
163
The policy ID of the policy to delete can be checked using the policy name
in the response display section of the policy list information.
Figure 189 Check the Policy ID (For an IPsec policy)
(3) Execute Policy Deletion
Set the following values on the API Execution window, and perform deletion
of the policy using API execution.
- HTTP Method: "DELETE"
- Endpoint: "networking"
164
- URI:
"/v2.0/vpn/ikepolicies/{Policy_ID_of_deletion_target}" For an IKE policy
"/v2.0/vpn/ipsecpolicies/{Policy_ID_of_deletion_target}" For an IPsec policy
* In Eastern Japan Region 3 and Western Japan Region 3, specify the
following:
- Endpoint: "nfv"
- URI:
"/vpn/nfv/ikepolicies/{Policy_ID_of_deletion_target}" For an IKE policy
"/vpn/nfv/ipsecpolicies/{Policy_ID_of_deletion_target}" For an IPsec
policy
Figure 190 Execute Policy Deletion (For an IPsec policy)
Advisory Notes
・ Information of IKE policies and IPsec policies cannot be viewed or updated.
To view or update the information, do so from the API Execution window or
by executing an API.
・ When the status of an IPsec VPN connection is not ACTIVE, check from the
API Execution window or an API that the information of the connection
destination and the setting information match (for details, refer to the "IaaS
API Reference - Network").
165
Chapter 23 Database Virtual Server
Database Virtual Server List
You can check the list and status of the database virtual server created in
project.
Figure 191 Database Virtual Server List
Table 48 Displayed Content of Database Virtual Server List Table
No. Item Name Displayed Content
1 Database Virtual Server
Name
Database Virtual Server Name
2 Status Database Virtual Server Status
Refer to Table 49 Database Virtual
Server Status
3 Action Various Operations for database virtual
server
Table 49 Database Virtual Server Status
No. Status Description
1 Active SQL Statement Receiving State
2 Backup Back-up Status
3 Build DB Virtual Server Creating Status
4 Failed State where POST/PUT API execution
has failed
5 Error Illegal state
166
6 Deleted State where DB Virtual Server has
already been deleted but the snapshot
linked to the virtual server exists
7 Reboot Start-up State
8 Resize State where data volume is being
resized
9 Modifying State where an attribute is being
changed
10 Restart_Required State where restart is required
11 Degenerated State where one DB virtual server is in
degenerate operation
12 Switched State where original server is switched
with duplicate one due to DB fail-over
167
23.1.1 About Operation
Figure 192 Database Virtual Server List Action
See below for the operations of database virtual server list.
1. Start
Refer to 23.4.
2. Starting After Patch Application
Refer to 23.5.
3. Stop
Refer to 23.6.
4. Reboot
Refer to 23.7.
5. Rebooting After Patch Application
Refer to 23.8.
6. Delete
Refer to 23.9.
7. Show Parameters
Refer to 23.10.
8. Show Database Logs
Refer to 23.11 and 23.12.
168
Database Virtual Server Creation
Database Virtual Server is newly created.
23.2.1 How to create database virtual server
1. Click the icon "+" at the upper right on the Database Virtual Server List screen.
2. Enter the appropriate information as below and click "Next Page".
Figure 193 Database Virtual Server Information
・ Database Virtual Server Name
・ Database Master User Name
・ Database Master Password
・ Database Master Password Confirmation
・ Data Disk Size (GB)
・ Backup Retention Period (Days)
If you select "Set", you need to set the following information.
169
Figure 194 Backup Retention Period
Number of Days for Backup Retention (1 to 10 days)
・ Redundancy (Enabled/Disabled)
・ Description
3. Enter the appropriate information as below and click "Next Page".
Figure 195 Flavor Type
・ Flavor Type
4. Enter the appropriate information as below and click "Next Page".
Figure 196 DB Subnet Group
・ DB Subnet Group
170
5. Enter the appropriate information as below and click "Next Page".
Figure 197 Security Group
・ Security Group
171
6. You can check the setting details you have entered so far on the confirmation screen. If
there are no problems, click "Create". (*1)
Figure 198 Confirmation for Setting Content
*1
"Automatically generated parameters", which is displayed on the confirmation
screen for database creation, is automatically set from "recommended value of
database engine".
172
Table 50 Content of "Automatically generated parameters"
No. Item Name Displayed Content
1 shared_buffers Buffer size which is about 20% of the
memory size of selected flavor.
2 effective_cache_size Cache size which is about 50% of the
memory size of selected flavor.
3 log_line_prefix Log format for the database log.
Database Virtual Server Details
You can open the database virtual server details by clicking the database virtual
server name of database virtual server list.
The detailed information not displayed on the database virtual server list can
be checked.
Figure 199 Database Virtual Server Details (Database Virtual Server Information)
173
Figure 200 Database Virtual Server Details (Flavor Type Network Information)
Figure 201 Database Virtual Server Details (Database Information)
174
Figure 202 Database Virtual Server Details (Database Operation Information)
Figure 203 Database Virtual Server Details (Parameters to be changed at the time of next
reboot)
Table 51 Displayed Content of Database Virtual Server Details
No. Category Item Name Displayed Content
1 Database Virtual
Server Details
ID Database Virtual Server
ID
2 Database Virtual
Server Name
Database Virtual Server
Name
3 Status Database Virtual Server
Status.Refer to Table 49
Database Virtual Server
Status
4 Creation Time Created Date and Time
175
5 Update Time Update Date and Time
6 Data Storage Size Data Storage Size
7 Data Storage Type Data Storage Type
8 Availability Zone of
Master Running
Availability Zone where
the main server is
starting up
9 Redundancy true / false
10 Multi AZ Option true / false
11 Associated Read
Replica
Linked Read Replica
12 Original ID of Read
Replica
Replication Source
Database Virtual Server
ID
13 Availability Zone of
Slave Running
Availability Zone where
duplicate server is
starting up
14 Status of Read Replica Status of Read Replica
15 Security Group Security Group
16 Description Description
17 Flavor Type Flavor ID Flavor ID
18 Network
Information
Internal FQDN Internal FQDN
19 External FQDN External FQDN
20 Internal IP Address IP Address
21 Global IP Address Global IP Address
22 Connectable from
Internet
true / false
23 DB Subnet Group Subnet Group
24 Database
Information
Port Number Port Number
25 DB Encoding Database Encoding
26 DB Collation Order Checking Flow
27 DB Type Type
28 DB Version Version
29 DB Minor Version Minor Version
30 Database Master User
Name
Database Management
User Name
176
31 DB Parameter Group
ID
DB Parameter Group ID
32 Database
Operation
Information
Backup Retention
Period
Number of Days for
Backup Storage
33 Backup Retention
Period
Backup Time Range
34 Time Zone of Backups Maintenance Time Range
35 Recover Redundancy
Immediately
true / false
36 Automatic Recovery of
Redundancy Start At
Automatic Recovery Start
Time
37 Parameters to be
changed when
next rebooting
Data Storage Size Data Storage Size
38 Data Storage Type Data Storage Type
39 Backup Retention
Period
Number of Days for
Backup Storage
40 Flavor ID Flavor ID
41 ID Database Virtual Server
ID
42 Name Database Virtual Server
Name
43 DB Parameter Group
ID
DB Parameter Group ID
44 DB Version Database Version
45 Database Master User
Name
Database Management
User Name
46 Database Master
Password
Database Management
Password
47 Multi DB Option true / false
48 Multi AZ Option true / false
49 Port Number Port Number
50 Engine Minor Version Database Engine Minor
Version
51 Security Update Existence of Security
Update settings
177
Database Virtual Server Startup
You can start up Database Virtual Server.
23.4.1 How to start up Database Virtual Server
1. On the Database Virtual Server List screen, click "Start" selecting from the pull-down
menu of the database virtual server that is starting up.
Figure 204 Database Virtual Server List (Start)
2. If you check the start-up status and there are no problems, click the "Start" button.
Figure 205 Start-up Check
178
Starting the Database Virtual Server after Patch
Application
It is possible to start the database virtual server after application of patches.
23.5.1 How to start the database virtual server after patch
application
1. On the Database Virtual Server List screen, select "Update patch and start" from the pull-
down menu of the database virtual server to start.
Figure 206 Database Virtual Server List (Start after Patch Application)
2. Check the content and there are no problems, click "Start".
Figure 207 Confirm Start After Patch Application
179
Database Virtual Server Stop
You can stop the database virtual server.
23.6.1 How to stop database virtual server
1. On the database virtual server list screen, click "Stop" selecting from the pull-down menu
of the database virtual server that you want to stop.
Figure 208 Database Virtual Server List (Stop)
2. If you check the stop status and there are no problems, click the "Stop" button.
Figure 209 Stop Check
Database Virtual Server Reboot
You can reboot the database virtual server.
180
23.7.1 How to reboot the database virtual server
1. On the database virtual server list screen, click "Reboot" selecting from the pull-down
menu of the database virtual server that you want to reboot.
Figure 210 Database Virtual Server List (Reboot)
2. If you check reboot status and there are no problems, click the "Reboot" button.
Figure 211 Reboot Check
181
Rebooting the Database Virtual Server after Patch
Application
It is possible to reboot the database virtual server after application of patches.
23.8.1 How to reboot the database virtual server after patch
application
1. On the Database Virtual Server List screen, click "Update patch and reboot" in the pull-
down menu of the database virtual server to reboot.
Figure 212 Database Virtual Server List (Reboot after Patch Application)
2. Check the content and if there are no problems, click "Reboot".
Figure 213 Confirm Reboot After Patch Application
182
Database Virtual Server Deletion
You can delete the database virtual server.
23.9.1 How to delete the database virtual server
1. On the database virtual server list screen, click "Delete" selecting from the pull-down
menu of the database virtual server that you want to delete.
Figure 214 Database Virtual Server List (Deletion)
2. If you check the deletion status and there are no problems, click the "Delete" button.
Figure 215 Deletion Check
183
DB Parameter Group Details
You can check the details of DB parameter group.
23.10.1 How to Check DB Parameter Group
1. On the database virtual server list screen, click "Show Parameters" selecting from the
pull-down menu of DB parameter group check.
Figure 216 Database Virtual Server List (Show Parameters)
2. DB Parameter Group Details screen is open.
You can check the detailed information on DB parameter group.
Figure 217 DB Parameter Group Details (Show Parameters)
184
Figure 218 DB Parameter Group Details (Parameter Details)
Table 52 Displayed Content of DB Parameter Group Details
No. Category Item Name Displayed Content
1 DB Parameter Group DB Parameter Group
Name
DB Parameter Group
Name
2 DB Parameter Group
ID
DB Parameter Group
ID
3 Parameter Group Details Parameter Name Parameter Name
4 DB Parameter Name DB Parameter Values
Database Log List
You can check the database log list.
Figure 219 Database Log List
23.11.1 How to see log
1. On the database virtual server list screen, click "Show Database Logs" selecting from the
pull-down menu of the database in which you want to see log.
185
Figure 220 Database Virtual Server List (Show Database Logs)
Database Log Details
Click the log file name of database log list to open database log details.
You can check the detailed information which is not displayed on the database
log list.
Figure 221 Database log details
Table 53 Displayed Content of Relational Database Log Details
No. Item Name Displayed Content
1 Log File Name Log File Name
2 Log Log
186
Chapter 24 Stack
Stack List
You can check a list and status of a stack created in a project.
Figure 222 Stack List
Table 54 Stack List Table
No. Item Name Description
1 Stack name Name of a stack
2 Description Description of a stack
3 Stack ID ID to identify a stack in unique
4 Status Status of a stack
5 Action Various operations on a stack
187
Stack Details
You can check a list and status of a stack created in a project.
Figure 223 Stack Details
Table 55 Stack Details Table
No. Classification Item Name Description
1 Information Description Description of a stack
2 Status Status
3 Date and time of
creation
Date and time of creation
4 Timeout (minutes) Timeout
5 Resource deletion
at stack creation
failure
Behavior at creation failure
6 Parameters Name Key
7 Value Value corresponding to the key
8 Outputs Outputs Outputs Information
188
Create Stack
24.3.1 How to Create Stack
1. Click an icon on Virtual Server List window.
2. Set the following and click "CREATE".
Figure 224 Create Stack
・ Stack Name
・ How to Specify Template
If you select "URL", specify the following.
"URL"
If you select "File", specify the following.
Drop a configuration file in "File".
If you select "YAML", specify the following.
"YAML"
・ Timeout (minutes)
・ Resource deletion at stack creation failure (Delete or not)
189
Edit Stack
You can edit the created stack.
Figure 225 Edit Stack
You can edit the following. Click "UPDATE" after editing.
・ How to Specify Templates
・ Timeout
・ Parameter
190
Chapter 25 Monitoring
Monitoring Target Resource List
Monitoring Target Resource List is displayed.
Figure 226 Monitoring Target Resource List
Table 56 Displayed Content of Monitoring Target Resource List Table
No. Item Name Displayed Content
1 Resource Resource Name
2 Resource ID Resource ID
3 AZ Availability Zone
25.1.1 How to display target resource list
1. On the Monitoring Target Resource List screen, select the menu from the pull-down menu
of the audit menu.
Figure 227 Monitoring Target Resource List (Audit Item Sorting : Audit Menu)
191
・ Audit Menu
Compute
Storage
Database
Network
Custom
2. Select the resource from the pull-down menu of the target resource.
*By selecting any of the Audit Menu items, items are displayed in the pull-down menu of
Target Resource. The target resource that corresponds to the Audit Menu is as follows.
Figure 228 Monitoring Target Resource List (Audit Item Sorting : Target Resource)
・ Target Resource if "compute" is selected
Virtual Server
Image
・ Target Resource if "storage" is selected
Block Storage
Object Storage
・ Target Resource if "database" is selected
Database
・ Target Resource if "network" is selected
Port
Global IP
Load Balancer
・ Target Resource if "Custom" is selected
Custom Audit
3. Resource List is displayed.
192
Figure 229 Monitoring Target Resource List (After Audit Item Sorting)
Resource Audit Information
By clicking the resource name of the resource displayed on the Monitoring Target
Resource List, you can open the resource audit information screen. Here you can
check the detailed information not displayed on the target resource list.
Figure 230 Resource Audit Information (Resource Information)
Figure 231 Resource Audit Information (Graph)
193
Figure 232 Resource Audit Information (Sample Statistical Value)
Table 57 Displayed Content of Resource Audit Information
No. Category Item Name Displayed Content
1 Resource Information Resource Resource Name
2 Resource ID Resource ID
3 Graph Meter Refer to 25.3
4 Line Chart
5 Sample Statistical
Value
Minimum Value Minimum Value of Statistical
Value
6 Maximum Value Maximum Value of Statistical
Value
7 Average Value Average Value of Statistical
Value
Graph
The graph with the horizontal axis being time and vertical axis being sample
values is displayed.
25.3.1 How to change the displayed content of the graph
From the pull-down menu of Meter of the resource audit information, select the
meter for which you want to display a graph.
194
Figure 233 Resource Audit Information (Graph : Meter)
25.3.2 Graph Operation
If you move a cursor to a graph, the details of each time range (date, time, and
sample values) are displayed.
Figure 234 Resource Audit Information (Graph Details)
If you move the mouse wheel upwards on the graph you can zoom in, and when
you move the mouse wheel downwards it will zoom out.
195
Chapter 26 Alarm
The alarm explained in this section are provided for Japan East 1/Japan East
2/Japan East 3/Japan West 1/Japan West 2/UK/Finland/Germany/Spain/US
region.
Please refer to Chapter 27 Alarm (Easter Japan Region 3/Western Japan
Region 3) when using Eastern Japan Region 3 or Western Japan Region 3.
Alarm List
You can check the list and status of the alarm created in project.
Figure 235 Alarm List
Table 58 Displayed Content of Alarm List Table
No. Item Name Displayed Content
1 Alarm Name Alarm Name
2 Type threshold / combination
3 Enable/Disable true / false
4 Status ok / insufficient data / alarm
5 Action Various Operations for Alarm
196
26.1.1 About Operations
Figure 236 Alarm List Action
The below are provided as the alarm list operations.
1. Update
Refer to 26.4 Action setting.
2. History
Refer to 26.5 History of Alarm.
3. Delete
Refer to 26.6 Alarm Deletion.
Alarm Creation
An alarm can newly be created.
26.2.1 How to create an alarm
1. Set the below information and click "Next Page".
2. Set the below information and click "Next Page".
Figure 237 Alarm Type
・ Alarm Type (threshold / combination)
197
3. Set the below information and click "Next".
Figure 238 Alarm Details
・ Alarm Name
・ Enable/Disable
・ How to Execute Action (Rerun / Do Not Rerun)
・ Description
4. Set the below information and click "Next".
If Alarm Type "threshold" is selected
Figure 239 Audit Item
・ Audit Item
Click the "Set" button and a pop-up window will be displayed. The below information
should be set.
198
Figure 240 Audit Item Setting
Resource Type
Virtual Server
Database
Global IP
Virtual Network
Virtual Router
Load Balancer
・ Threshold
Figure 241 Audit Item (Threshold)
Threshold
Operator for comparing threshold and sampling value
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
199
Threshold Evaluation Interval (sec)
Number of Threshold Evaluation Repeats
Statistics for comparing with threshold (Average Value/Number of
Samples/Maximum Value/Minimum Value/Total Value)
Treatment of data point when the number of samples is abnormally small
(Exclude/Does not exclude)
・ Query
If you click the "Add Query" button, a pop-up window will be displayed. Please set
the appropriate information.
Figure 242 Alarm Creation (Add Query)
Figure 243 Add Query
Field Name (Project Name/User Name)
Relative Operator
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
Value
If an alarm type "combination" is selected
・ How to evaluate a combination (AND condition / OR condition)
200
Figure 244 Alarm Selection (How to evaluate a combination)
・ Alarm List for Combination
If you click the "Add alarm" button, a pop-up window will be displayed. Please set
the information below.
Figure 245 Alarm Selection (Alarm List for combination)
Figure 246 Add alarm
Alarm to add
201
5. Please set the appropriate information and click "Next".
Figure 247 Alarm Evaluation Schedule (No setting)
To be set no matter whether the alarm type "threshold" or "combination" is selected
・ Setting/No Setting
If "setting" is selected, evaluation schedule can be added.
If you click the "Add evaluation schedule" button, a pop-up window will be
displayed. Set the below information.
Figure 248 Alarm Evaluation Schedule (Set)
202
Figure 249 Add evaluation schedule
・ Basic Setting
Setting name
Description
・ Start Date
If you select "Monthly", set the below information.
203
Figure 250 Start Date and Time (Monthly)
Day
Hour
minutes
Monitoring period (sec)
Time Zone
If "Weekly" is selected, set the below information.
Figure 251 Start Date (Weekly)
204
WEEK
Hour
minutes
Monitoring period (sec)
Time Zone
If you select "Daily", set the below information.
Figure 252 Start Date and Time (Daily)
Hour
minutes
Monitoring period (sec)
Time Zone
205
If "Hourly" is selected, set the below.
Figure 253 Start Date and Time (Hourly)
minutes
Monitoring period (sec)
Time Zone
If "cron" is selected, set the below.
Figure 254 Start Date and Time (cron)
CRON format
Monitoring period (sec)
Time Zone
206
6. Set the below information and click "Next".
Figure 255 Action Setting (Not Set)
To be set no matter whether the alarm type "threshold" or "combination" is selected
・ Setting / No Setting
If you select "Set", you can add "Action at alarm", "Action at OK", "What to do when
sufficient data is not collected". If you click the "Add action" button, a pop-up window
will be displayed. Please set the information below.
Figure 256 Action Setting (Set)
207
Figure 257 Add action at alarm
・ Service (compute / mail)
If you select "compute", set the below.
Figure 258 Add action at alarm (compute)
Parameter 1
Parameter 2
Figure 259 Add Action when OK
208
・ Service (compute / mail)
If you select "compute", set the below.
Figure 260 Add Action when OK (compute)
Parameter 1
Parameter 2
Figure 261 Add Action when data is lacking
・ Service (compute / mail)
If you select "compute", set the below.
209
Figure 262 Add Action when sufficient data is not collected (compute)
Parameter 1
Parameter 2
7. The setting content you have entered so far can be checked on the confirmation screen.
If there are no problems, click "Create".
Figure 263 Create Alarm
210
Alarm Details
If you click the alarm name of alarm list, you can open the alarm details. The
detailed information not displayed on alarm list can be checked.
Figure 264 Alarm Details (Alarm Type and Alarm Details)
Figure 265 Alarm Details (Monitoring Item and Threshold)
211
Figure 266 Alarm Details (Query and Alarm evaluation schedule)
Figure 267 Alarm Details (Select alarm and Alarm evaluation schedule)
Figure 268 Alarm Details (Action at alarm, Action at OK, and What to do when sufficient
data is not collected)
212
Table 59 Displayed Content of Alarm Details
No. Category Item Name Displayed Content
1 Alarm Type Alarm Type threshold / combination
2 Alarm Details Alarm Name Alarm Name
3 Resource ID Resource ID
4 Enable/Disable true / false
5 How to Execute
Action
true / false
6 Description Alarm Description
7 Monitoring Item Monitoring Item Monitoring Item
8 Threshold Threshold Threshold
9 Operator for
comparing threshold
and sampling value
equal/larger than/equal
to or larger
than/smaller
than/equal to or
smaller than
10 Threshold
Evaluation Interval
Number of seconds
11 Number of
Threshold
Evaluation Repeats
Number of Threshold
Evaluation Repeats
12 Statistics for
comparing with
threshold
Average value/Number
of samples/Maximum
value/Minimum
value/Total value
13 Treatment of data
point when the
number of samples
is abnormally small
Exclude/Does not
exclude
14 Query Field Name Project Name/User
Name
15 Relative Operator equal/larger than/equal
to or larger
than/smaller than/equal
to or smaller than
16 Value Value
213
17 Select alarm Condition of
combination
AND condition / OR
condition
18 Alarm Name Names of alarm to be
evaluated in the
combination
19 Alarm Type Type of each alarm:
threshold / combination
20 Enable / Disable True / false
21 Status The latest status of
each alarm:
ok / insufficient data /
alarm
22 Alarm evaluation
schedule
Setting name Setting name
23 Start Date Start Date
24 Monitoring period
(sec)
Number of seconds
25 Time Zone Time Zone
26 Description Description of Alarm
evaluation schedule
27 Action at alarm Service compute / mail
28 Parameter 1 Parameter 1
29 Parameter 2 Parameter 2
30 Action at OK Service compute / mail
31 Parameter 1 Parameter 1
32 Parameter 2 Parameter 2
33 What to do when
sufficient data is not
collected
Service compute / mail
34 Parameter 1 Parameter 1
35 Parameter 2 Parameter 2
214
Action setting
You can edit the created alarm.
26.4.1 How to set an alarm
1. On the alarm list screen, click "Update" selecting from the pull-down menu of the alarm
you want to edit.
Figure 269 Alarm List (setting)
2. On the alarm setting screen, you can set the below. Items to be edited change depending
on the alarm type you selected. Please refer to 20.2 for the items to be edited of each
type.
Figure 270 Alarm Setting (Alarm type and alarm details)
・ Alarm Type (threshold / combination)
・ Alarm Name
・ Resource ID
・ Enable/Disable
・ How to Execute Action (Rerun / Do Not Rerun)
・ Description
215
Figure 271 Alarm Setting (Monitoring Item and threshold)
Figure 272 Alarm Setting (Query)
・ Alarm Type (if threshold is selected)
Monitoring Item
Threshold
Operator for comparing threshold and sampling value
(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)
Threshold Evaluation Interval (sec)
Number of Threshold Evaluation Repeats
Statistics for comparing with threshold
Treatment of data point when the number of samples is abnormally small
(Exclude / Not Exclude)
Query
216
Figure 273 Alarm Setting (Select alarm)
・ If an alarm type "combination" is selected
Select alarm (And / Or)
Combination alarm list
Figure 274 Alarm Setting (Alarm evaluation schedule)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Set/Not Set
Figure 275 Alarm Setting (Action setting)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Set/Not Set
217
Figure 276 Alarm Setting (Action at alarm, Action at OK, What to do when sufficient data
is not collected)
To be set no matter whether alarm type "threshold" or "combination" is selected
・ Action at alarm
・ Action at OK
・ What to do when sufficient data is not collected
3. Click "Update" after edition.
218
History of Alarm
The alarm history is displayed.
Figure 277 History of Alarm
Table 60 Displayed Content of Alarm History
No. Item Name Displayed Content
1 Alarm Name Alarm Name
2 Filtering conditions See 26.5.1
3 Date and time Alarm date and time
4 Alarm Type creation / rule change / state transition /
deletion / action
5 Description Description of Alarm
26.5.1 How to display the history of alarm
1. Click "history" of the pull-down menu of the alarm that displays the history of alarm on
the Alarm List screen.
Figure 278 Alarm List (History)
219
2. Set the below information under the filtering conditions on the alarm history screen, and
click the "View" button.
Figure 279 History of Alarm (Filtering Conditions "time stamp")
・ If a time stamp is selected, set the below.
Start Date
Click next to the text form of Start Date and select a date.
Figure 280 Time Stamp (Start Date)
End date
Click next to the text form of Start Date and select a date.
220
Figure 281 Time Stamp (End date)
・ If "alarm type" is selected, set the below.
Figure 282 History of Alarm (Filtering conditions "Alarm Type")
Alarm Type
creation
rule change
state transition
deletion
action
221
Alarm Deletion
You can delete an alarm. On the alarm list screen, click "Delete" of the pull-
down menu of the action of the alarm that will be deleted.
26.6.1 How to delete an alarm
1. On the alarm list screen, click "delete" of the pull-down menu of the alarm that will be
deleted.
Figure 283 Alarm List (Deletion)
2. Click the "Delete" button if there are no problems after you have checked the content to
be deleted.
Figure 284 Deletion of Alarm
222
Chapter 27 Alarm (Easter Japan Region 3/Western
Japan Region 3)
Function Outline
The IaaS Service Portal provides an alarm function. Setting threshold values and
conditions for the Monitoring items of resources makes it possible to send notification of
alarms, and browse their histories.
The explanation in this chapter is for the alarm function and operation screens provided
in Eastern Japan Region 3 and Western Japan Region 3. The functions provided in
regions other than Eastern Japan Region 3 and Western Japan Region 3 are different,
so refer to "Chapter 26 Alarm" if information is necessary.
The functions provided are as follows:
・ Alarm Functions
List display and detailed display of alarms Creation, editing, and deletion of alarms Searching of alarm histories and display of history details
223
Alarm List
It is possible to check a list of the alarms created inside a project.
From this screen, it is possible to perform operations for creating, updating, and deleting
alarms, and view details and histories.
Figure 285 Alarm List
Table 61 Alarm List Table Displayed Content
No. Item Name Displayed Content
1 Alarm name The value when created
2 Status *1 The status of the alarm
Enabled / Disabled
3 Severity - (when not set) / information / warning / error
/ critical
4 Monitoring Item *2
The name of the monitoring item of the
resource
5 Threshold The value and unit from when created
* "heartbeat" uses no unit
6 Operator equal / above / below
7 Statistic average / max / min / sum
8 Action The various operations for the alarm
*1: The setting values for status (alarm status) are as follow:
Enabled
The monitoring item is monitored, and notification is sent when the
item reaches its threshold.
Disabled
The monitoring and notification functions are stopped.
224
*2: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of
Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".
27.2.1 About Operations
Figure 286 Alarm List Actions
The following operations are provided for the Alarm List.
1 History
Refer to "27.7".
2 Edit
Refer to "27.5".
3 Delete
Refer to "27.6".
225
Alarm Details
It is possible to check the details of an alarm by clicking the alarm name in the Alarm
List. Detailed information about the alarm can be confirmed.
Figure 287 Alarm Details
226
Table 62 Alarm Details Displayed Content
No. Classification Item Name Displayed Content
1 Alarm Alarm name The value when created
2 Alarm ID Automatically assigned during
creation
3 Severity - (when not set) / information / warning
/ error / critical
4 Alarm action *1 - (when not set) / mail
5 Alarm status *2 Enabled / Disabled
6 Monitoring Resource Type The virtual server
7 Monitoring Item *3 The monitoring item of the resource
8 Threshold
Threshold The value and unit from when created
* "heartbeat" uses no unit
9 Operator equal / above / below
10 Interval Displayed using minutes
11 Statistic average / max / min / sum
*1: The setting values for actions when alarms occur are as follows:
Blank (when not set)
Email notifications are not sent. Checking is only possible from the History of
Alarm screen.
When the threshold condition set for a resource that is a monitoring target is
reached, email is sent to notify the people who are the targets of notification.
The information of the email can be checked on the History of Alarm screen.
*2: The setting values for status (alarm status) are as follows:
Enabled
The monitoring item is monitored, and notification is sent when the item reaches
its threshold.
Disabled
The monitoring and notification functions are stopped
*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of
Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".
227
Alarm Creation
In alarm creation, alarms can be set by specifying threshold values and conditions for
the Monitoring items of the specified Resource types.
27.4.1 How to create an Alarm
1 Click the [Create] icon ("+") on the upper-right of the Alarm List screen.
2 Make the following settings and click the [Create] button.
Figure 288 Create Alarm (Overall)
*Item names that have a "*" (asterisk) on their right must be entered (This applies to all
screens).
228
Table 63 Create Alarm Entry Content
No. Classification Item Name Required/Optional Entry Content
1 Alarm Alarm name Required String length: 1 – 255
bytes
Usable characters:
(A – Z, a – z, 0 – 9, , -)
3 Severity Optional Blank (when not set) /
information / warning /
error / critical
4 Alarm action *1 Optional Blank (when not set) /
5 Alarm status *2 Required Enabled / Disabled
6 Monitoring Resource type Required The virtual server
7 Monitoring item *3 Required The monitoring item of
the resource
8 Threshold Threshold Required Enterable value:
Integer over 0
9 Operator Required equal / above / below
10 Interval Required Entered using minutes
Enterable value: 1 -
1440
11 Statistic Required average / max / min /
sum
*1: The setting values for actions when alarms occur are as follows:
Blank (when not set)
Email notifications are not sent. Checking is only possible from the History of
Alarm screen.
When the threshold condition set for a resource that is a monitoring target is
reached, email is sent to notify the people who are the targets of notification.
The information of the email can be checked on the History of Alarm screen.
*2: The setting values for status (alarm status) are as follows:
Enabled
The monitoring item is monitored, and notification is sent when the item reaches
its threshold.
Disabled
The monitoring and notification functions are stopped
229
*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of
Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".
230
Alarm Editing
It is possible to edit alarms that have been created.
It is possible to change the settings for the Alarm action and enable or disable the Alarm
status.
27.5.1 How to edit an alarm On the Alarm List screen, click [Edit] in the pull-down of the alarm you want to edit.
Figure 289 Alarm List (Edit)
From the Update Alarm screen it is possible to edit the following.
Figure 290 Update Alarm
231
Table 64 Update Alarm Entry Content (Specifiable Items)
No. Classification Item Name Required/
Optional
Displayed Content
1 Alarm Alarm action *1 Optional Blank (when not set) /
2 Alarm status *2 Required Enabled / Disable
*1: The setting values for actions when alarms occur are as follows:
Blank (when not set)
Email notifications are not sent. Checking is only possible from the History of
Alarm screen.
When the threshold condition set for a resource that is a monitoring target is
reached, email is sent to notify the people who are the targets of notification.
The information of the email can be checked on the History of Alarm screen.
*2: The setting values for status (alarm status) are as follows:
Enabled
The monitoring item is monitored, and notification is sent when the item reaches
its threshold.
Disabled
The monitoring and notification functions are stopped
After editing the alarm click "Update".
232
Delete Alarm
It is possible to delete alarms.
27.6.1 How to delete an alarm On the Alarm List screen, click [Delete] in the pull-down menu of the target alarm.
Figure 291 Alarm List (Delete)
Check the content to delete, and if there are no problems, click the [Delete] button.
Figure 292 Delete Alarm
233
History of Alarm
It is possible to search and display the History of Alarm using the dates and times of
occurrence.
Figure 293 History of Alarm
Table 65 History of Alarm Display Content
No. Classification Item Name Displayed Content
1 Alarm Alarm name The value when created
2 Filter Start datetime(UTC) Default value: 15 days before the current
date and time (UTC)
3 End datetime(UTC) Default value: The current date and time
(UTC)
4 Search Results Date and time of
occurrence(UTC))
The date and time that the alarm
occurred
5 Alarm state at
occurrence
active / inactive / disabled
6 Description Detailed information from when the
alarm occurred
234
27.7.1 How to display History of Alarm
On the Alarm List screen, click [History] in the pull-down menu of the target alarm.
Figure 294 Alarm List (History)
235
Set the following as the filtering conditions on History of Alarm screen and then click
the "Search" button.
Figure 295 History of Alarm (Filtering Conditions)
・ Method for setting the Start datetime(UTC) and the End datetime(UTC)
Start Date, End Date Select the dates to use for the start date and end date by clicking the text form.
Figure 296 Start Date, End Date
Start Time, End Time Select the times to use for the start time and end time by clicking the text form.
Figure 297 Start Time, End Time
236
Alarm Details
It is possible to open the details of alarms by clicking the alarm name in the Alarm Details
list.
Figure 298 Alarm Details
237
Table 66 Alarm Details Displayed Content
No. Classification Item Name Displayed Content
1 Alarm Date and time of
occurrence(UTC)
The date and time the alarm
occurred
Display Format: yyyy-mm-
ddThh:mm:ssZ
2 Alarm state at
occurrence
active / inactive / disabled
3 Description Detailed information about the
alarm that occurred
4 Alarm name The value when created
5 Resource ID Automatically assigned during
creation
6 Severity - (when not set) / information /
warning / error / critical
7 Alarm action *1 - (when not set) / mail
8 Alarm status *2 Enabled / Disabled
9 Monitoring Resource type The virtual server
10 Monitoring item *3 The monitoring item of the
resource
11 Threshold
Threshold The value and unit from when
created
* "heartbeat" uses no unit
12 Operator equal / above / below
13 Interval Displayed using minutes
14 Statistic average / max / min / sum
*1: The setting values for actions when alarms occur are as follows:
Blank (when not set)
Email notifications are not sent. Checking is only possible from the History of
Alarm screen.
When the threshold condition set for a resource that is a monitoring target is
reached, email is sent to notify the people who are the targets of notification.
The information of the email can be checked on the History of Alarm screen.
*2: The setting values for status (alarm status) are as follows:
Enabled
238
The monitoring item is monitored, and notification is sent when the item reaches
its threshold.
Disabled
The monitoring and notification functions are stopped
*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of
Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".
239
Chapter 28 Operation Log
Function Overview
This function provides the functionality for checking the history of operations
performed on the IaaS service portal. The history of operations performed in the
last three days can be referred to.
The following functions are provided.
・ List Display of Operation Logs
Search function
Select a period from the last three days to filter the displayed operation
log. The displayed items are those listed in Table 67. Clicking a displayed
request ID displays the details of the relevant operation log.
- Specifiable range of date and time to search: The last three days
- Amount of operation logs displayable at once: One day's worth
- Date and time specification format: UTC time
Export function
The list information of displayed operation logs can be output in csv
format.
- File format: csv
・ Detailed Display of Operation Logs
Clicking a specific request ID in the list of the operation log displays the
detailed information indicated in Table 67. This enables checking of API
request parameters and response bodies.
240
The items displayed in the Operation Log List Display screen and the Detailed
Display screen is indicated below.
Table 67 Operation Log Display Items (List Display and Detailed Display)
Item Description List
Display
Detailed
Display
Operation time
(UTC)
The time the request was sent
from the screen
Yes Yes
Session ID The ID that indicates the
uniqueness of the browser
Yes Yes
Request ID The ID assigned to the request
sent from the screen
Yes Yes
Screen name The name of the screen that sent
the request
Yes Yes
Operation The sent request Yes Yes
Status code The HTTP status code
corresponding to the request
Yes Yes
User name The user that executed the
request
Yes Yes
HTTP request The content of the sent request No Yes
HTTP response The body of the response to the
request
No Yes
Yes: Displayed
No: Not displayed
241
Usage Method of Operation Logs
1. List Display of Operation Logs
Enter the date and time to use as the search scope (in UTC time), and
then click the "Search" button.
The operation log for the specified search scope is displayed.
To save the search results, click the "Export" button to save the results as a
file in csv format.
Figure 299 Operation Log List Screen
2. Detailed Display of Operation Logs
To check the details of an operation log, click the Request ID.
242
Figure 300 Operation Log Details Screen
Advisory Notes
・ This function cannot store operation logs covering long periods of time.
If you need to store logs covering long periods of time, regularly export the operation
log.
・ The export function for the operation log only outputs the list information.
The detailed information of the Operation log cannot be output.
・ When specifying a time in a search of the operation log, searches are performed using
times rounded down to the nearest 5-minute interval.
For example: 12:09 will be handled as 12:05.
・ The details of operations are recorded in the operation log, but it may take some time
until it is possible to search them.
243
Chapter 29 API Execution
Function Overview
This function is for executing APIs from the IaaS Service Portal and displaying
the response results on the portal. It can be used when executing functions not
provided by the IaaS Service Portal, or when there is no environment for
executing APIs using the command line. In addition, up to 10 executed APIs are
saved in the history function3.
Note: This function is not guaranteed to work with all APIs. If it does not work
correctly, please use the API.
Refer to the following URL for the "API Reference".
https://k5-doc.jp-east-1.paas.cloud.global.fujitsu.com/doc/en/iaas/document/list/doclist_iaas.html
Usage Example
This chapter explains examples of the following two methods that can be
executed using APIs. For other methods, use them after referring to the "API
Reference".
・ GET method: An example of virtual server list acquisition is explained.
・ POST method: An example of virtual server creation is explained.
29.2.1 Information Necessary for API Execution
The following information is necessary on the API execution window. The example explains
the methods for confirming and setting this information.
3 The history is deleted when the project or region is changed.
244
Table 68 Information Necessary for API Execution
Item Description Required /
Optional
Region Select the region to execute the API in. A specific
region or Global can be selected.
Required
HTTP Method Select the HTTP method to be used when
executing the API.
Required
Endpoint Select the component to use for API execution.
Refer to 29.2.2 Endpoint List.
Required
URI Refer to the "API Reference", and then enter the
URI.
Required
Query Parameters Enter the Key and Value of the query.
Refer to the "API Reference", and then enter the
Key and Value.
Optional
HTTP Header Enter the key and value of the HTTP header. Optional
Request Body Enter the HTTP request body. Optional
29.2.2 Endpoint List
The endpoints available when a specific region and Global is selected are different. Refer
to the tables below for details and then specify the endpoint.
Table 69 Endpoint List (Regional Service)
Endpoint Service Name Note
autoscale Auto-Scaling
blockstoragev2 Block Storage
compute Compute (Standard Service)
compute-b Compute (Service for SAP HANA) Only available with SAP
HANA contracts
compute-w Compute (Service for SAP)
database Database
dns DNS Service
identityv3 Regional User Management
image Image Management
import-export Virtual Server Import and Export
keymanagement Key Management
loadbalancing Load Balancer
245
networking Virtual Network
networking-ex Virtual Network Expansion
objectstorage Object Storage
orchestration Template Management
(Orchestration)
software Software Management
telemetry Monitoring
appmanagement Application Management
Not available
blockstorage Block Storage
certificate Certificate Management
contract Regional Contract Management
identity Regional User Management
queue Queue Management
vmimport Virtual Server Import
global-identity Global User Management Not available
* When using global-
identity, use the endpoint
of Global Service.
Note: Different endpoints are provided in each region.
Table 70 Endpoint List (Global Service)
Endpoint Name of Service Note
global-billing Billing Management
global-catalog Product Management
global-cdn Content Delivery Service
global-contract Contract Management
global-identity User Management (Global)
global-rolemanagement Role Management Not available
Note: Different endpoints are provided in each region.
246
29.2.3 Example of Virtual Server List Acquisition
This section explains the method for acquiring a list of the virtual servers in a project.
Figure 301 Example of Entry on the API Execution Window
1. Select the region to execute the API in. You can select the currently selected region or
Global. When acquiring a list of virtual servers, select the currently selected Region.
For the relationship between regional and global services, refer to the "Features
Handbook 1.2 Location Services".
2. Specify the HTTP method, the URI, query parameters, the HTTP header, and the request
body.
Search in the "API Reference - Foundation Service" for the explanation of the desired API.
Figure 302 Extract from API Reference - Foundation Service
TenantID
/v2/ /serversTenantID
247
As shown in Figure 302, set the following for the HTTP method.
- HTTP Method: "GET"
It is possible to specify changes since, image, flavor, name, status, and host in the Query
Parameters, but this example filters the virtual servers to those with the status "ACTIVE".
- Query Parameters
Key : "status"
Value : "ACTIVE"
- HTTP Header: Setting is unnecessary
- Request Body: Setting is unnecessary
3. Select the Endpoint
Refer to Endpoint List and select the relevant endpoint. To acquire the list information of
virtual servers, select "compute".
4. Execute the API
After all of the necessary information has been entered, click the "Execute API" button.
5. Execution Results
The execution results are displayed in the response field.
Figure 303 API Response
248
29.2.4 Example of Virtual Server Creation
This section explains the method for creating virtual servers in a project.
Figure 304 Entry Example
Figure 305 Response Example
TenantID
/v2/ /serversTenantID
249
1. Select the Region
When creating a virtual server, select the currently selected Region.
2. Select the Endpoint
As in the preceding Example of Virtual Server List Acquisition, select "compute".
3. Specify the HTTP Method, the URI, the Query Parameters, the HTTP Header, and the
Request Body
Search in the "API Reference - Foundation Service" for the explanation of the desired
API.
Figure 306 Extract from API Reference - Foundation Service
As shown in Figure 306, set the following for the HTTP method.
- HTTP Method: "POST"
- URI : "/v2/{tenant_id}/servers"
- Query Parameters: Setting is unnecessary
- HTTP Header: Setting is unnecessary
- Request Body: Create the body referring to the following section in the "API Reference".
250
Figure 307 Extract from API Reference - Foundation Service
Figure 308 Example of Request Body Creation
Remainder
omitted
251
4. Execute the API
After all of the necessary information has been entered, click the "Execute API" button.
5. Execution Results
6. The execution results are displayed in the response field.
Figure 309 API Response
252
Chapter 30 VM Import and Export
Function Overview
This function provides the functions (VM import and export) for importing and
exporting virtual server images (vmdk format) that are stored on object storage
to and from the service. For details on the environment settings necessary for VM
import and export, refer to "Virtual Server Import" and "Virtual Server Export" in
the "IaaS Features Handbook".
The OSs supported by VM import and export are as follows:
VM import and export only support the following OSs:
Windows Server 2008 R2 SE
Windows Server 2008 R2 EE
Windows Server 2012 SE
Windows Server 2012 R2 SE
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
CentOS
Ubuntu
253
Usage Example
This section explains execution examples of the following:
VM Import : Explains an example of import of a virtual server image.
VM Export : Explains an example of export of a virtual server image.
30.2.1 VM Import
This section explains the confirmation and setting methods for VM import.
1. Display the VM Import List window
Clicking [Import / Export] -> [VM Import] displays the VM Import List window.
Using this window it is possible to refer to the import status of each image that
has been imported. Clicking the "Import" button on the VM Import List window
displays the VM Import window.
There are four types of VM import status:
succeeded
failed
processing
queued
Figure 310 VM Import List Window
2. Information necessary for VM import
After entering each item on the VM Import window, click the "Import" button and
import the image.
254
Figure 311 VM Import Window
The following table indicates the items necessary for VM import.
Table 71 VM Import Window Display Items
No. Item Description Required/
Optional
1 Image Name Enter the image name. Required
2 Container
Name
Select the name of the container to import.
*When there are no containers, transfer to the
Create Container window using the text link, and
then create a container. Refer to 11.2.1 Create a
Container.
Required
3 Object Name Select the name of the object to import.
*When there are no objects, transfer to the
Create Object window using the text link, and
then create an object.
Refer to 11.2.2 Create an Object.
Required
4 OS Type Select the OS type.
* Specify an OS type that matches that of the
OS to be imported.
Required
5 Check Sum
(SHA1)
Enter the value of the check sum. Optional
6 Min Disk Enter the minimum disk value. Optional
7 Min RAM Enter the minimum RAM value. Optional
255
3. Check from the VM Import Detail window
Clicking the desired image name on the VM Import List window displays the
VM Import Detail window. You can refer to detailed information such as object
pass, etc.
Figure 312 VM Import Detail Window
256
30.2.2 VM Export
This section explains the confirmation and setting methods for VM export.
1. Display the VM Export List window
Clicking [Import / Export] -> [VM Export] displays the VM Export List window.
Using this window it is possible to refer to the export status of each image that
has been exported. Clicking the "Export" button on the VM Export List window
displays the VM Export window.
There are six types of VM export status:
succeeded
failed
processing
queued
cancelling
canceled
Figure 313 VM Export List Window
257
2. Information necessary for VM export
After entering each item on the VM Export window, click the "Export" button
and export the image.
Figure 314 VM Export Window
The following table indicates the items necessary for VM export.
Table 72 VM Export Window Display Items
No. Item Description Required/
Optional
1 Image Name Enter the image name. Required
2 Container
Name of
Object
Storage
Select the container name of the
object storage where exported
image files will be stored.
*When there are no containers, transfer to
the Create Container window using the
text link, and then create a container.
Refer to 11.2.1 Create a Container.
Required
258
3. Check from the VM Export Detail window
Clicking the desired image name on the VM Export List window displays the
VM Export Detail window. You can refer to detailed information such as
container pass, etc.
Figure 315 VM Export Detail Window
Advisory Notes
The retention period of the status of VM import and export processing is
seven days from the completion of the VM import or VM export process.
259
Chapter 31 Bare Metal Service (Shared Disks)
Function Overview
This chapter explains the Bare Metal Service (shared disks) provided in
Eastern Japan Region 3. To use this service, you will need to apply separately.
Bare Metal Server
Bare Metal servers (physical servers) can be displayed on the screen
(List/Details) in the same way as Virtual Server. As it is not possible to
distinguish between virtual servers and Bare Metal servers on the reference
window, have customers set names that enable them to distinguish the server
type.
Network
Before creating Bare Metal servers or shared disks, it is necessary to create
the network that Bare Metal servers and shared disks will be connected to.
Perform creation of a network using either the API Execution window or API
(For details, refer to the "IaaS API Reference").
Bare Metal Network (network, subnet, security group, port, virtual router) can
be displayed on the screen in the same way as Virtual Server Network.
Shared Disk
Shared disk functions are provided as the dedicated menu for Bare Metal. The
following functions can be used for shared disks.
List display of shared disks
Detailed display of shared disks
However, operations of shared disks (creation/editing/deletion), snapshot
operations, backup operations, and job management operations are not
provided. If you want to perform these operations, use an API.
This chapter explains how to use shared disks and related advisory notes.
260
How to Use a Shared Disk
For shared disks, it is possible to confirm the information of shared disks
created by customers on screen. *It is necessary to use an API to create a
shared disk.
31.2.1 Shared Disk List Display
It is possible to refer to a list of the shared disks created in a project. Clicking
the link of a volume name enables confirmation of the detailed information of
the volume.
Figure 316 Shared Disk List Screen
31.2.2 Shared Disk Detailed Display
The detailed information of the shared disk (Volume List, Snapshot List,
Backup Volume Schedule, and Backup Generation List) can be referred to from
the Volume Detail Screen.
The Volume Details Screen of the volume selected on the Shared Disk List
screen is displayed as shown in the figure below.
261
Figure 317 Volume Details Screen
Advisory Notes
Bare Metal Servers
When an operation that is not possible for a Bare Metal server is executed
from the Action menu of a virtual server, the operation may not be possible.
Shared Disks
It may take up to a maximum of 5 minutes for the information of shared disks
created using an API to be reflected on the List or Details screen. If the
information is not reflected, wait for a while and then refresh the screen again.