Académique Documents
Professionnel Documents
Culture Documents
T
T
IBM SmartCloud Provisioning 2.1
Student Exercises
Course: TOS31 ERC: 1.0
November 2012
E
T
T
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in
the United States, other countries, or both.
ITIL is a registered trademark, and a registered community trademark of the Office of Government
Commerce, and is registered in the U.S. Patent and Trademark Office.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle
and/or its affiliates.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States,
other countries, or both and is used under license therefrom.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM
Corp. and Quantum in the U.S. and other countries.
The information contained in this publication is provided for informational purposes only. While
efforts were made to verify the completeness and accuracy of the information contained in this
publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this
information is based on IBMs current product plans and strategy, which are subject to change by
IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, this publication or any other materials. Nothing contained in this publication is
intended to,nor shall have the effect of, creating any warranties or representations from IBM or its
suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software.
References in this publication to IBM products, programs, or services do not imply that they will be
available in all countries in which IBM operates. Product release dates and/or capabilities referenced
in this presentation may change at any time at IBMs sole discretion based on market opportunities
or other factors, and are not intended to be a commitment to future product or feature availability in
any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or
implying that any activities undertaken by you will result in any specific sales, revenue growth,
savings or other results.
Printed in Ireland
Table of contents
About this book
Student exercises for Unit 1
No student exercises are provided for this unit.
1-1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2-1
2-3
2-4
2-8
2-9
2-10
2-11
2-11
2-12
2-13
2-13
2-13
2-15
2-16
2-16
2-17
2-17
2-18
E
T
T
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3-1
3-4
3-9
3-14
3-16
3-16
3-20
3-23
3-24
3-24
3-29
4-1
5-1
iii
Table of contents
Exercise 5-1: Exploring the IBM SmartCloud Provisioning console .
.
.
Exercise 5-2: Deploying a basic virtual image .
.
.
.
.
.
Exercise 5-3: Deploying an intermediate virtual image instance
.
.
.
.
.
.
.
.
Exercise 5-4: Deleting virtual system images
.
Exercise 5-5: Creating a disk volume and attaching it to a virtual system instance
Exercise 5-6: Assigning an elastic IP address to a deployed virtual machine
.
.
.
.
.
.
.
. 5-2
. 5-5
. 5-8
. 5-10
. 5-11
. 5-13
. 6-1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
E
T
T
7-1
7-3
7-6
7-9
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 8-1
. 8-2
. 8-3
. 8-5
. 8-7
. 8-11
. 8-13
. 8-14
. 8-15
. 8-17
. 8-18
. 8-19
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
9-1
9-4
9-7
9-8
. 10-1
. 11-1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 12-1
. 12-3
. 12-7
. 12-9
iv
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13-1
13-2
13-3
13-5
13-7
13-11
13-13
13-14
13-15
13-17
13-18
13-19
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
14-1
14-4
14-7
14-8
E
T
T
15-1
16-1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
17-1
17-4
17-4
17-8
17-8
.
.
.
.
.
.
.
.
.
.
.
.
18-1
18-4
18-6
18-11
18-12
18-18
.
.
.
.
.
.
.
.
.
.
19-1
19-1
19-6
19-8
19-9
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of contents
. 20-1
. 21-1
E
T
T
vi
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
vii
E
T
T
viii
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
1-1
E
T
T
1-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 1. Insert the Red Hat 6.1 installation DVD into the DVD drive and start the computer. If
necessary, select the DVD drive as the boot device.
You are prompted to test the media. If this is the first time to use this disk, test it.
Otherwise, select Skip to continue.
The anaconda installer loads.
___ 5. Select the option Basic Storage Devices and click Next.
___ 8. Click Configure Network. Select the System eth0 adapter. This adapter is connected to
the other systems for your environment. Click Edit.
___ 9. Select the Connect automatically check box.
___ 10. Select the IPv4 settings tab. For the method, select Manual.
___ 11. Under addresses, click Add. Provide the IP address 172.16.0.3. The netmask defaults to
16 (indicating 255.255.0.0). Click Apply.
___ 12. Click Close.
___ 13. If necessary, repeat for any other adapters as your instructor indicates.
___ 14. Click Next.
2-1
___ 15. Select the appropriate time zone. Leave the check box selected for System clock uses
UTC. Click Next.
___ 16. Enter the root password and confirmation as object00. Click Next.
___ 17. On Weak Password window, choose Use Anyway.
___ 18. Select the option Use all space for the disk and click Next.
___ 19. When prompted, click Write changes to disk. This action creates the partitions and boot
sector.
___ 20. Select Basic Server as the installation type. Select the radio button Customize now and
click Next.
___ 21. In the package selection panels, select the appropriate group from the left panel and the
options that are shown from the right panel, as indicated in this table.
E
T
T
Package group
Virtualization
Desktops
Applications
Application group
Virtualization
Virtualization Client
Virtualization Platform
Virtualization Tools
Desktop
General Purpose Desktop
Graphical Administration Tools
Legacy X Window System Compatibility
X Window System
Internet browser
Additional Development
Development
Development Tools
Click Optional Packages and select the expect-5 package if you are
going to use the NX server to connect to this machine. You have 17
of 44 packages selected.
If you are not using NX, you do not need the development packages.
2-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 23. The installation process begins. Depending on the speed of your computer, this process
takes 10 - 30 minutes to complete.
___ 24. Remove the installation DVD and reboot the system.
You might be prompted for additional information when the system loads for the first time. You do
not have to create additional users for this class. Accept all license agreements if you agree to the
terms. No account or connection with the Red Hat Network is required for this class.
E
T
T
___ 2. Open a terminal window by right-clicking the desktop and selecting Open in terminal.
___ 3. Stop the iptables (firewall) application to ensure that it does not interfere with the
communications among the various servers and protocols:
chkconfig iptables off
service iptables stop
___ 4. Disable SELinux to keep it from interfering with the installation and operation of
SmartCloud Provisioning. Open the SELinux configuration file (/etc/selinux/config) in
the text editor of your choice and modify the following line:
SELINUX=enforcing
to read:
SELINUX=disabled
___ 6. After reboot, log in as root again. Open a terminal window as before and create the
directory to hold the SmartCloud Provisioning files and programs:
mkdir /data
___ 7. Move the Red Hat 6.2 installation DVD ISO file (RHEL6.2-20111117.0-Server-x86_64DVD1.iso) to the /data directory.
mv /labfiles/isos/RHEL6.2<tab> /data
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-3
___ 8. Create a directory to hold the RPM packages for HSLT and VIL.
mkdir /tmp/ISCP
___ 9. Move the RPM packages for HSLT and VIL to the /tmp/ISCP directory.
mv /labfiles/ISCP/*.rpm /tmp/ISCP
___ 11. Move the RPM packages for HSLT to the /tmp/ntfs directory.
mv /labfiles/ntfs/*.rpm /tmp/ntfs
___ 12. Create a directory to hold WebSphere Application Server installation files.
mkdir /tmp/was
___ 13. Move the WebSphere Application Server installation files to the /tmp/was directory.
E
T
T
mv /labfiles/was/*.zip /tmp/was
Your particular version might be slightly different from the version available at the time of
this writing.
cd /labfiles/install/IBM_SmartCloud_Provisioning
./install.sh
A welcome screen is displayed, which includes links to the product documentation and
support.
___ 2. Click Next.
The license agreement window opens.
___ 3. Review the contents, and click Accept if you accept the terms. You must accept the terms
to continue.
You are prompted for the type of installation.
___ 4. Select Custom and click Next.
2-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 5. Leave both optional check boxes cleared. You are using the custom method to view the
options available at installation. Click Next.
A window for providing the location for the prerequisites opens. You are prompted for the
location of the Red Hat Enterprise Linux 6.2 installation image.
___ 6. Use the Browse button and select the ISO file that you copied to the /data/ directory
earlier.
___ 7. In a similar manner, select the location of the Ruby packages as /tmp/ISCP.
The livecd-tools and python-imgcreate packages are also in /tmp/ISCP.
___ 8. Click Next.
A window opens for providing network settings.
___ 9. Confirm that the following entries match the defaults in the window and click Next.
Netmask: 255.255.0.0
E
T
T
___ 10. Accept the defaults for the number of servers (three Zookeeper nodes and three Hadoop
and HBase nodes) and the MAC addresses. In your environment, depending on your
hardware, the compute node might need to run kernel services. If so, clear the check box
for Only deploy Kernel Service virtual machines to Storage Nodes. Click Next.
A user account window opens.
___ 11. Enter new password for the adminuser user ID, enter the password again to confirm it and
click Next to continue.
A summary window opens.
___ 12. Confirm the settings and click Next to continue.
The installation process begins. When the process completes, the PXE server is running.
In addition, a private DNS and DHCP service for the cloud is running on the PXE server,
or First-Box.
A message displays when this process finishes, indicating that the First-Box is ready. You
are then prompted to boot your compute and storage nodes.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-5
___ 13. Leave the message box displayed while you boot those nodes, or click OK.
E
T
T
___ 14. Start the first storage node. Choose the option to boot from the network.
When the system is configured, ensure that the BIOS settings are set to boot from disk as
the first option. The only time that you need to boot from the network is to configure the
storage node the first time.
If your computer has multiple network interfaces, you must choose the one that is defined
for use with the SmartCloud Provisioning product.
___ 15. Select the option to create the node as a storage node. The default option is the compute
node.
Operating system and necessary applications will be installed on the first storage node
automatically.
___ 16. Reboot the storage node when prompted.
___ 17. Repeat the process for the second storage node. Both systems can be deployed at the same
time. There is no need to wait for the first node to complete before starting the second
node configuration.
___ 18. Start the first compute node. Choose the option to boot from the network.
The compute node is configured after both storage nodes are operational. The compute
node is a transient server. This means that no persistent data is stored on the compute
2-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
node, and all running data is stored in a random access memory (RAM) disk. Therefore,
the compute node is regenerated every time that it boots.
If your computer has multiple network interfaces, you must choose the one that is defined
for use with the SmartCloud Provisioning product.
___ 19. Select the option to create the node as a compute node. The default option is the compute
node.
When the compute node is configured, the system defines a host name, such as
v001a649df7c6.
The following message displays until the compute and storage nodes are operating.
E
T
T
___ 20. If you have not done so, click OK to dismiss the message about the compute and storage
nodes in the installation program.
The installation wizard begins creating the master image for the kernel services machines.
When the process is finished, a complete message is displayed.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-7
E
T
T
___ 4. Test the configuration of the CLI by using the describe nodes command. Open a new
terminal window to get the changes to the .bashrc file.
iaas-describe-nodes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A welcome screen is displayed, which includes links to the product documentation and
support.
___ 2. Click Next.
The license agreement displays.
___ 3. Review the contents, and click Accept if you accept the terms. You must accept the terms
to continue.
E
T
T
___ 5. Select the check box for Manage VMware ESXi servers.
A window for providing the location for the prerequisites displays. You are prompted for
the location of the Red Hat Enterprise Linux 6.1 installation image.
___ 6. Use the browse button and select the ISO file that you copied to the /data/ directory.
___ 7. In a similar manner, select the location of the Ruby packages as /tmp/ISCP. The livecdtools and python-imgcreate packages are also in /tmp/ISCP.
___ 8. Click Next.
___ 9. Confirm that the following entries match the defaults in the window and click Next.
Netmask: 255.0.0.0
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-9
Important: Kernel services do not run on ESXi servers. In this case, they deploy only on the
storage nodes, regardless of the selection for this option.
For ESX compute nodes, the First-Box server needs the VMware vSphere command-line
interface (CLI) installed. The installer prompts you for the installation package for this
utility.
___ 11. Click Browse and navigate to /labfiles/prereq directory and select the package. In this
development of these materials, the file name was VMware-vSphere-CLI-4.1.0254719.x86_64.tar.gz.
You are prompted for the ESXi server information.
___ 12. Provide the values and click Add.
Password: object00
E
T
T
The installation process begins. When the process completes, the PXE server is running.
In addition, a private DNS and DHCP service for the cloud is running on the PXE server,
or First-Box.
A message displays when this process finishes, indicating that the First-Box is ready. You
are then prompted to boot your compute and storage nodes.
___ 14. Leave the message box displayed while you boot those nodes, or click OK.
In this step, you install the storage nodes. The PXE server handles all configuration and package
deployment for you.
___ 1. Power on the first storage node. Choose the option to boot from the network. When the
system is configured, ensure that the BIOS settings are set to boot from disk as the first
option. The only time that you need to boot from the network is to configure the storage
node the first time.
If your computer has multiple network interfaces, you must choose the one that is defined
for use with the SmartCloud Provisioning product.
___ 2. Select the option to create the node as a storage node. The default option is compute node.
___ 3. Reboot the storage node when prompted.
2-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 4. Repeat the process for the second storage node. Both systems can be deployed at the same
time. There is no need to wait for the first node to complete before starting the second
node configuration.
E
T
T
When the compute node and storage nodes are running, you install the virtual machines that provide
all the kernel services. Kernel services only run as KVM instances.
___ 1. Return to the first-box server where the installer is waiting to continue.
The /etc/hosts file is updated as each storage node is ready. When you have entries for
both storage nodes, proceed to Step 2.
cat /etc/hosts
storage-1.tivedu.cloud.com
storage-2.tivedu.cloud.com
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-11
___ 2. Start the virt-manager program to connect to the KVM hosting environments on the
compute and storage nodes. You can watch the virtual machines as they are created and
deployed. Open a terminal window and issue the command to start the program.
virt-manager &
The ampersand (&) sends the command to the background, freeing the terminal session
for future commands.
___ 3. Select File > Add connection and provide the information to connect to the storage-1
node and click Connect. Enter yes when prompted about the identity of the system.
Hypervisor: QEMU/KVM
Method: SSH
E
T
T
___ 4. Repeat Step 3 for the storage-2 node. Leave the virtual machine manager application open
while you run the deployment scripts.
You are running the virtual machine manager to watch the progress of the installation of
the kernel services images.
___ 5. Click OK to dismiss the message about the compute and storage nodes in the installation
program.
The installation wizard begins creating the master image for the kernel services machines.
When the process is finished, a complete message is displayed.
___ 6. Click OK to dismiss the message.
2-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
man
The man (manual) command provides access to documentation (called man pages) for various
commands. To access this documentation, enter man <command>.
___ 1. Open a terminal window and issue the command to access the documentation for the ls
command.
man ls
The behavior is similar to the vi editor. Use the keys indicated to navigate the document.
This list is only a subset of the available commands.
/<text>: Use the forward slash followed by a string to search the documentation.
When you have a string that is located, you can use the n key to move to the next
result on the search. This search moves down the document from the current location
of the cursor. To search the whole document, you must place your cursor on the first
line with the g command.
E
T
T
___ 2. Search for the string modification. There is only one instance in the document.
___ 3. Search again for the string reverse. There are two instances.
___ 4. Enter q to exit the man page.
gedit
If you have a GUI environment that is configured on your server, you can use the gedit text editor
to modify text files. It operates like Microsoft Windows notepad. The editor is under Applications
> Accessories > gedit Text Editor.
cd and ls
Use these commands to change directories when you navigate the file system and view the contents
of directories. The top-level, or root, directory is indicated by a forward slash (/). If you are on one
branch and need to go elsewhere, you indicate the full path to the new directory you need. One
shortcut when climbing a branch is to use two periods (..) to indicate the previous, or higher
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-13
directory. For example, if you are in the directory /etc, the command cd .. (note the space) moves
you up a level, to the root (/) directory.
___ 1. Move to the directory that has the SmartCloud Provisioning CLI utilities.
cd /iaas/cli
Sometimes, the plain output is not useful, as there are no indicators as to what types of
files you are viewing, or their permissions. Use the long listing to provide more details.
ls -l ..
E
T
T
In a long listing, the first letter indicates whether the name shown is a directory or not. A d
indicates that it is a directory. The next characters are three groups of three letters: r, w,
and x. These letters indicate whether the file is readable, writable, or executable, and by
which group or user. The first triplet indicates permissions that the owner (or user that
created or was assigned the file) owns on the file. The second triplet indicates permissions
for members of the same group as the owner of the file. The third triplet is for the world,
or all users on the system. The owner and group are shown in the following columns. In
the /etc directory, the owner is root and the group that is associated is the root (or super
user) group.
For example, a set of permissions like rwxr-x--- indicate that the owner can read, modify
(write), and execute the file. Members of the group that you see in some of the other
columns can only read, execute, or run the file. Everyone else on the system does not have
permission to the file. You use the chmod, chgroup, and chown commands to modify
permissions, group ownership, and user ownership of files. Use the man pages to explore
these commands if you have time.
___ 4. Do a long listing of the contents of the /etc/ directory. Use the shortcut to indicate move up
a branch, or use the full path.
ll ../../etc
In effect, move up two branches then go down one level to the etc directory. A simpler
way in this case is to use the full path.
ll /etc
Sometimes, you need to find the file that was modified most recently, or last.
___ 5. Use the t and r switches to sort by time in reverse order. The a switch indicates to show
hidden files, or those files that have a leading period. This option is useful when searching
2-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
for a log file, because the most recent log file is typically of concern when
troubleshooting.
ls -altr /etc
cp and mv
The cp (copy), and mv (move) commands are used to duplicate or relocate files on the system. The
move command is also used to rename a file in the current directory.
___ 1. Navigate to the /labfiles directory. Create a subdirectory for use in this set of exercises
with the make directory (mkdir) command.
cd /labfiles
mkdir play
cd play
pwd
E
T
T
The pwd (print working directory) command returns the path in which you are currently
active.
___ 2. Create an empty file. The touch command creates a pointer to a file, but there is nothing in
it.
touch playfile
ls
___ 4. Rename the file or move the first file to another file name.
mv playfile newfile
ls
___ 5. Copy the playfile2 to another directory and verify that it is there.
cp playfile2 /labfiles
ls /labfiles
___ 7. Move the playfile2 from the /labfiles directory to this directory. In the copy and move
commands, a single period (.) indicates to use the current directory as the argument to the
command.
mv /labfiles/playfile2 .
ls
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-15
scp and mv
The secure copy (scp) command operates like the copy command. The additional feature of scp is
the ability to transfer files to other hosts. The command options are always entered in the same
order, with the source first, and the target second.
___ 1. Navigate to the /labfiles/play directory.
cd /labfiles/play
E
T
T
Note that the source is a different machine. The colon (:) indicates the end of the host
name, and the remaining path is the path on that system to locate the file.
___ 3. List the directory contents. The hosts file is on your local system.
ls
tab
In some Linux environments, such as this one, the Tab key performs an autocomplete function. It
finds all possible matches to a command and displays them for you. This feature is useful when you
have long file names or directory structures. In these commands, press the Tab key where you see
<tab>. Observe how the commands are completed for you.
ls /ia<tab>/cli/iaa<tab>-des<tab>-no<tab>
cd /etc/sys<tab><tab>
When there are multiple matches that can complete a command or string, the possibilities are
presented to you. Pressing the tab key twice lists four possible files or directories that start with sys.
If you enter co<tab>, the shell matches only the sysconfig directory and completes it for you.
2-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 2. Use the up arrow cursor key to move back up through your command history.
This feature is useful if you mistype part of a long command. You can retrieve that
command and modify the command line without retyping the entire string. You can also
use Ctrl+r to filter your history that is based on a string and retrieve a command from the
history.
E
T
T
<Ctrl+r>ssh<Enter>
This command retrieves the last command line that is entered with the string ssh in it.
Pressing Enter runs that command. If you want to modify the command first, press the Tab
key when the command is displayed.
vi editor
A text editor is a program that can be used to create and modify text files. One of the most popular
editors on Linux is vi. The editor operates in two modes: insert-text mode and command mode.
To insert new text, enter i. To append text to the current line, use a. When you are in insert-text
mode, all keystrokes are entered as text into the document until you press the Esc key.
The following common vi commands are accessed by pressing the colon (:) key:
x: Delete character
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-17
p: Dump out at current place your last deletion or copy (the paste command)
The key to learning vi is to know the difference between insert-text mode and command mode. In
the latter mode, as its name implies, you issue commands. The characters that you type display on
the screen if you are in insert-text mode, but do not display on the screen while you are in command
mode.
Miscellaneous commands
You might also use the following commands in your work in Linux:
2-18
whoami: This command displays the current user name for your session.
date: The date command returns the system date and time.
control+c: This combination interrupts the current running command. This ability is
useful when a command seems to be nonresponsive or hung.
top: This command shows a runtime view of running processes on the system, the amount
of processor that each is using, and other useful information. While top is running, you can
stop (kill) a process by pressing k, and providing the process ID and the type of interrupt
to send.
|: This symbol is the pipe symbol, entered by typing Shift+\ on the US keyboard, above the
return key. This pipe redirects the output of a command to another command. For
example, you can use the command ps -ef | grep http and you get a list of all the running
processes on the system that have the string http in them. The command example runs the
ps -ef command. Take the output from that command and use it as input to the grep filter,
looking for matches on http.
pwd: As shown earlier, this command prints the current working directory.
ping: This command tests for connectivity to a particular host or IP address. You can use
the -c # option to indicate to send a certain number of packets. For example, ping -c 3
storage-1 sends three packets to the storage-1 host. Otherwise, ping runs until you
interrupt it with Ctrl+C.
*: The asterisk, or star, is a wildcard matching character. For example, ls iaas* lists all
files in the current directory that start with the string iaas.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
In this exercise, you open the HSLT administrative console and familiarize yourself with the
various tabs.
___ 1. Open a web browser and go to the following web page:
http://admconsole:9080/login
The login page will appear.
___ 2. Log in using default user id and password with administrator privileges:
user id: adminuser
password: passw0rd (0 is a zero)
3-1
___ 3.
E
T
T
Click each tab and explore the contents. Click the Accounts and Quotas tab. Notice the
three tabs on the left for Users, Groups, and Access IDs. Click each tab to see the
contents.
___ 4. Notice the toolbar at the top of each of the tabs. Depending on which panel is displayed, it
looks like this example. Position your cursor over each of the icons to see the action that it
performs.
3-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 5. Expand the Actions menu and notice that each icon or button is also available as a menu
item on this menu. Two other options are Export as HTML and Export as CSV. Click
Export to view these two options. Use these options to export the contents of the current
page as either an HTML file or comma-separated values (CSV) file.
___ 6. Select Configure Options.
The contents vary depending on which page it is opened from, but look like this example.
E
T
T
You can use this panel to customize which columns are displayed on the selected page.
___ 7. Notice the filter field on the right side of the toolbar.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-3
This field is a quick search field for matching text anywhere on the page. After a filter is
applied, you use the clear filter option to return to the entire list.
E
T
T
Use the icon with three arrows to the right of the quick filter field to open the Advanced
filter menu. Use the advanced filter to search for various combinations. These options are
available from any of the pages in the console.
3-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 2. Log in using default user id and password that has administrative privileges:
user id: adminuser
At the top of the page, there are menu tabs to access user and administrators functions to
use and manage SmartCloud Provisioning resources.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-5
___ 3. Move your cursor and click on Cloud tab to display the list of menu under that tab. When
you hover your mouse on Cloud tab you will see the description of that tab as shown in
the following example.
___ 4. On the welcome page you can also see Setting up your private cloud section which
consists of shortcut links to access some functions to setup your cloud quickly. Click on
Create users link to open Users page which allows you to manage users as shown in the
following example.
E
T
T
In general all pages are divided into two parts, the left part shows the list of items and the
right part shows information about the selected item.
3-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 5. Click on SCP Administrator (adminuser) and you will see information about that user
on the right panel as shown in the following example.
E
T
T
In the above example, the left panel has a title of Users which describes the purpose of the
panel. The right panel has a title of SCP Administrator which describes information
about that user.
There are also action icons available on each panel. In the above example, Users panel has
a plus sign (+) icon to create a new user while the SCP Administrator panel has two
icons. One is a refresh icon and the other one is a delete icon.
In this case the delete icon is grayed off because this user is a system user which cannot be
deleted.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-7
___ 6. Click on Welcome tab to go back to Welcome page. Expand Working with virtual
systems section to show steps on managing virtual system instances. Below is the
example.
E
T
T
At the bottom right corner, you can also see a light bulb icon. It works as a beacon to
notify that there is a product information update available with the ISCP product that
youve just installed. Below is the example.
___ 7. Click on the light bulb icon at the bottom right corner of ISCP consoles welcome page. It
will open your default web browser and show the latest information about ISCP 2.1.
3-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 2. Click the Accounts and Quotas tab and click the Users tab. Click the Actions menu and
select New User. Alternatively, you can click the New User icon on the action menu bar.
___ 3. Create a user with a user ID of user1 and a password of passw0rd. Confirm the password
and click OK.
Note: You see messages in the message area that indicate that the request was submitted and that
it completed successfully. Remember that this process is two steps to create and register the user.
When you create the user from the HSLT administrative console, both of these steps are performed
and the role of default_user_role is automatically assigned.
___ 4. Create a second user, user2 with password of passw0rd.
___ 5. Click the Access IDs tab.
You see user1 and user2 with their associated access IDs in the list. The new users are
registered and have their IDs.
___ 6. Click the Groups tab. Select New Access Group from the action menu bar or the Actions
menu to create a group.
___ 7. Create a group as follows:
___ a. In the Group field, enter classgroup.
___ b. In the Description field, enter Class GUI Group.
___ c. Under Available Access IDs, select user1. Press and hold the Ctrl key and select
user2. Click the right arrow (>) symbol to move user 1 and user2 from the Available
Access IDs to the Selected Access IDs panel.
___ d. Click OK.
You see the new group in the Group list. You now have a group with two users.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-9
Now you will create the same users and group in ISCP environment using ISCP console.
Note: At the time of writing, there is a defect that user objects in LDAP server are not
automatically associated to the designated group object when users are assigned to group using
HSLT administrative console. You will work around this issue using WebSphere Integrated
Service Console.
___ 8. Open a web browser and go to the following web page:
https://image-library:9043/ibm/console
WebSphere Integrated Service Console will appear as shown below.
E
T
T
3-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 10. Expand Users & Groups section on the left panel and click on Manage Groups link.
All group objects will be displayed as shown in the following example.
E
T
T
___ 12. Then click on Members tab and click on Add Users... button.
___ 13. Click on Search button and choose users that you want to add into the group.
___ 14. Select user1, press and hold Ctrl key and select user2 more than one item. Then click
Add button at the bottom.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-11
Both users will be added into classgroup group as shown in the following example.
E
T
T
___ 15. Click on Manage Groups link on the left panel. Click on classgroup link and click on
Members tab.
The two users have been added into the group as shown in the following example.
Now you are ready to create users and group and assign users to group in ISCP console.
___ 16. Open the ISCP console and log in, if necessary.
___ 17. Click on System tab and click on User Groups.
3-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 18. Click on plus sign (+) at the top right corner of left panel.
___ 19. Create a group as follows:
___ a. In Group name field, enter classgroup.
___ b. In Description field enter Class GUI Group.
___ c. Click on OK button to create the group.
A new group will be created as shown in the following example.
E
T
T
___ 21. Click on plus sign (+) icon in the top right corner of left panel.
___ 22. Create a user as follows:
___ a. In User name field, enter user1.
___ b. In Full name field, enter User One.
___ c. In Email address field, enter user1@tivedu.cloud.com.
___ d. Leave Account type value to LDAP.
___ e. Click on OK button to create the user.
A new user called user1 has been created and listed on the left panel of Users page.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-13
___ 23. Click on User One (user1) item on the left panel of Users page.
The following example shows information about the newly created user.
E
T
T
In the above example you can see that user1 has been automatically assigned to group
classgroup. This happens when you choose LDAP as the authentication method.
___ 24. Create another user called user2 with a full name of User Two and email address of
user2@tivedu.cloud.com.
In the next exercise, you use the GUI to assign resource quotas to this group.
3-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 2. Look for the line that starts with nogroup and insert a line above it.
"quota_enabled":true,
Enter :wq! to save your changes to the file. It has contents similar to this example.
{
"ws_port":5678,
"worker_number":"10",
"ldap":{
"host":"ldap-server",
"port":389,
"rootdn":"cn=admin,dc=isaac,dc=com",
"rootpw":"secret",
"oudn":",ou=user,ou=people,dc=isaac,dc=com",
"datasource":"internal"
},
"quota_enabled":true,
"nogroup":{
"quota":{"instnum":5, "nr_virt_cpu":5, "memory":10240,
"volume":20, "image":20, "eip":1}
E
T
T
___ 3. Note the default settings that are assigned to a user if they are not assigned to a group:
5 instances
5 virtual CPUs
10240 MB RAM
20 images maximum
1 IP address
___ 4. Restart the web service for the change to take effect:
/iaas/webservices/re-run.sh
_
______
| |
/ _____)
| |_____ _____( (____
| (____ (____ |\____ \
| / ___ / ___ |_____) )
|_\_____\_____(______/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IAAS Webservice Bot Re-Run Script Initializing
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-15
Quota Policy: The policy that is used for the quota; a value of either shared or user.
A shared quota means that the quota is shared within the group. User means that the
quota is set for each member of the group.
Memory (MB): The total amount of virtual memory (in MB) for all instances.
Virtual Image Space: The total amount of image space stored (in GB), including
registered and captured images.
E
T
T
You can set one or more quota options. If you do not set an option, the default quota option
is used.
___ 2. Assign the maximum number of deployed VMs to be 2. A value of -1 indicates that there
is no limit for a particular category. Complete this panel as follows:
Deployed VMs: 1
Memory (MB): -1
Volume (GB): -1
You see a message that the quota for the group was successfully modified.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 2. If the administrative console is not open, open it to the following location:
http://admconsole:9080/login
___ 3. Log in with a user ID with administrator privileges, in this case use the default:
user id: adminuser
password: passw0rd (0 is a zero)
E
T
T
___ 5. Click Register Image from either the action bar menu or the Actions menu. Enter the
following information and click OK.
Type: image
Format: raw
Architecture: i386
Disk: virtio
You see a message indicating that the image was registered successfully. It has a status of
Available as displayed in the following example.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-17
Note: If the image status is unavailable, SmartCloud Provisioning might have detected the image
on only one of the storage nodes. It might take a few minutes for the image to be detected on both
storage nodes. You can see where it is located by selecting the virtual image and selecting View
Storage nodes on which the Image is stored from the Actions toolbar.
Now you need to register the same image in ISCP environment using ISCP console.
___ 6. If the SmartCloud Provisioning console is not open, open it to the following location:
https://webconsole
___ 7. Log in with a user ID with administrator privileges, in this case use the default:
user id: adminuser
password: passw0rd (0 is a zero)
___ 8. Click on Catalog tab and choose Virtual Images.
E
T
T
___ 9. On the Virtual Images page, click on plus sign (+) at the top right corner of the left panel.
___ 10. Choose Register an image from a managed cloud group option and select the image
name of rhel61basic which has just been registered through HSLT administrative console.
Tip: If you do not see any virtual image, click on Cloud tab and choose Hypervisors. Click hslt1
and click Quiesce icon to put the hypervisor into quiesce mode and then click Maintenance icon
to put the hypervisor into maintenance mode. Then click Start button to start the hypervisor.
___ 11. Click on Register button to complete the request and click on Close button to close the
window.
___ 12. Back to Virtual Images page, click on rhel61basic image on the left panel to see its
information.
3-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The following example shows the information of a newly created virtual image,
rhel61basic.
E
T
T
If you scroll down the right panel, you see more information, as shown here.
Now the image is available as a virtual image for SmartCloud Provisioning users to deploy
as a VM.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-19
Password: cbadmin
E
T
T
___ 4. Scroll down the right panel until you see Access granted to field.
___ 5. Click the Add more field and enter user1.
A drop-down list is displayed on that field to show the list of users that match the user
name that you entered.
___ 6. Choose User One (user1) from the drop-down list.
User One has access permission to virtual image rhel61basic as displayed in the
following example.
3-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 12. Log out from the SmartCloud Provisioning administrative interface and log in using the
following information:
___ 13. Click the Catalog tab and choose Virtual Image.
___ 14. Click the rhel61basic image on the left panel to show details about that image on the right
panel.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-21
___ 15. On the right panel, click the cloud icon at the upper-right corner to deploy the image in the
cloud.
The following information is displayed.
___ 16. Click Choose General Settings and enter the following information:
Number of VMs: 1
___ 17. Click Configure Software and click Generate SSH keys at the bottom of that section.
E
T
T
___ 18. After the SSH public key field is populated, click the Download SSH private key link.
Save the private key in the secured location.
The private key is used to connect to the new virtual system instances by using SSH
protocol.
___ 19. Leave the remaining fields empty or as they are, and click OK to submit the request.
___ 20. On the successful request submission pop-up window, click OK to continue.
Your virtual system is displayed on the Virtual System Instances page.
___ 21. Wait until the Current status field on the right panel shows The virtual system has been
deployed and is ready to use.
___ 22. Click the refresh icon to get the latest status.
3-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
User: root
A new browser window opens. You can access the command-line interface of your virtual
system.
___ 5. Run any Linux command, like ifconfig eth0, to see the details about the first ethernet
interface.
Now, you learn how to access the system by using a command-line interface.
___ 6. Take note of the IP address of the deployed virtual system on the right panel under the
Virtual machine section of the Virtual System Instances page.
___ 7. Locate the SSH key that you downloaded when you deployed your virtual system
instance. Check the download directory setting of your browser, if necessary.
___ 8. Rename the file to xxx.key and run the following command:
chmod 600 xxx.key
ssh -i xxx.key root@<virtual systems ip address>
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-23
E
T
T
Note: The current design of virtual system deployment to the HSLT cloud group is to use
adminuser as the owner. Even if a typical user deploys a new virtual system, it will still be owned
by adminuser. Therefore, you can only examine resource use of admingroup.
3-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
In this exercise you will define IP group and use that to assign different set of ip addresses to the
default hypervisor.
___ 1. Go to PXE server and open a command prompt by right clicking anywhere in the desktop
and choose Open in Terminal.
___ 2. Go to directory /var/named and execute
vi forward-lookup.db
___ 3. Enter the following information at the bottom of the file with each every element in one
line is separated by tabulator (<tab>).
webserver01<tab>A<tab>172.16.10.1
webserver02<tab>A<tab>172.16.10.2
webserver03<tab>A<tab>172.16.10.3
webserver04<tab>A<tab>172.16.10.4
webserver05<tab>A<tab>172.16.10.5
E
T
T
$ORIGIN 10.16.172.in-addr.arpa.
$TTL 86400; 30 minutes
1<tab><tab><tab>PTR<tab>webserver01.tivedu.cloud.com.
2<tab><tab><tab>PTR<tab>webserver02.tivedu.cloud.com.
3<tab><tab><tab>PTR<tab>webserver03.tivedu.cloud.com.
4<tab><tab><tab>PTR<tab>webserver04.tivedu.cloud.com.
5<tab><tab><tab>PTR<tab>webserver05.tivedu.cloud.com.
Important: Do not forget to add dot (.) at the end of every PTR line.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-25
E
T
T
___ 10. Test the reverse lookup by executing the following command:
nslookup 172.16.10.3
___ 11. Open the IBM SmartCloud Provisioning console and log in, if necessary.
___ 12. Click on Cloud tab and choose IP Groups.
___ 13. On the left panel, click on the plus sign (+) at the top right corner to create a new IP group.
3-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Version: IPv4
Netmask: 255.255.0.0
Gateway: 172.16.0.1
E
T
T
___ 17. Scroll down the right panel until you find IP Addresses: field.
___ 18. In Add range field, enter the following information:
start: 172.16.10.1
end: 172.16.10.5
then click Add link to add those ip addresses into the ip group.
The right panel would look like the following example:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-27
___ 19. Click on show more link to see the last ip address.
___ 20. Click on Cloud and choose Hypervisors.
hslt1 is the default hypervisor that comes with IBM SmartCloud Provisioning 2.1 product.
___ 21. Click on hslt1 to show detail information about that hypervisor on the right panel.
___ 22. Expand Network section and expand default network section. You will see IP group has
a value of HSLT-default. You are going to change this with Web servers ip group.
___ 23. Put hslt1 hypervisor into quiesce mode by clicking on Quiesce icon at the top of the right
panel.
___ 24. Then put hslt1 hypervisor into maintenance mode by clicking on Maintenance icon at the
top of the right panel.
___ 25. Go back to expand Networks section and expand default network section. Change the
value of IP group: to Web servers. The change will be saved automatically.
E
T
T
___ 26. Then put hslt1 hypervisor back into start mode by clicking on Start icon at the top of the
right panel.
Now you are ready to deploy another instance to hslt1 hypervisor, but this time ip address
will be assigned from Web servers ip group.
___ 27. Log out from ISCP console and log in back using user1 user id.
___ 28. Deploy again a new instance using rhel61basic virtual image and you will see that its ip
address will be 172.16.10.1 and its hostname is webserver01.
Below is an example instance deployment using Web servers ip group.
3-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
A new static IP address is created. You remove them again because you use the existing IP
groups for the next steps.
___ 6. Choose the new static IP addresses that you created in the previous steps. Click the minus
(-) icon to delete them.
___ 7. On the confirmation pop-up window, click OK to continue.
Based on the existing IP addresses, give permission to user1 to use one of the IP addresses.
___ 8. Open a terminal window and run the following commands:
cd /iaas/cli
source iaasrc
iaas-modify-address -i 172.16.1.1 -a <user1s access id> -l
database server
user: adminuser
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-29
Important: At the time of writing, you cannot use user1, the typical user, to associate an elastic
IP address to a virtual machine even though the instance is owned by that user. You can use user1
to allocate it, but not associate it. You must use adminuser to do that.
Because every virtual machine that is deployed in HSLT is mapped to adminuser, it becomes the
owner. Therefore, user1 cannot associate its own virtual machine.
___ 10. Click the Cloud tab and choose Elastic IP Addresses to open the elastic IP addresses
window.
___ 11. Click the plus (+) icon to create a new elastic IP address.
___ 12. Enter database server as a value in the Tag field. Click OK to submit the request.
Note: When you create an elastic IP address, that address uses one of the available static IP
addresses that are defined in a high-scale low-touch environment.
E
T
T
The elastic IP address is allocated but not yet attached to any virtual machine.
A new elastic IP address is illustrated in the following example.
___ 13. Click the Associate to a Virtual Machine icon at the upper-right corner of the right panel.
___ 14. Choose the VM that you deployed in Deploying a virtual system instance on page 320 and click OK to submit the request.
The elastic IP address is associated to a virtual system, as shown in the following example.
The ping command gets a response from the machine, which means that the IP address
was assigned correctly.
3-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 16. Run the following command to access the virtual machine by using an elastic IP address:
ssh 172.16.1.1
___ 17. Enter the root password and run the following command to check the real IP address of the
virtual machine:
ifconfig eth0
The following example shows the result of those commands and the real IP address to
which the elastic IP address points.
E
T
T
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-31
E
T
T
3-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
4-1
E
T
T
4-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Capture a VM instance
E
T
T
Lab environment
The lab environment has one PXE (pixie) server, two storage nodes, and at least one compute node.
You perform the tasks in the lab exercises by using the IBM SmartCloud Provisioning console and
terminal sessions on the PXE (pixie) server.
5-1
E
T
T
5-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 4. Click Back to return to the login page, and log in as reguser using passw0rd for the
password.
E
T
T
___ 5. Click Catalog > Virtual Images and observe the images that are available. These images
can be used by the group Everyone, which includes all users on the system.
___ 6. Click the image rhel61compat and notice the detailed information that is listed on the
right side of the window.
___ 7. Position your cursor over the icons to the right of rhel61compat that are available (not
grayed out).
A pop-up message indicates the actions that you can perform, including Refresh, Deploy
in the cloud, Make read-only, and Delete.
___ 8. Click Catalog > Virtual System Patterns and select pat0 to see detailed information
about the pattern.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-3
E
T
T
This introduction to some of the menus, windows, and actions are useful for performing
the remaining exercises for this unit. You also registered a new user for the IBM
SmartCloud Provisioning console that you will use to perform the rest of the exercises in
this unit.
5-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 2. Use the Deploy in cloud action icon to deploy the image.
___ 3. Click Choose General Settings in the pop-up window.
___ a. Enter basicDeploy for the Instance name.
___ b. Enter 1 for the Number of VMs.
___ c. Enter This is a virtual instance of the rhel61basic image for Description.
___ d. Enter rhel61 basic for Tags.
___ e. Select Not persistent from the Persistent instance drop-down menu.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-5
E
T
T
5-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 8. Expand the Virtual machines information and the machine information by clicking the
plus sign by each machine to see more details about the virtual machines.
___ 9. Click Login, enter root for the user name, enter passw0rd for the password, and click
Login.
E
T
T
A session to the machine opens. You can perform preliminary testing before you give the
key file to someone to use with ssh.
___ 10. Issue a few UNIX commands and click the x in the upper right of the session window to
close the session.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-7
E
T
T
___ 2. Use the Deploy in cloud action icon to deploy the image.
___ 3. Click Choose General Settings in the pop-up window and enter the following
information:
___ a. Enter compatDeployIntermediate for the Instance Name.
___ b. Enter 2 for the Number of VMs.
___ c. Enter This creates 2 virtual instances from the rhel61compat image for
Description.
___ d. Enter rhel61 compat for Tags.
5-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 5. Click Generate SSH keys and then click Download SSH private key and save the key to
a file.
The file can be used with ssh to log in to the deployed image, and is stored in the
Downloads directory.
___ 6. Click OK to deploy the virtual images and OK to go to the Virtual System Instances
window.
___ 7. Expand the virtual machines information by clicking the plus sign to see more details
about the virtual machines.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-9
E
T
T
___ 8. Click the red X on the first virtual system in the list to delete one of the virtual machines,
and click OK to the pop-up message.
5-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 6. Click OK to create the disk and select the new disk, and click Attach.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-11
___ 7. Select the VM name in the pop-up window and click OK.
E
T
T
5-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 3. Select Elastic IP Addresses and click the Associate to a Virtual Machine icon.
___ 4. Select a virtual machine from the pop-up menu and click OK.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-13
The status of the Elastic IP address changes to Associated. A new icon is available that
you can use to disassociate from a virtual machine, and the attached virtual machine is
displayed.
E
T
T
You now logged into the virtual machine that you created, by using the Elastic IP address.
The IP address that is shown beside ifconfig is the IP address that is assigned by the
DHCP server of SmartCloud Provisioning. You can ssh to the same machine by using the
address shown in the ifconfig output for eth0.
You have now associated a virtual machine with an elastic IP address and logged into the machine
using that address. If this virtual machine halted, you can deploy the same image could and use the
elastic IP address assigned to it.
5-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
6-1
E
T
T
6-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 3. Click the IBM SmartCloud Provisioning High scale low touch administrative console
tab.
The web address is https://172.16.0.13:9080/login.
___ 4. Log in as adminuser with password passw0rd.
7-1
The pop-up window has the details for the first image to be registered. All of the default
field settings are correct for this image.
___ 7. (Optional) In the Description field, add a description, like Red Hat Basic Image.
___ 8. Click the OK button.
E
T
T
___ 9. Click the Register Image icon and select the rhel61compat image from the Image File
Name list.
All the default settings are valid. You can optionally add a description.
___ 10. Click the OK button.
___ 11. Follow steps 9 and 10 to register the rhel61diff and the rhel61http images.
Four registered images are now displayed in the list.
7-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
To set up the operational repository for HSLT, you must know the IP address or host name of the
webservice virtual machine. In this lab environment, we are using /etc/hosts for name resolution.
___ 4. Open a terminal window (right-click the desktop and select Open in Terminal).
___ 5. In the terminal window, issue the following command:
cat /etc/hosts
___ 6. Note that the IP address of the webservice virtual machine is 172.16.0.11.
Note: In a production environment, /etc/hosts is not a likely host name resolution method. The
webservice virtual machine typically has the host name webservice. You can enter the
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7-3
command ping webservice to find the IP address. Alternatively, you can find the host name in
the /etc/dhcp/dhcp.static file on your first-box machine.
___ 7. In the Virtual Image Library web interface, under the Images tab, perform one of the
following tasks:
Click the Connect to a hypervisor manager and add the related repositories icon.
E
T
T
7-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
In the lower pane of the window, you can see the progress.
The hypervisor manager is discovered and registered, followed by a basic indexing of the
images in the hypervisor. This process can take approximately 10 minutes. After the
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7-5
indexing is complete, you can click the Virtual Images tab to see virtual hardware and
software details for each of the images.
___ 11. Click the Virtual Images tab under All Resources.
___ 12. Click the link for one of the four images.
___ 13. Click the following tabs to see the information that is available on each tab:
Versions
Hardware
Installed Software
E
T
T
Note: 172.16.0.15 is the IP address of the Virtual Image Library server virtual machine.
Alternatively, you can use the host name,
https://image-library.tivedu.cloud.com:9043/ibm/console.
7-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 3. Ensure that the Permanently store this exception check box is selected and click the
Confirm Security Exception button.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7-7
E
T
T
___ 5. In the left pane, select Applications > Application Types > WebSphere Enterprise
Applications.
___ 6. In the Enterprise Applications pane, click ImageManager.
___ 7. In the Detail Properties section, click Security role to user/group mapping.
The Enterprise Applications window opens.
7-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The user, wasadmin, is assigned to all three roles mentioned in the lectures. The wasadmin user ID
is mapped to the adminuser user ID that you are using for most of your activities. The administrator
role includes the Configuration Librarian and the Operator roles. The administrator role can create
users and assign roles to them.
E
T
T
___ 1. In the left pane of the WebSphere Integrated Solutions Console, select Users and Groups
> Manage Users.
The adminuser and wasadmin users are listed.
___ 3. In the Create a User panel, enter the following field values:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7-9
Password: object00
E
T
T
___ 6. In the left pane, select Applications > Application Types > WebSphere Enterprise
Applications.
___ 7. In the Enterprise Applications pane, click ImageManager.
___ 8. In the Detail Properties section, click Security role to user/group mapping.
7-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 9. Select the Administrator check box and click the Map Users button.
___ 10. Click the Search button.
___ 11. Select Administrator from the Available box on the left and click the right arrow button
to move it to the Selected box on the right.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
7-11
E
T
T
___ 14. In the Enterprise Applications panel, click the Save link to save your changes.
___ 15. In the Enterprise Applications panel, click the check box for ImageManager, then click
the Stop button.
___ 16. When the stop is complete, click the check box for ImageManager again, then click the
Start button.
___ 17. When the application as started, log out of the WebSphere Integrated Solutions Console
and close its tab in your browser.
7-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
In this exercise, you log in to the user interfaces that are required during the lab exercises.
___ 1. Open the Firefox web browser on the PXE server, if it is not already open.
Four tabs are displayed.
In these exercises, you use the Virtual Image Library, SmartCloud Provisioning Web console, and
HSLT administrator console. You do not use the Image Construction and Composition Tool in these
exercises.
___ 3. Log in to the Virtual Image Library as adminuser with password passw0rd.
___ 4. Click the third tab, IBM SmartCloud Provisioning Web console.
___ 5. Log in to the SmartCloud Provisioning web console as adminuser with password
passw0rd.
___ 6. Click the second tab, IBM SmartCloud Provisioning administrator console (also
known as the HSLT administrator console).
___ 7. Log in to the HSLT administrator console as adminuser with password passw0rd.
8-1
E
T
T
If the status is correct, skip to the next step. Otherwise follow these steps to correct the
status and synchronize the components.
If the current status is not connected, use the following steps to start the hypervisor:
___ a. Scroll down until you see the Cloud group target field.
___ c. Click the hslt1 hypervisor to display details related to the hypervisor.
___ d. Click the start icon (
___ e. Click Cloud > Cloud Groups and select the HSLT cloud group again.
If the cloud group is not synchronized with the Virtual Image Library, use the following
steps to manually synchronize the cloud group:
Note: If you started the hslt1 hypervisor manually, you must resynchronize the cloud group,
because changes might have been made since the last syncronization.
___ a. Click the synchronize cloud group icon (
the Virtual Image Library.
___ b. Wait until the synchronization completes. Click refresh to monitor the activity.
8-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-3
___ 6. In the content pane, click the Virtual Images tab for the operational repository to display
the images:
rhel61basic
rhel61compat
rhel61diff
rhel61http
E
T
T
___ 7. Scroll to the right. You see that each of the four images are RHEL 6.1 images.
There is no versioning information because these images have not been checked in to the
reference repository yet.
Basic indexing is run for each image when it is discovered. This indexing is done
automatically when the cloud group is registered.
___ 8. Scroll to the right until you see the compatibility status.
The rhel61compat image is the only image that is fully compatible. The other three
images are partially compatible. Youwill remediate the images in a later exercise.
___ 9. Select the rhel61http image and click Actions > Start Full Indexing to perform a full
indexing against the image.
___ 10. Monitor the progress of your request in the Task Progress pane located at the bottom of the
window.
Note: The basic indexing gathers information about the OS and the software (products, rpms,
patches) and stores the results in the Virtual Image Library knowledgebase. Full indexing does
basic indexing and crawls every directory and file in the image to create a comprehensive set
of facts about the image that are also stored in the Virtual Image Library knowledgebase.
8-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 11. Find the rhel61diff image and click Actions > Start Full Indexing to perform a full index
on that image. When the full indexing completes, scroll to the right to verify that the image
is fully indexed.
E
T
T
Note: Since this image is the first one that you are checking in to the reference repository, a new
version chain is created. If there were existing images and version chains, you would have the
option of adding this image to an existing chain.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-5
Note: When an image is checked in to the Reference Repository image library, it performs a full
index on the image, even if a full index has completed. Some amount of time might have elapsed
since that occurred, and any changes are picked up at this time.
___ 4. After the check-in and indexing complete successfully, select Reference Repository in
the navigation pane.
You now see that there is one virtual image in the reference repository.
___ 5. Click the Virtual Images tab in the content pane to see that the virtual image name and
details are listed.
The new icon beside the name indicates that this image is a reference repository image.
E
T
T
Also, notice that the version information is now displayed as version 1.1, which indicates
the first time that the image was checked in to the reference repository.
___ 6. Click the image name, rhel61http, to display the detailed information about the image.
A new tab opens with five subtabs:
8-6
Summary
Versions
Hardware
Installed Software
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 7. Click the Versions tab to see the versioning information tracked by the Virtual Image
Library for each reference repository image.
E
T
T
___ 8. Examine each of the tabs to familiarize yourself with the information that they contain.
___ 9. Perform steps 1 - 7 to check the rhel61compat image in to the reference repository.
Partially Compatible: One or more compatibility checks are not satisfied, and a
remediation action exists for each condition that is not satisfied.
Not Compatible: All compatibility checks are not satisfied. No remediation actions exist.
Unavailable: Compatibility conditions do not exist for this kind of image. The image
compatibility cannot be checked.
In this exercise, you select a partially compatible image and take action to remediate the image.
When complete, the image should be fully compatible. Only images in the reference repository can
be remediated.
___ 1. Select Reference Repository.
___ 2. Click the Virtual Images tab.
___ 3. Click the rhel61http image to display its details.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-7
E
T
T
___ 6. Click the High scale low touch Compatibility Details tab.
You see the compatibility checks that were run against the image and their results. Several
checks failed; for example, the CoudIinit service installed check failed.
___ 7. Click Actions > Make the Image Compatible to remediate the failed checks.
8-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 10. In the Monitor the Task Progress pane, wait until the image is remediated and fully
indexed.
When complete, the new image, rhel61httpcomp, is listed for the reference repository.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-9
___ 11. Click the image and scroll down to verify that its status is Fully Compatible.
E
T
T
The rhel61httpcomp image is a child of the rhel61http image with a new version, v1.2
assigned to it. You created a new image in the reference repository when you created the
rhel61httpcomp image.
Notice the genealogy in the family tree. You started with the rhel61http image in the HSLT
operational repository. Next, you checked the image in to the reference repository. Then, you
remediated the image, creating the rhel61httpcomp image.
8-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
Source Image: <prefilled with the image name that was selected>
Target name: rhel61httpnew (This name can be any name that you want for the
image.)
___ 4. Click OK to check the image out of the reference repository and into the HSLT
environment.
You see progress information in the task progress pane.
Note: When an image is checked out of the reference repository into a HSLT repository, the
image is copied to the storage nodes and automatically registered with the SmartCloud
Provisioning image catalog. After this process completes, it is available as a master image in the
SmartCloud Provisioning environment and can be used to deploy virtual machines.
After the checkout completes, a basic indexing is performed against the image.
___ 5. When the basic indexing completes, click the VM_Services operational repository in the
navigation pane.
___ 6. Click the Virtual Images tab. Verify that the rhel61httpnew image is in the list. Notice
the version is 1.2.1.
___ 7. Click the image to display more details. Notice that the image is Fully Compatible and
the basic indexing is complete.
___ 8. Click the Versions tab.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-11
E
T
T
You started with the rhel61http image in the HSLT operational repository.
You checked the image in to the reference repository using the same name.
___ 10. Open the HSLT administrator console for SmartCloud Provisioning.
___ 11. Click the Virtual Images and Deployed VMs tab.
8-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 4. Clear the quick filter field to display all eight images.
___ 5. Click the advanced filter icon (
).
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-13
Condition: contains
Value: partial
Value: full
E
T
T
You see one image, rhel61basic, matching the criteria. This image is a partially
compatible image that has basic indexing only.
8-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 3. Under Search Options, scroll down to the Search Criteria section and enter the following
information:
___ a. In the Name field, enter rhel.
___ b. Expand the By Software Products section and filter for ncompress.
___ c. Select the ncompress software.
E
T
T
___ d. Scroll to the bottom of the pane and click the Search button to perform the search.
In the Images Search Results in the content pane, you see the search results. There is a tab
for the virtual images that match the search criteria and a second tab for any deployed
virtual machines that match the search criteria. In this case, there is only one RHEL image
that contains the ncompress software, the rhel61diff image.
___ 4. Close the windows that you opened during this exercise by clicking the X on each of the
tabs that you opened.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-15
).
You see a message that rhel61diff was selected and that you must select a second image.
E
T
T
The rhel61diff image is compared to the rhel61http image. The compare function runs,
comparing products for both images.
___ 7. Click all three tabs to see what software products are unique to each image and what
software products are on each image, but different.
In this case, the only difference is the lzo software. It is on rhel61diff only. There are no
other software product differences between these two images.
___ 8. Select Files and click Compare to perform a file comparison between the two images.
8-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. Click all three tabs to see what files are unique to each image and what files are on each
image, but different. In this case, you see the following differences:
Tip: You can run the file comparison because each image is fully indexed.
___ 10. Close the windows that were opened during this exercise by clicking the X on each of the
tabs that you opened.
E
T
T
In this exercise, you use the Virtual Image Library show similar function to compare one image to
all other images and see how similar they are, by percentage.
___ 1. In the navigation pane, select the VM_Services hypervisor.
___ 2. In the content pane, click the Virtual Images tab.
___ 3. Select the rhel61httpnew image and click Actions > Show Similar.
A new tab opens titled Similar to rhel61httpnew. By default, Products is selected for the
similarity check, which means that you are searching for images that contain similar
products to rhel61httpnew.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-17
Note: The similarity column on the far right of the table indicates the similarity percentage for
each of the images or virtual machines in the table. The images are listed in order from most
similar to least similar. In this case, the rhel61diff in the HSLT operational repository is the least
similar image.
___ 4. Click the Files radio button for the view and click the Show Similar button again.
In this case, you receive an error message that indicates that a file-based comparison
cannot be performed because the image is not fully indexed.
___ 5. Click OK to close the error message.
E
T
T
In this exercise, you use the SmartCloud Provisioning web console to display the images in the
Virtual Image Library and look at the image capabilities more closely.
___ 1. Click the SmartCloud Provisioning web console tab in your web browser.
___ 2. Click Catalog > Virtual Images.
You see all virtual images that were registered with the SmartCloud Provisioning image
catalog.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
In this case, the image capability is Intermediate. Intermediate images provide the
capability to run add-ons and script packages by using the scp-cloud-init script configured
to run at boot time of the guest operating system.
___ 5. To change the image capability for the rhel61diff image, select the image and navigate to
the Image Capabilities field.
The rhel61diff image is a basic image.
___ 6. Use the drop-down menu to change the image capability of rhel61diff to Intermediate.
The change is automatically saved. In a typical environment, you have more work to do to
configure the image.
E
T
T
In this exercise, you create a new raw image from an existing image and import the raw image from
local storage into the reference repository.
___ 1. On the PXE server, open a terminal session.
___ 2. Enter the following five commands to copy a raw image from the image library to local
storage:
cd /labfiles/ImageForRegister
scp rhel61basic root@image-library:/home/library/imlib/import
ssh root@image-library
cd /home/library/imlib/import
mv rhel61basic rhel61import.raw
___ 3. Click the Virtual Image Library tab in your web browser.
___ 4. Click Images > Reference Repository.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-19
After the image is imported, a full indexing is automatically run on the new image. The
rhel61import image is also added to the content pane.
Every image in the reference repository has a version associated with it. In this case, the version is
1.1, indicating this is the initial time that the image was checked in to the reference repository.
E
T
T
8-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: For this unit, you start two additional virtual machines in your environment that you
might not have started already. If you have not started them, ensure that the ESX and the
vCenter virtual machines were reset to the Configured for Start snapshot in the VMware
Snapshot Manager, and that they are started to the point where you see a login prompt on each
one.
E
T
T
9-1
E
T
T
___ 7. Confirm that you get a positive response from the ping command.
___ 8. Click the FirstBox virtual machine. Right-click on the desktop background and open a
terminal window.
___ 9. Enter the following command:
ssh image-library
9-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 10. Using the editor of your choice, edit the /etc/hosts file on the image-library machine and
add the following line:
172.16.0.210 vcenter1 vcenter1.tivedu.cloud.com
E
T
T
___ 12. From the image-library command line, enter the following command:
ping vcenter1
___ 13. Confirm a positive response from the ping command and enter Crtl +C to stop it.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-3
E
T
T
___ 3. Select Actions > Add repositories or click the icon Connect to a hypervisor manager
and add the related repositories.
9-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 5. Click the OK button.
You see VMware listed under Operational Repositories.
___ 6. Expand VMware and the entries below it.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-5
E
T
T
The hypervisor manager is discovered and registered, followed by a basic indexing of the images
that are found in the hypervisor. After the indexing is complete, you can click the Virtual Images
tab to see the virtual hardware and software details for each of the images found.
For the VMware hypervisor in the Virtual Image Library interface under the Virtual Images tab,
you can find information about VMware templates only. Information about virtual machines,
running and not running, is under the Deployed VMs tab.
___ 7. Select the VMware operational repository in the left pane.
___ 8. Click the Virtual Images tab in the right pane.
___ 9. Click the link for the rhel62_image1 image.
___ 10. Click the Versions, Hardware, Installed Software and High scale low touch
compatibility details tabs to see what is contained there.
9-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: At the time of writing of this course, the software indexing of SUSE images in VMware
operational repositories is not supported. Therefore, if you click the link for the
sles11_template_1.0.0 image, you do not see any information under the Installed Software
tab.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-7
E
T
T
___ 3. Ensure that the check box for Use Windows session credentials is selected and click the
Login button.
A security warning window is displayed.
___ 4. Click the check box for Install this certificate and do not display any security
warnings for image-library.
Click the Ignore button.
___ 5. Ensure that you are in the Inventory view of VMs and Templates. In the left pane, click to
select the rhel62_image1 template. Click the IBM Virtual Image Library Details tab.
9-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
This window is like the one on the Virtual Image Library interface when you click this image
template. Now, it is displayed through the vSphere client. You can click some of the subtabs to see
the hardware and software details for the template.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-9
___ 7. In the left pane, right-click the rhel62_image1 template and select IBM Virtual Image
Library > Copy to Reference Repository.
E
T
T
This task begins, and its status is reflected in the lower Recent Tasks pane of the vSphere
client.
___ 8. In the top navigation pane of the vSphere client, click the Home link.
9-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. In the top Inventory section, click the IBM Virtual Image Library icon.
E
T
T
You now see the full Virtual Image Library web interface. Notice that you are logged in as
Administrator. The plug-in inherited your login ID from the vSphere client and logged in
with this ID to the Virtual Image Library. Remember that you created the Administrator
user ID and assigned it to the Administrator role in Unit 2.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-11
___ 10. Click the Images tab near the top of the interface.
___ 11. Notice that a full index of the rhel62_image1 image is underway or completed. This task
is automatically initiated as a result of copying the image to the Reference Repository.
E
T
T
9-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
10-1
E
T
T
10-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
11-1
E
T
T
11-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 3. Click the IBM SmartCloud Provisioning High scale low touch administrative console
tab.
The web address is https://172.16.0.13:9080/login.
___ 4. Log in as adminuser with password passw0rd.
12-1
The pop-up window has the details for the first image to be registered. All of the default
field settings are correct for this image.
___ 7. (Optional) In the Description field, add a description, like Red Hat Basic Image.
___ 8. Click the OK button.
E
T
T
___ 9. Click the Register Image icon and select the rhel61compat image from the Image File
Name list.
All the default settings are valid. You can optionally add a description.
___ 10. Click the OK button.
___ 11. Follow steps 9 and 10 to register the rhel61diff and the rhel61http images.
Four registered images are now displayed in the list.
12-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
To set up the operational repository for HSLT, you must know the IP address or host name of the
webservice virtual machine. In this lab environment, we are using /etc/hosts for name resolution.
___ 4. Open a terminal window (right-click the desktop and select Open in Terminal).
___ 5. In the terminal window, issue the following command:
cat /etc/hosts
___ 6. Note that the IP address of the webservice virtual machine is 172.16.0.11.
Note: In a production environment, /etc/hosts is not a likely host name resolution method. The
webservice virtual machine typically has the host name webservice. You can enter the
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-3
command ping webservice to find the IP address. Alternatively, you can find the host name in
the /etc/dhcp/dhcp.static file on your first-box machine.
___ 7. In the Virtual Image Library web interface, under the Images tab, perform one of the
following tasks:
Click the Connect to a hypervisor manager and add the related repositories icon.
E
T
T
12-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 9. Click the OK button.
HSLT is listed under Operational Repositories.
___ 10. Expand HSLT > High scale low touch.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-5
In the lower pane of the window, you can see the progress.
The hypervisor manager is discovered and registered, followed by a basic indexing of the
images in the hypervisor. This process can take approximately 10 minutes. After the
indexing is complete, you can click the Virtual Images tab to see virtual hardware and
software details for each of the images.
E
T
T
___ 11. Click the Virtual Images tab under All Resources.
___ 12. Click the link for one of the four images.
___ 13. Click the following tabs to see the information that is available on each tab:
Versions
Hardware
Installed Software
12-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: 172.16.0.15 is the IP address of the Virtual Image Library server virtual machine.
Alternatively, you can use the host name,
https://image-library.tivedu.cloud.com:9043/ibm/console.
E
T
T
___ 2. Correct this situation by clicking I Understand the Risks, and click Add Exception.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-7
___ 3. Ensure that the Permanently store this exception check box is selected and click the
Confirm Security Exception button.
E
T
T
12-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 5. In the left pane, select Applications > Application Types > WebSphere Enterprise
Applications.
___ 6. In the Enterprise Applications pane, click ImageManager.
___ 7. In the Detail Properties section, click Security role to user/group mapping.
The Enterprise Applications window opens.
E
T
T
The user, wasadmin, is assigned to all three roles mentioned in the lectures. The wasadmin user ID
is mapped to the adminuser user ID that you are using for most of your activities. The administrator
role includes the Configuration Librarian and the Operator roles. The administrator role can create
users and assign roles to them.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-9
Virtual Image Library in Unit 4, the user ID we use in vSphere needs to be known to Virtual Image
Library. We are defining it now to be ready for the connection in Unit 4.
___ 1. In the left pane of the WebSphere Integrated Solutions Console, select Users and Groups
> Manage Users.
The adminuser and wasadmin users are listed.
E
T
T
___ 3. In the Create a User panel, enter the following field values:
Password: object00
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 8. In the Detail Properties section, click Security role to user/group mapping.
The following information is displayed in the Enterprise Applications window.
___ 9. Select the Administrator check box and click the Map Users button.
___ 10. Click the Search button.
The three users are listed.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-11
___ 11. Select Administrator from the Available box on the left and click the right arrow button
to move it to the Selected box on the right.
E
T
T
In the user and group mapping panel, you see the Administrator user ID added under the
Administrator role.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 14. In the Enterprise Applications panel, click the Save link to save your changes.
___ 15. In the Enterprise Applications panel, click the check box for ImageManager, then click
the Stop button.
___ 16. When the stop is complete, click the check box for ImageManager again, then click the
Start button.
E
T
T
___ 17. When the application as started, log out of the WebSphere Integrated Solutions Console
and close its tab in your browser.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-13
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
In this exercise, you log in to the user interfaces that are required during the lab exercises.
___ 1. Open the Firefox web browser on the PXE server, if it is not already open.
Four tabs are displayed.
In these exercises, you use the Virtual Image Library, SmartCloud Provisioning Web console, and
HSLT administrator console. You do not use the Image Construction and Composition Tool in these
exercises.
___ 3. Log in to the Virtual Image Library as adminuser with password passw0rd.
___ 4. Click the third tab, IBM SmartCloud Provisioning Web console.
___ 5. Log in to the SmartCloud Provisioning web console as adminuser with password
passw0rd.
___ 6. Click the second tab, IBM SmartCloud Provisioning administrator console (also
known as the HSLT administrator console).
___ 7. Log in to the HSLT administrator console as adminuser with password passw0rd.
13-1
E
T
T
If the status is correct, skip to the next step. Otherwise follow these steps to correct the
status and synchronize the components.
If the current status is not connected, use the following steps to start the hypervisor:
___ a. Scroll down until you see the Cloud group target field.
___ c. Click the hslt1 hypervisor to display details related to the hypervisor.
___ d. Click the start icon (
___ e. Click Cloud > Cloud Groups and select the HSLT cloud group again.
If the cloud group is not synchronized with the Virtual Image Library, use the following
steps to manually synchronize the cloud group:
Note: If you started the hslt1 hypervisor manually, you must resynchronize the cloud group,
because changes might have been made since the last syncronization.
___ a. Click the synchronize cloud group icon (
the Virtual Image Library.
___ b. Wait until the synchronization completes. Click refresh to monitor the activity.
13-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-3
___ 6. In the content pane, click the Virtual Images tab for the operational repository to display
the images:
rhel61basic
rhel61compat
rhel61diff
rhel61http
E
T
T
___ 7. Scroll to the right. You see that each of the four images are RHEL 6.1 images.
There is no versioning information because these images have not been checked in to the
reference repository yet.
Basic indexing is run for each image when it is discovered. This indexing is done
automatically when the cloud group is registered.
___ 8. Scroll to the right until you see the compatibility status.
The rhel61compat image is the only image that is fully compatible. The other three
images are partially compatible. Youwill remediate the images in a later exercise.
___ 9. Select the rhel61http image and click Actions > Start Full Indexing to perform a full
indexing against the image.
___ 10. Monitor the progress of your request in the Task Progress pane located at the bottom of the
window.
Note: The basic indexing gathers information about the OS and the software (products, rpms,
patches) and stores the results in the Virtual Image Library knowledgebase. Full indexing does
basic indexing and crawls every directory and file in the image to create a comprehensive set
of facts about the image that are also stored in the Virtual Image Library knowledgebase.
13-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 11. Find the rhel61diff image and click Actions > Start Full Indexing to perform a full index
on that image. When the full indexing completes, scroll to the right to verify that the image
is fully indexed.
E
T
T
Note: Since this image is the first one that you are checking in to the reference repository, a new
version chain is created. If there were existing images and version chains, you would have the
option of adding this image to an existing chain.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-5
Note: When an image is checked in to the Reference Repository image library, it performs a full
index on the image, even if a full index has completed. Some amount of time might have elapsed
since that occurred, and any changes are picked up at this time.
___ 4. After the check-in and indexing complete successfully, select Reference Repository in
the navigation pane.
You now see that there is one virtual image in the reference repository.
___ 5. Click the Virtual Images tab in the content pane to see that the virtual image name and
details are listed.
The new icon beside the name indicates that this image is a reference repository image.
E
T
T
Also, notice that the version information is now displayed as version 1.1, which indicates
the first time that the image was checked in to the reference repository.
___ 6. Click the image name, rhel61http, to display the detailed information about the image.
A new tab opens with five subtabs:
13-6
Summary
Versions
Hardware
Installed Software
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 7. Click the Versions tab to see the versioning information tracked by the Virtual Image
Library for each reference repository image.
E
T
T
___ 8. Examine each of the tabs to familiarize yourself with the information that they contain.
___ 9. Perform steps 1 - 7 to check the rhel61compat image in to the reference repository.
Partially Compatible: One or more compatibility checks are not satisfied, and a
remediation action exists for each condition that is not satisfied.
Not Compatible: All compatibility checks are not satisfied. No remediation actions exist.
Unavailable: Compatibility conditions do not exist for this kind of image. The image
compatibility cannot be checked.
In this exercise, you select a partially compatible image and take action to remediate the image.
When complete, the image should be fully compatible. Only images in the reference repository can
be remediated.
___ 1. Select Reference Repository.
___ 2. Click the Virtual Images tab.
___ 3. Click the rhel61http image to display its details.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-7
E
T
T
___ 6. Click the High scale low touch Compatibility Details tab.
You see the compatibility checks that were run against the image and their results. Several
checks failed; for example, the CoudIinit service installed check failed.
___ 7. Click Actions > Make the Image Compatible to remediate the failed checks.
13-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 10. In the Monitor the Task Progress pane, wait until the image is remediated and fully
indexed.
When complete, the new image, rhel61httpcomp, is listed for the reference repository.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-9
___ 11. Click the image and scroll down to verify that its status is Fully Compatible.
E
T
T
The rhel61httpcomp image is a child of the rhel61http image with a new version, v1.2
assigned to it. You created a new image in the reference repository when you created the
rhel61httpcomp image.
Notice the genealogy in the family tree. You started with the rhel61http image in the HSLT
operational repository. Next, you checked the image in to the reference repository. Then, you
remediated the image, creating the rhel61httpcomp image.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
Source Image: <prefilled with the image name that was selected>
Target name: rhel61httpnew (This name can be any name that you want for the
image.)
___ 4. Click OK to check the image out of the reference repository and into the HSLT
environment.
You see progress information in the task progress pane.
Note: When an image is checked out of the reference repository into a HSLT repository, the
image is copied to the storage nodes and automatically registered with the SmartCloud
Provisioning image catalog. After this process completes, it is available as a master image in the
SmartCloud Provisioning environment and can be used to deploy virtual machines.
After the checkout completes, a basic indexing is performed against the image.
___ 5. When the basic indexing completes, click the VM_Services operational repository in the
navigation pane.
___ 6. Click the Virtual Images tab. Verify that the rhel61httpnew image is in the list. Notice
the version is 1.2.1.
___ 7. Click the image to display more details. Notice that the image is Fully Compatible and
the basic indexing is complete.
___ 8. Click the Versions tab.
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-11
E
T
T
You started with the rhel61http image in the HSLT operational repository.
You checked the image in to the reference repository using the same name.
___ 10. Open the HSLT administrator console for SmartCloud Provisioning.
___ 11. Click the Virtual Images and Deployed VMs tab.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 4. Clear the quick filter field to display all eight images.
___ 5. Click the advanced filter icon (
).
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-13
Condition: contains
Value: partial
Value: full
E
T
T
You see one image, rhel61basic, matching the criteria. This image is a partially
compatible image that has basic indexing only.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 3. Under Search Options, scroll down to the Search Criteria section and enter the following
information:
___ a. In the Name field, enter rhel.
___ b. Expand the By Software Products section and filter for ncompress.
___ c. Select the ncompress software.
E
T
T
___ d. Scroll to the bottom of the pane and click the Search button to perform the search.
In the Images Search Results in the content pane, you see the search results. There is a tab
for the virtual images that match the search criteria and a second tab for any deployed
virtual machines that match the search criteria. In this case, there is only one RHEL image
that contains the ncompress software, the rhel61diff image.
___ 4. Close the windows that you opened during this exercise by clicking the X on each of the
tabs that you opened.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-15
).
You see a message that rhel61diff was selected and that you must select a second image.
E
T
T
The rhel61diff image is compared to the rhel61http image. The compare function runs,
comparing products for both images.
___ 7. Click all three tabs to see what software products are unique to each image and what
software products are on each image, but different.
In this case, the only difference is the lzo software. It is on rhel61diff only. There are no
other software product differences between these two images.
___ 8. Select Files and click Compare to perform a file comparison between the two images.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. Click all three tabs to see what files are unique to each image and what files are on each
image, but different. In this case, you see the following differences:
Tip: You can run the file comparison because each image is fully indexed.
___ 10. Close the windows that were opened during this exercise by clicking the X on each of the
tabs that you opened.
E
T
T
In this exercise, you use the Virtual Image Library show similar function to compare one image to
all other images and see how similar they are, by percentage.
___ 1. In the navigation pane, select the VM_Services hypervisor.
___ 2. In the content pane, click the Virtual Images tab.
___ 3. Select the rhel61httpnew image and click Actions > Show Similar.
A new tab opens titled Similar to rhel61httpnew. By default, Products is selected for the
similarity check, which means that you are searching for images that contain similar
products to rhel61httpnew.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-17
Note: The similarity column on the far right of the table indicates the similarity percentage for
each of the images or virtual machines in the table. The images are listed in order from most
similar to least similar. In this case, the rhel61diff in the HSLT operational repository is the least
similar image.
___ 4. Click the Files radio button for the view and click the Show Similar button again.
In this case, you receive an error message that indicates that a file-based comparison
cannot be performed because the image is not fully indexed.
___ 5. Click OK to close the error message.
E
T
T
In this exercise, you use the SmartCloud Provisioning web console to display the images in the
Virtual Image Library and look at the image capabilities more closely.
___ 1. Click the SmartCloud Provisioning web console tab in your web browser.
___ 2. Click Catalog > Virtual Images.
You see all virtual images that were registered with the SmartCloud Provisioning image
catalog.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
In this case, the image capability is Intermediate. Intermediate images provide the
capability to run add-ons and script packages by using the scp-cloud-init script configured
to run at boot time of the guest operating system.
___ 5. To change the image capability for the rhel61diff image, select the image and navigate to
the Image Capabilities field.
The rhel61diff image is a basic image.
___ 6. Use the drop-down menu to change the image capability of rhel61diff to Intermediate.
The change is automatically saved. In a typical environment, you have more work to do to
configure the image.
E
T
T
In this exercise, you create a new raw image from an existing image and import the raw image from
local storage into the reference repository.
___ 1. On the PXE server, open a terminal session.
___ 2. Enter the following five commands to copy a raw image from the image library to local
storage:
cd /labfiles/ImageForRegister
scp rhel61basic root@image-library:/home/library/imlib/import
ssh root@image-library
cd /home/library/imlib/import
mv rhel61basic rhel61import.raw
___ 3. Click the Virtual Image Library tab in your web browser.
___ 4. Click Images > Reference Repository.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13-19
After the image is imported, a full indexing is automatically run on the new image. The
rhel61import image is also added to the content pane.
Every image in the reference repository has a version associated with it. In this case, the version is
1.1, indicating this is the initial time that the image was checked in to the reference repository.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: For this unit, you start two additional virtual machines in your environment that you
might not have started already. If you have not started them, ensure that the ESX and the
vCenter virtual machines were reset to the Configured for Start snapshot in the VMware
Snapshot Manager, and that they are started to the point where you see a login prompt on each
one.
E
T
T
14-1
E
T
T
___ 7. Confirm that you get a positive response from the ping command.
___ 8. Click the FirstBox virtual machine. Right-click on the desktop background and open a
terminal window.
___ 9. Enter the following command:
ssh image-library
14-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 10. Using the editor of your choice, edit the /etc/hosts file on the image-library machine and
add the following line:
172.16.0.210 vcenter1 vcenter1.tivedu.cloud.com
E
T
T
___ 12. From the image-library command line, enter the following command:
ping vcenter1
___ 13. Confirm a positive response from the ping command and enter Crtl +C to stop it.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14-3
E
T
T
___ 3. Select Actions > Add repositories or click the icon Connect to a hypervisor manager
and add the related repositories.
14-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 5. Click the OK button.
You see VMware listed under Operational Repositories.
___ 6. Expand VMware and the entries below it.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14-5
E
T
T
The hypervisor manager is discovered and registered, followed by a basic indexing of the images
that are found in the hypervisor. After the indexing is complete, you can click the Virtual Images
tab to see the virtual hardware and software details for each of the images found.
For the VMware hypervisor in the Virtual Image Library interface under the Virtual Images tab,
you can find information about VMware templates only. Information about virtual machines,
running and not running, is under the Deployed VMs tab.
___ 7. Select the VMware operational repository in the left pane.
___ 8. Click the Virtual Images tab in the right pane.
___ 9. Click the link for the rhel62_image1 image.
___ 10. Click the Versions, Hardware, Installed Software and High scale low touch
compatibility details tabs to see what is contained there.
14-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: At the time of writing of this course, the software indexing of SUSE images in VMware
operational repositories is not supported. Therefore, if you click the link for the
sles11_template_1.0.0 image, you do not see any information under the Installed Software
tab.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14-7
E
T
T
___ 3. Ensure that the check box for Use Windows session credentials is selected and click the
Login button.
A security warning window is displayed.
___ 4. Click the check box for Install this certificate and do not display any security
warnings for image-library.
Click the Ignore button.
___ 5. Ensure that you are in the Inventory view of VMs and Templates. In the left pane, click to
select the rhel62_image1 template. Click the IBM Virtual Image Library Details tab.
14-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
This window is like the one on the Virtual Image Library interface when you click this image
template. Now, it is displayed through the vSphere client. You can click some of the subtabs to see
the hardware and software details for the template.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14-9
___ 7. In the left pane, right-click the rhel62_image1 template and select IBM Virtual Image
Library > Copy to Reference Repository.
E
T
T
This task begins, and its status is reflected in the lower Recent Tasks pane of the vSphere
client.
___ 8. In the top navigation pane of the vSphere client, click the Home link.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. In the top Inventory section, click the IBM Virtual Image Library icon.
E
T
T
You now see the full Virtual Image Library web interface. Notice that you are logged in as
Administrator. The plug-in inherited your login ID from the vSphere client and logged in
with this ID to the Virtual Image Library. Remember that you created the Administrator
user ID and assigned it to the Administrator role in Unit 2.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14-11
___ 10. Click the Images tab near the top of the interface.
___ 11. Notice that a full index of the rhel62_image1 image is underway or completed. This task
is automatically initiated as a result of copying the image to the Reference Repository.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
15-1
E
T
T
15-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
16-1
E
T
T
16-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 1. If you are not logged in to the SmartCloud Provisioning interface, open a browser window
to the following address:
https://<workload_deployer_ip_address>
where the workload deployer IP address is the address of the virtual machine for the
workload deployer component. This address is in the /etc/hosts file on the first box
machine. In the lab environment, the address is 172.16.0.12.
Password: passw0rd
17-1
This report provides information about the percent of the processor that is being used for
each hypervisor.
___ 5. Click the From field to change the date range and time for the report.
Because there is no activity in the lab environment, the report data is minimal; however,
you can see how you can customize the report ranges. By default, the last 30 days of data
are displayed. Change the range to a 24-hour time period, for example 8/12/2012 - 8/13/
2012, as shown in the following example and click Update Reports.
E
T
T
Notice that the x-axis values are changed from daily to hourly values.
Note: If you change the time period to one for which there is no data, the data points on the
graph do not change. If the new time requested is outside of the time that the product was
running, the data points on the graph do not change.
Note: Data on the timeline of this graph is averaged to fit into the chart. There are always 10
data points and if the timeline is longer, then the data is averaged into those 10 data points.
Therefore, every time point does not have a dot on the X axis. Every point on the X axis is not
necessarily a specific point in time.
Average values are displayed by default.
___ 6. To see the maximum values, click Maximum. Because there is no machine activity in the
lab environment, the graph does not change. However, you can see how the report
function works.
___ 7. Open each of the other reports to take a look at the information they provide. Click CPU
Usage by Virtual Machine.
17-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This report provides information about the percentage of the processor that is being used
for each virtual machine. The amount of virtual processor that is available for a virtual
machine is defined when the virtual machine is added to a pattern.
___ 8. Click Memory Usage by Hypervisor.
This report provides information about the percentage of the memory that is being used for
each hypervisor.
___ 9. Click Memory Usage by Virtual Machine to open that report.
This report provides information about the percentage of the memory that is being used for
each virtual machine. The amount of virtual memory that is available for a virtual machine
is defined when the virtual machine is added to a pattern. The list of virtual machines is
sorted to ensure that virtual machines from the same virtual system instance are listed
together.
___ 10. Scroll to the bottom and notice that all running virtual machines are displayed by default.
Use the check boxes beside the virtual instances to remove specific virtual machine
instances from the report.
E
T
T
The Storage Usage by Device report provides information about the percentage of storage
that is being used. Storage is defined for each hypervisor.
___ 12. Click IP Usage in the Cloud.
The IP Usage in the Cloud report provides information about the percentage of the IP
address that is being used.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17-3
E
T
T
___ 2. As with the machine activity reports, choose a date range and change it. In this case, you
do not have the option to filter the specific users that are included.
___ 3. Click the Download filtered data button.
You can open the file or save the data in a comma separated (.csv) file to use in a
spreadsheet or other application.
17-4
Configuration changes
User authentication
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
For each event, the collected information identifies the user who initiated the operation and whether
it succeeded. SmartCloud Provisioning makes this audit data available for download in the form of
event records.
The SmartCloud Provisioning event log stores the event records that contain audit data. To
download the records, you can use any of the following interfaces:
User interface
Command-line interface
Direct calls to the REST API (SmartCloud Provisioning provides sample scripts that you
can customize and run with a job scheduler to automate download of audit data on a
regular basis.)
E
T
T
After you download records from the log and store them in your own archives, you must delete
those same records from the log. Otherwise, when the log reaches a preset capacity limit,
SmartCloud Provisioning suspends the auditing function until storage is available. You can use the
user interface to monitor storage use of the auditing function. When use is near 90%, you clean the
audit log storage.
Tip: Designate one individual with full auditing permissions to download audit data, archive it
to external storage, and delete it from the Workload Deployer component machine as a routine
process.
You must have the Auditor role with full permissions or the Auditor role with read-only
permission to view audit data.
___ 1. In the SmartCloud Provisioning user interface, click System > Auditing. Expand the
Download section.
This section provides the option to either download all data or filtered data in which you
specify both a time frame filter and the number of records that you want to retrieve. In this
exercise, you download all data.
___ 2. Select Download all data and specify the maximum number of records to receive in the
Maximum Event log size field.
You can specify up to 20,000 records. If you type a greater value in the field, the product
automatically adheres to the maximum of 20,000 and writes 20,000 records to the
compressed file that you download. Because you are looking at an example of the audit
data, specify 10 in the maximum event log size field.
___ 3. Click Download and select Open with Archive manager (the default).
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17-5
You see the contents of the file audit.zip. It can contain up to the following four files,
depending on whether you migrated from a previous version of SmartCloud Provisioning:
appliance-audit.csv: You receive this file if you migrated from a previous version of
the product. The file contains all the audit data that was logged by the product before
your migration.
license-audit.csv: This file is empty because you are not monitoring license use in this
environment.
pvu-audit.csv: This file is empty because you are not monitoring processor value unit
usage in this environment.
___ 4. Double-click the audit-events.zip file to see the contents of that file:
audit-events.csv: This file contains the audit event records that you specified for
download by using the user interface.
audit-events-record-IDs
audit-events-signed-record-IDs
E
T
T
Note: The last two files contain information that you must have to delete the audit data in a
separate exercise.
___ 5. Double-click on the audit-events.csv file.
This file is the one that contains the audit data in comma-separated format. The first eight
comma-separated elements of every record are values for the common attributes for all
event records. Within each record, the values for these common attributes are followed by
attribute name-value pairs that can vary from record to record. The contents of the auditevent.csv file look like the following example.
___ 6. See the SmartCloud Provisioning Users Guide for information about the name value pairs
for the events. Click on the X in the upper right corner of the window to close it. Extract
17-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
the files for use in a later exercise. Click Extract at the top of the Archive Manager
window.
E
T
T
___ 7. Select File System on the left, tmp from the list of file systems, and Extract from the
bottom of the Extract window.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17-7
Event record: A record that contains audit data for a security or administrative event. One
record corresponds with each event.
Event log: SmartCloud Provisioning storage that is dedicated to archiving audit data.
E
T
T
Note: When audit data storage reaches a preset capacity limit, SmartCloud Provisioning
suspends collection of audit data until the storage resources are available. Delete audit data
from the event log immediately after you download the data and archive it.
You must have the Auditor role with full permissions or Auditor role with read-only permission
to view the status of audit data storage in the user interface.
___ 1. In the SmartCloud Provisioning user interface, click System > Auditing.
___ 2. Expand General Status. Note the read-only field Maximum event log size.
The value of 2500000 records is the maximum number of event records that can be stored
in the event log at one time.
___ 3. Check the Current event log utilization field.
You see the percentage of the event log that is currently used to store event records. When
that percentage approaches 90%, you need to clean the event log.
Note: When the current event log utilization value exceeds 90%, you see the following text:
Continue operation with event auditing temporarily disabled. This message indicates that
SmartCloud Provisioning suspended collection of audit data until storage is available. Typical
operation of the rest of the product continues.
17-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The auditDelete.sh script is located in the deployer.cli samples library. You must download and
configure the .cli file to run the script.
___ 1. From the SmartCloud Provisioning user interface, select Welcome and click the
Download command-line tools link.
___ 2. Select Save File and click OK to save the .zip file.
E
T
T
___ 5. Set JAVA_HOME to point to the Java home directory. In this environment, this directory
is usr/lib/jvm/java-1.6.0. Type the following commands to set JAVA_HOME:
export JAVA_HOME=/usr/lib/jvm/java-1.6.0
echo $JAVA_HOME
Note: Java Runtime Environment (JRE), version 6 is required on the machine on which the
command-line interface is to be run.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17-9
___ 6. To run cli commands, you must retrieve the key file for your user ID. Open a new browser
window and enter the following address:
/<your_workload_deployer_server>/resources/userKeys/
where <your_workload_deployer_server> is the host name or IP address of the workload
deployer virtual machine.
In this environment, you use the following address:
172.16.0.12/resources/userKeys
Note: The workload-deployer IP address is in the /etc/hosts file on the pxe server machine.
___ 7. Complete the following steps to save the userKeys file as a .json file in the same directory
that the auditDelete.sh script is executed from:
___ a. Select File >Save Page As from the web browser toolbar
E
T
T
___ 8. To run auditDelete.sh, it must be in the same directory as the cli commands and the
userkey file. Copy it to that directory using the cp command:
cp /deployer/cli/samples/auditDelete.sh /deployer.cli/lib/3.1.0.1-20120802095022/
deployer/auditDelete.sh
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. To run auditDelete.sh, you must change the permissions to run the script as follows:
cd deployer.cli/lib/3.1.0.1-20120802095022/deployer
chmod 755 auditDelete.sh
___ 10. The auditDelete.sh script calls the shell script cscurl.sh,so you must change the
permissions for that script as well.
chmod 755 cscurl.sh
___ 11. Run auditDelete.sh to delete the audit record that you downloaded in an earlier exercise.
The command syntax is as follows:
sh ./auditDelete.sh username=adminuser password=passw0rd
keyfile=userKeys.json IWD=172.16.0.8 map=/tmp/audit-events-recordIDs hash=/tmp/audit-events-signed-record-IDs
Note: The period and forward slash (./) indicate that the script you are running is in the current
directory. If you leave the deployer.cli/samples directory, you must include the full path name
when you run the script or cd back to that directory.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17-11
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the Virtual Image Library function to make a virtual image high-speed low-touch
(HSLT) compatible
For this set of exercises, you need the virtual image, rhel61basic. To use the HSLT cloud group,
you must copy this image to the two storage nodes and register it to HSLT and SmartCloud Provisioning.
E
T
T
When the copy is complete, repeat the process to copy the image to storage-2:
rsync -avS rhel61basic storage-2:/iaas/iaas-store/files
___ 2. After the image is on both storage nodes, use the HSLT administrative console to register
the virtual image to HSLT. Open a browser window to the console by using the format,
http://<adminconsole_ip-address>:9080/adminconsole, as follows:
http://172.16.0.13:9080/adminconsole
Log in as the default_admin_role:
Password: passw0rd
___ 3. Click the Virtual Images and Deployed VMs tab to register the image. Click the Virtual
Images tab, and click the Register image icon.
___ 4. Complete the panel with the following information:
Format: raw
18-1
Type: image
Architecture: x86_64
Platform: linux
Disk: ide
Leave the Enable virtio and XEN hypervisor check boxes cleared.
___ 5. Click OK to submit the request.
A message is displayed in the message area indicating that the request was submitted. A
second message indicates that the image was successfully registered.
Note: If the image status indicates that information about the request is unavailable, it typically
means that the scanning process has not yet found the image on both storage nodes. Wait a few
minutes and refresh the window to show it as available.
E
T
T
___ 6. Log in to the SmartCloud Provisioning interface with the default administrative ID
credentials:
Password: passw0rd
___ 7. Click Cloud > Cloud Groups. Select the HSLT cloud group in the left pane to view the
details about this cloud group. Check the information in the Current status and
Synchronization status fields.
18-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 8. If the current status is Connected, as in this environment, you can skip this step. For
demonstration purposes, the following process is used if the current status is Not
Connected:
___ a. Click Cloud > Hypervisors and select the hslt1 hypervisor in the left pane.
___ b. Click the Start icon.
___ c. Return to the Cloud Groups panel and verify that the cloud group is now Connected,
as shown in the following example.
___ 9. If the synchronization status indicates that synchronization with the Virtual Image Library
succeeded, you can skip this step. If the synchronization status does not indicate that
synchronization with the Virtual Image Library succeeded, as seen here, click the Register
to Virtual Image Library icon.
E
T
T
When the process completes, the synchronization status indicates that synchronization
with the Virtual Image Library succeeded.
Note: This process might take a few minutes to complete, and you might need to refresh the
panel to see the status update.
___ 10. When the synchronization is complete, click the IBM Virtual Image Library tab in the
browser.
The Virtual Image Library UI opens in a new browser window. If you need to log in, use
the User ID adminuser and password passw0rd.
Click Images and Operational Repositories to open the Operational Repositories view.
___ 11. Click the Virtual Images tab and find the rhel61basic image. Scroll to the right to see the
information that is known about the virtual image, including the indexing status of Basic
indexing complete.
___ 12. After the basic indexing of the image is complete, return to the SmartCloud Provisioning
user interface and click Catalog >Virtual Images to register the rhel6basic image with
SmartCloud Provisioning. Click the Add new virtual image icon and complete the
Register Virtual Image window as follows:
___ a. Select Register an image from a managed cloud group.
___ b. Select the HSLT cloud group.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-3
___ c. Select the rhel61basic image. Notice the capabilities level of Basic.
E
T
T
When the operation completes, Click Close to close this window. You will see the rhel61basic
image in the Virtual Images list.
18-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Comments: <empty>
E
T
T
___ 3. Click the Virtual Images tab in the right pane to see all images that are in the Reference
Repository. Locate the rhel61basic image and click the image name.
A new tab containing details about this image is displayed, like the following example.
Scroll to the bottom of the window to see the High Scale Low Touch Compatibility which
indicates that the image is partially compatible.
___ 4. Select the High Scale Low Touch Compatibility Details tab to see the checks that were
performed on the image and the status of each of the compatibility checks (Passed or Not
Passed). Because you use this image in the HSLT cloud group, you must make it fully
compatible.
From the Actions menu, select Make the Image Compatible.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-5
Source image: rhel61basic - read-only field containing the image name you are
working with
New Reference Image Name: rhel61bcompat - this is any unique image name of your
choice
Version Chain: Select Connect to rhel61basic - this will keep this image connected to
the basic image that we started with in the reference repository for tracking purposes
Click OK to start the process. You will see a message showing the status of the
operation.
Once the process completes, the image will be fully indexed to update the changes in the
reference repository.
___ 6. A message is displayed with the status of the operation. After the check-in and indexing
are complete, click the Images tab. You see the rhel61bcompat image with a version
number of 1.2.
E
T
T
Select the image name to open the Detail view and verify that the High Scale Low Touch
compatibility indicates that it is Fully compatible.
Note: To use add-ons, the virtual image must be fully compatible with HSLT and must be able
to run the following commands on the image: awk, chmod, cat, curl, find, mkfs, parted, sed,
ok, unzip.
After the new virtual image is created, it can be checked out to an Operational Repository for use
in the cloud.
___ 1. From the Virtual Image Library Reference Repository panel, select the rhelbcompat
image that you created. Click the icon to Copy a virtual image operational repository.
Complete this panel with the following information:
18-6
Source image: rhel61bcompat (read-only field that contains the name of the selected
image)
Target name: rhel61bcompat (name for the virtual image in the HSLT environment)
Location: High_scale_low_touch
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Comments: <optional>
You can make the image compatible with high-scale low-touch hypervisor managers now;
however, this step is already completed.
You see the status of this process in the message area at the bottom of the window.
Note: The image is copied to the HSLT storage nodes and registered with the HSLT hypervisor
manager. After the process completes, the Virtual Image Library detects the new image during
the update interval, and the image is added to the operational repository. When the image is
added to the operational repository and basic indexing is complete, the image is available for
deployment in the cloud.
E
T
T
The image is unavailable until it is fully copied to and detected on both storage nodes in the HSLT
environment. The Virtual Image Library might attempt to index the image before it is available. If
it does, the index operation fails. After the image state is available, the basic index process
completes successfully. You can monitor the image status from the HSLT administrative console.
___ 2. Click the Images tab in the Virtual Image Library UI. Click Operational Repositories to
open the Operational Repositories view. Click the Virtual Images tab in the Operational
Repository.
___ 3. When the image is discovered, you see it in the virtual image list. In the message area, you
see the status of the Basic Index process.
Note: You might need to refresh the display to see the image.
___ 4. Before the image can be deployed, you must register it to SmartCloud Provisioning. To
register the image, return to the SmartCloud Provisioning User Interface window and
select Catalog > Virtual Images.
Ensure that HSLT is selected, and click the icon to Add a New Virtual Image.
Complete the Add a New Virtual Image panel as follows:
Click Register.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-7
___ 5. The rhel61bcompat image is added to the Virtual Images list and is available for use in
virtual system patterns.
E
T
T
The list is empty because you did not build any patterns yet. Select New to add a new
pattern.
Complete the new pattern panel as follows:
Description: pattern with userid add on (a more detailed description of the pattern
that you are adding)
Click OK.
___ 7. The new pattern is created, but currently has no parts. To add parts to the pattern, click the
edit icon to open the pattern editor.
The left pane of the pattern editor contains the parts that you can use to create a pattern.
___ 8. Drag the rhel61bcompat image from the left panel and drop it onto the right panel to
create a pattern.
18-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 9. Expand the Add-ons section on the left by clicking the Add-ons title bar. The four default
add-ons are displayed.
Click the Default Add User add-on and drag it on top of the rhel61bcompat icon in the
right panel. The Add User add-on will be run on the rhel61bcompat image when this
pattern is deployed in the cloud.
___ 10. Click the properties icon in the right pattern pane for the rhel61bcompat image, as shown
in the following example.
E
T
T
Note: The padlock symbols beside each of the properties indicate that the properties are
locked. The administrator can lock the property so that it cannot be changed when the pattern
is deployed. In this case, no properties are locked, which makes them default values that can be
changed when the pattern is deployed. If you want to require any of the values to be set at
deployment time, you keep the default settings.
___ 12. Click the icon to edit the parameters for the Userid add-on.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-9
___ 14. The simple pattern is complete and ready for deployment.Click Done Editing to save the
new pattern.
___ 15. By default, only the pattern creator has authority to deploy the pattern. In this case, you
give everyone permission to deploy the pattern by adding Everyone to the access list for
the pattern.Select the Add more check box in the Access Granted to section.
The following list of available users is displayed:
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Click Choose Environment to see what is included there. Do not change any of these
options.
Click Schedule Deployment to see the available options. Keep the default values to
deploy now. You can specify how long the virtual system pattern can run.
Click Configure Virtual Parts and click HSLT compatible version of rhel61basic.
E
T
T
You see the default settings that you entered for the virtual machine properties and the
userid add-on. Because you did not lock these values, the user can change them now. In
this case, keep the default settings that you entered when the pattern was created.
___ 2. A message indicates that the request was submitted to deploy that pattern.
___ 3. When the pattern status indicates that the virtual pattern is deployed and ready to use,
expand the virtual machines section to display the virtual machines that are associated
with the pattern. Click Login to log in to the virtual machine console.
Complete the login panel with the following information:
Login: pgeiger (or whatever user ID that you selected when you configured the addon)
Password: passw0rd (or whatever password you selected when you configured the
add-on)
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-11
The virtual machine console opens in a new window with the new user logged in.
Run the whoami command to see that you are logged in as the user that you specified.
Click the X in the upper-right corner of the virtual machine console to close it.
E
T
T
Note: Ensure that you do not have pop-ups blocked in your browser. This setting prevents the
virtual machine console from opening.
Note: You must create a .zip file that contains the executable file and all associated files for the
script package before you can use a script package with SmartCloud Provisioning.
Script packages are simple containers that contain all the required artifacts necessary to run a script.
The script package is a directory that is compressed into a single file that is uploaded to the catalog
and then associated with patterns. The code that is included in the script package can be as simple
as a single command or executable or as complex as a complete product. The content of a script
package is not defined by SmartCloud Provisioning. The script that is included in the script package
defines the required content for that package.
During deployment, script packages are transferred to the target virtual machines at a location that
you specify in the configuration. After they are transferred, they are extracted in that same location.
When the virtual machines successfully start and are federated (if applicable), script packages are
extracted. The scripts are run by using the supplied command line.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Note: These files are written to the file system as the root user. If a different user requires
access to these files, ensure that you set the correct user properties for the files on the guest
operating system.
___ 1. Open a terminal window on the firstbox machine and change to the labfiles directory:
___ a. Select Applications > System Tools > Terminal.
___ b. In the terminal window, enter the following command:
cd /labfiles/script
You see a file named newdir. This file is the compressed script file package that you use to
create a directory.
E
T
T
___ 3. In the SmartCloud Provisioning user interface, select Catalog > Script Packages.
The script packages that were uploaded to SmartCloud Provisioning are displayed.
___ 4. Click the New icon to create a script package.
___ 5. When you are prompted for a unique name for the script package, enter script name new
directory, and click OK.
___ 6. At this point, you have an empty template for the script package.Click Browse next to
Script Package files to locate the newdir script package file in the labfiles directory.
___ 7. A file upload window opens. Select File System under Places, and double-click labfiles,
double-click script and double-click newdir under Name.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-13
___ 9. The newdir.zip file is listed in the Script Package Files field; however, the package is not
yet uploaded.Click the Upload button below the Package name field to upload the script
package.
E
T
T
When the upload completes, the information about the script package is defined to
SmartCloud Provisioning and the script is ready for use.
Note: You can use a special JSON object, cbscript.json, to populate all the information that is
required to configure a script package when it is added to the catalog, as seen in this example.
The JSON object must be named cbscript.json and be included at the root of the compressed
file that is uploaded. Including a cbscript.json file in your script package is useful when sharing
scripts. An additional benefit is gained in limiting typographical errors. The information needs
to be entered only once because the default values are pre populated with the information in the
cbscript.json file.
___ 10. Now that the script package is uploaded to SmartCloud Provisioning, it can be used in a
pattern.Click Catalog > Virtual System Patterns to open the pattern editor.
___ 11. Because you did not lock the pattern that you created in the previous exercise, you can
modify it. In this case, you add the newdir script to the add-on-pattern that was created in
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
a previous exercise. Click add-on-pattern from the list of patterns in the left pane to open
the pattern to the details view.
Note: For patterns that you want to make read-only, you click the Lock icon on the toolbar to
prevent further editing.
___ 12. Click the edit icon to open the pattern for editing.
The pattern editor opens with the current contents of the pattern.
___ 13. Click the Scripts heading to open the section that contains script packages.
___ 14. Left-click and hold the mouse button on the newdir script package. Drag it onto the
pattern. You can provide default values for any parameters that are included in the script.
In this case, do not include a default value in order to require it at deployment time.
E
T
T
___ 16. Scroll to the bottom and expand the Comments section. It is currently empty because you
did not add any comments to the pattern yet.
In the comment field, enter the following information:
Added a script to create a new directory under /tmp at pattern deployment time
Click Add Comment to add the comment to the pattern.
The date, time, author of the comment, and comment are added as shown in the following
example.
___ 17. Select Deploy in the Cloud from the Action toolbar to deploy the pattern in the cloud.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-15
___ 18. Describe the virtual system that you want to deploy by entering the following information:
Username: temp
Password: passw0rd
NEWDIR: mynewdir
E
T
T
___ 19. You receive a message box that your deployment request was successfully submitted.
The Virtual Systems window opens where you can monitor the status of the deployment.
Note: The user interface does not automatically refresh. You might need to click the refresh
button several times to see when the virtual system is started.
___ 21. When the virtual system status indicates that the virtual system is deployed and is ready to
use, expand the Virtual machines section and click the Login button for the virtual
machine.
___ 22. Log in with the user ID temp and password passw0rd that you defined at deployment
time.
___ 23. The virtual machine console opens with user ID temp logged in. Navigate to the /tmp
directory and list the contents of the directory:
cd /tmp
ls
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You see a directory called mynewdir, which was created by the script. Notice the newdir
directory also, which is the working directory that was specified in the cbscript.json file.
Look at the contents of that directory.
This directory contains the expanded contents of the script package, in this case
cbscript.json, newdir.sh, a file named environment_vars (which contains the variables for
the script), and an STDERR and STDOUT.log.
In the simple example for this class, the following cbscript.json file was used.
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-17
___ 2. Create a boot image disk. Use the qemu-img command to create a disk of the size you
need, in this case, 6 GB.
E
T
T
mkdir /labfiles/images
Note: In general, the disk size needs to accommodate only the OS, unless you are building an
image to include other software as part of the master.
___ 3. Examine the script to install Linux on the image named /labfiles/installF17.sh. The
purpose of most of the options are obvious from their names, such as the type of OS and
the processor architecture. The Linux variant is entered as Fedora 16, the latest version of
Fedora that is recognized by the virt-install command. This version does not affect the use
of the image.
#!/bin/bash
export PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/
local/sbin:$PATH
virt-install -connect=qemu:///system \
--name=fedora-x64 \
--ram=1024 \
--arch=x86_64 \
--vcpus=1 \
--os-type=linux \
--os-variant=fedora16 \
--cdrom=/labfiles/isos/Fedora-17-x86_64-Live-Desktop.iso \
--disk path=/labfiles/images/f17-x64.img,bus=virtio\
--hvm \
--accelerate \
--network=bridge:virbr0 \
--vnc
Use man virt-install to see more about the options for the command. The trailing
backslash (\) at the end of each line is a continuation character. This character tells the OS
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
that the command is continued on the next line. Breaking up the options this way
simplifies debugging because each option is displayed on a single line.
___ 4. Open a terminal. Make the script file executable by modifying the permissions.
cd /labfiles
chmod 755 installF17.sh
Do not use logical volume management (LVM) for the file system.
Partition the disk to use a single root partition (/) that occupies the entire disk. Ignore
the warning about no swap partition. The virtio capabilities address the swap partition.
E
T
T
Before you can register the image, some configuration settings need to be confirmed or modified.
There are other options that might need to be changed, depending on the OS you are installing.
Refer to the documentation for more details about creating an image for use with SmartCloud
Provisioning.
___ 7. Log in to the operating system. You can use virt-viewer, virtual machine manager, or log
in using SSH.
virt-viewer fedora-x64
___ 8. Add a line to the /etc/fstab file that configures the system to use a swap partition created
by the HSLT cloud group.
LABEL=HSLTSWAP swap swap defaults 0 0
___ 9. Confirm that the /etc/hosts file has only the line for the local host.
cat /etc/hosts
Your output includes the following line. If it does not, add it now.
127.0.0.1 localhost.localdomain localhost
___ 10. Confirm or modify the file /etc/sysconfig/network to read as shown in this example:
NETWORKING=yes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-19
___ 12. Create a file named /etc/rc.d/rc.local to load a kernel module at boot time. This module is
for the Advanced Configuration and Power Interface (ACPI) Hot Plug Controller Driver.
#!/bin/sh
modprobe acpiphp
touch /var/lock/subsys/local
___ 14. Install the 32-bit versions of the gtk2 and libXtst packages, which are required for the
images to be used with the Image Construction and Composition Tool.
yum install -y gtk2.i686
yum install -y libXtst.i686
E
T
T
___ 15. Move the file that creates networking rules at boot.
cd /lib/udev/rules.d
mv 60-net.rules /root/
___ 16. Disable SELinux by editing the configuration file /etc/selinux/config. The line in question
must read as in this example:
SELINUX=disabled
___ 17. Disable the firewall services. Click Activities and search for firewall. Use the
configuration panel to disable it.
___ 18. Shut down the virtual machine.
shutdown -h now
___ 19. Undefine, or remove, the virtual machine from the configuration on the PXE server. This
command is run on the PXE server.
virsh undefine fedora-x64
___ 20. Rename the image by removing the extension. HSLT has a 15-character limit for the file
name of master images. Removing the extension gives you additional characters to use for
naming your images. This process also provides consistency and a way to know whether
an image is registered, by the absence or presence of the extension on the image file.
cd /labfiles/images
mv f17-x64.img f17-x64
___ 21. Copy the image file to each of the storage nodes.
rsync -avS --progress f17-x64 storage-1:/iaas/iaas-store/files
rsync -avS --progress f17-x64 storage-2:/iaas/iaas-store/files
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 22. Register the image in SmartCloud Provisioning. The command is entered on a single line
even though it is shown wrapped in this guide. Alternatively, you can use the
administrative console to register the image.
iaas-register-image -i f17-x64 -t image -a x86_64 -p linux -f raw d "Fedora 14 64-bit" -v yes
___ 23. Use the describe images command to see information about the new image.
iaas-describe-images
E
T
T
Copyright IBM Corp. 2012
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18-21
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
___ 4. Change to /iaas/etc directory and copy ISAACs configuration file from the PXE server.
cd /iaas/etc
tftp 172.16.0.3 -c get common/etc/isaac.conf
___ 5. Change to /iaas/webconsole/etc directory and copy web consoles configuration file from
the PXE server.
cd /iaas/webconsole/etc
tftp 172.16.0.3 -c get webconsole/webconsole.conf
cd /iaas/webconsole
nohup ./re-run.sh
19-1
You will build a simple LDAP server using Open LDAP software and then you will
configure your SmartCloud Provisioning environment to use the new LDAP server.
___ 1. Go to your new machine and log in as root.
___ 2. Edit NTP configuration file to add PXE server as an NTP server.
vi /etc/ntp.conf
___ 3. Remark all server parameters and replace it with the following line:
server 172.16.0.3
E
T
T
___ 4. Save the file and set NTP server to run permanently after the machine is rebooted.
chkconfig ntpd on
vi /etc/selinux/config
___ 12. If you do not have RHEL-http.repo copy one from kernel-service vm:
scp root@172.16.0.7:/etc/yum.repos.d/RHEL-http.repo .
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 13. Run the following commands to install Open LDAP package.
yum install openldap
yum install openldap-clients
yum install openldap-servers
___ 14. Copy the following files from labfiles directory from PXE server:
cd /etc/openldap
scp root@172.16.0.3:/labfiles/ldap/my-domain.ldif .
scp root@172.16.0.3:/labfiles/ldap/slapd.conf .
E
T
T
___ 17. Save the file and start LDAP service on your new machine:
service slapd start
___ 18. Run the following command to upload new entries to LDAP server:
cd /etc/openldap
ldapadd -x -D "cn=Manager,dc=my-domain,dc=com" -W -f mydomain.ldif
Note: Your new password for adminuser and cbadmin is now object00 in your new LDAP
server.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19-3
E
T
T
host:172.16.100.1
port:389
rootdn:cn=Manager,dc=my-domain,dc=com
rootpw:secret
oudn:ou=user,ou=people,dc=my-domain,dc=com
datasource:openldap
___ 24. Log in to HSLT administrative console as adminuser. But this time use object00 as
password.
Now you will configure SmartCloud Provisioning console.
___ 25. Go to SCP console and log in as adminuser.
Tip: SCP console is still using internal LDAP server so the password is still passw0rd.
___ 26. Click on System tab menu and choose Security.
19-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 28. Enter adminuser in LDAP user name field and click on Test LDAP Query button.
You should see the query is successful. The screen would look like the following:
E
T
T
___ 29. Log out and log in back as adminuser. But this time use object00 for the password.
Last thing that you need to do is to change Virtual Image Library authentication.
___ 30. Go to WebSphere console by pointing your browser to:
https://ui-service:9043/ibm/console
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19-5
___ 35. In LDAP server section, change Primary host name to 172.16.100.1.
The screen should like the following:
E
T
T
___ 37. Then click on Save link at the top of the page.
___ 38. Now you can log in to Virtual Image Library console as adminuser and use object00 as
password.
___ 3. Copy DHCP configuration files from the PXE server. Enter object00 as password.
cd /etc/dhcp
scp root@172.16.0.3:/etc/dhcp/dhcpd.conf .
scp root@172.16.0.3:/etc/dhcp/dhcpd.static .
19-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 6. Edit dhcpd.local and add the following lines after max-lease-time 36000:
next-server 172.16.0.3;
filename pxelinux.0;
E
T
T
Tip: If DHCP service cannot be started, go to /var/lib/dhcpd and run the following
command:
chown dhcpd:dhcpd *
shutdown -r now
___ 10. Wait for the machine to start again. Log in as root and check whether or not dhcpd service
is running:
service dhcpd status
___ 11. Go to PXE server and log in as root. Stop DHCP server by executing:
service dhcpd stop
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19-7
E
T
T
___ 3. Still in the current directory, copy DHCP fail-over configuration file from the PXE server:
scp root@172.16.0.3:/labfiles/dhcp/dhcpd.failover.secondary .
mv dhcpd.failover.secondary dhcpd.failover
include /etc/dhcp/dhcpd.failover;
19-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 8. Go to the PXE server and log in as root. Use object00 as password.
___ 9. Open a terminal window, change directory to /etc/dhcp and backup the original DHCP
configuration file:
cd /etc/dhcp
cp dhcpd.local dhcpd.local.original
___ 11. Edit dhcpd.local and add the following lines in the way you did in secondary DHCP
server:
include /etc/dhcp/dhcpd.failover;
failover peer failover_test;
E
T
T
___ 3. Set DNS server to run permanently when the machine is rebooted:
chkconfig named on
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19-9
Note: You dont need to copy /etc/rndc.key file from the PXE server because it has been
done in the previous exercise.
___ 5. Edit /etc/named.conf by changing type field to slave and adding masters field to point to
PXE servers ip address.
type slave;
masters { 172.16.0.3; };
E
T
T
touch /var/named/cache.db
___ 9. Change to /var directory and change ownership of directory named and its contents to
named user and named group.
cd /var
chown -R named:named named
___ 11. Go to PXE server and log in as root and object00 as password.
___ 12. Change to /etc directory and make a backup of original named.conf.
cd /etc
cp named.conf named.conf.original
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
___ 13. Edit named.conf and add allow-transfer parameter to point it to secondary DNS servers ip
address.
allow-transfer { 172.16.100.1; };
E
T
T
Now you need to configure two DHCP servers with the new DNS server. This will allow
new deployed virtual system to have two name server entries.
___ 15. Change directory to /etc/dhcp and open dhcpd.local file.
___ 16. Add the new DNS ip address into option domain-name-servers.
___ 17. Save and exit from the file. Restart DHCP service:
service dhcpd restart
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19-11
E
T
T
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
20-1
E
T
T
20-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
E
T
T
21-1
E
T
T
21-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.