ENA TrustCompute

From ENA Help
Jump to: navigation, search


Ena-trustcompute-logo-rgb.png ENA TrustCompute delivers highly secure, managed virtual data center services for K–12 schools, higher education institutions, and libraries.


Contents



Menu

The Menu can be opened at any time by using the hamburger icon in the top left corner of the screen. All ENA TrustCompute functions can be accessed from here.
  • Virtual Machines
The Virtual Machines page provides an Overview of all currently established virtual machines (VMs) as well as Performance data. From here, you can click on a virtual machine to manage it, open its Console, or see Full Details.
  • New VM
Opens Create New Virtual Machine page where you configure and create new VMs.
  • Launch Application
Opens Launch New Application page where you create a VM pre-configured for a specific application.
  • Disks
Opens page where you create and configure new disks and manage existing disks. This includes deleting, taking snapshots, and attaching and detaching disks from a VM.
  • Networking
Allows you to acquire public IPs, and create, view, and edit Static NAT, Load Balancing, Port Forwarding, and Firewall rules.
  • Domain Overview
Shows you Global Resource Allocation as well as resource allocation by Groups for existing VMs.
  • Group Assignment
You have the option to organize VMs into groups to make managing them easier. You create new groups and assign or remove VMs from existing groups here.
click to enlarge

Virtual Machines

This is the default landing page of ENA TrustCompute. You can view, sort, and search for existing VMs here as well as view both Overview and Performance data. You can also click New VM to open the Create New Virtual Machine.

Note.png You can increase the number of VMs shown onscreen, or page through them. click to enlarge


Overview Tab

Displays basic and capacity information about your VMs.
  • OS (Operating System)
  • Name
  • Current Status
  • Internal IP Address
  • Allocated Memory
  • Number of Cores
  • Cumulative Disk Size
  • Creation Date
click to enlarge

Performance Tab

Displays basic and usage information about your VMs.
  • OS (Operating System)
  • Name
  • Current Status
  • Internal IP Address
  • CPU Usage
  • Network Read
  • Network Write
  • Disk Read
  • Disk Write
  • Number of IOPS
click to enlarge
Note.png If a VM is stopped, all of its counters will be 0.

Refresh

To refresh the list of VMs to reflect the most recent changes, click (Refresh Icon.jpg).

Show by Group

When the Show by Group slider is toggled On, VMs are sorted under group names. Click anywhere in the group header bar to open the drop down showing the VMs in a group. To go back to viewing all VMs, toggle the slider to Off. click to enlarge

Status

To see only a list of VMs in a particular state, select a state from the Status drop down menu. click to enlarge

Find Entity

To search for a VM by name type the name or part of the name in the Find Entity box and click GO.

To clear text from the Find Entity box, click Clear or delete the entered text and click GO.

click to enlarge

New VM

Opens the Create New Virtual Machine page. click to enlarge

Sorting VMs by Column Heading

You can sort the list of VMs by the data columns by clicking on the column header in both the Overview and Performance tabs. This is true of the list of all VMs and for a list of VMs in a group when Show by Group is toggled on. click to enlarge

Managing VMs

When you click on a VM, you see basic capacity and usage data as well as several options for managing it. click to enlarge

Stop

Stops the VM. You can still view the full details of a VM that is in a Stopping state, but all other options are unavailable until it is fully stopped. A fully stopped VM can be modified, deleted, reinstalled, or have its disks customized, but the console is unavailable. To run a stopped VM, click Run. click to enlarge

Modify

Opens the Modify Virtual Machine page where you can change the VM's System offering and Storage. You can also modify the Groups to which the VM is assigned. click to enlarge

Delete

Deletes the VM and sets its status to Destroyed, where it will remain for 24 hours before being automatically deleted permanently. A destroyed VM can either be deleted permanently or restored within 24 hours. If a VM is deleted permanently, it is erased and unrecoverable. If a VM is restored, it reverts to its state prior to being deleted. click to enlarge
Note.png VMs are restored to a Stopped state. Click Run to restart.

Note.png When a VM is permanently deleted, anyone in your organization working in ENA TrustCompute receives a notice to refresh the VM list. Refreshing removes the deleted VM from the list.

Disks

Disk information is divided into three sections: Add New Disk, Disks Attached to Current VM, and Unattached Disks. You can open or collapse each section by clicking anywhere in the heading bar. To exit this page and return to the Virtual Machines page, click Exit Disk Management.



The two sections below the Exit Disk Management button, VM Info and VM History are covered in the Full Details section.

click to enlarge

Add New Disk

To add a new disk, enter the name of the disk, specify its capacity, and click Add Disk. This creates a new disk and attaches it to this VM. click to enlarge

Disks Attached to Current VM

Find Disk
If you have multiple disks attached to a single VM and wish to find a particular one, enter the name of the disk in the Search By Name bar and click Go.

To clear text from the Find Disk box, click Clear or delete the entered text and click GO.

click to enlarge
Detach
To detach a disk currently attached to this VM, find it under Disks Attached to Current VM and click Detach in the same row as that disk. click to enlarge
Note.png Detaching a disk does not delete it. It places it in the list of Unattached Disks.

Unattached Disks
Find Disk
To search for a specific disk, enter the name of the disk in the Search By Name bar and click Go.

To clear text from the Find Disk box, click Clear or delete the entered text and click GO.

click to enlarge
Attach
To attach a disk, find it under Unattached Disks and click Attach in the same row as the desired disk.
click to enlarge

Console

Opens up the console in a new window. The frame may need to be resized to display the full window. This is the equivalent of plugging in a physical keyboard, mouse, and monitor to a physical server. click to enlarge

Reinstall

Wipes the current state of the VM and resets it back to the original template chosen during the creation of the VM. click to enlarge

Full Details

Displays VM Info and VM History.



You can also find these sections at the bottom of the Disks page.

VM Info

Includes the following capacity and usage information:
  • Memory
  • Number of Cores
  • Disk Size
  • CPU Utilization
  • Number of IOPS
  • IP Address
  • VM Template
  • Network Read
  • Network Write
  • Disk Read
  • Disk Write
click to enlarge

VM History

Historical read and write data for the VM is shown in a graph. You can select one of the following to Show on the Y Axis:
  • Network (bit/s)
  • Disks (bytes/s)
  • IOPs (counts per second)

You can choose to show data for a Time Interval of:

  • Past Hour
  • Past Day
  • Past Week
  • Past Month.
click to enlarge
Note.png Performance statistics are kept for thirty days.


Rename VM

To rename a VM, go to the list of all VMs and click the pencil icon next to the VM’s name. Enter the new name and click the checkmark to confirm the new name or click the X to cancel. click to enlarge
Note.png Modifying a VM stops and restarts it. If there are any critical applications running on a VM, you may want to schedule modification for a maintenance window.

New VM



This page can be accessed from either the menu or the New VM button found on the Virtual Machines page. From here you can create new VMs and customize their features.



VM Name

When you create a new VM, you give it a VM Name which can include up to 32 alphanumeric characters. click to enlarge

Creating a New VM in Basic Mode

This is the default mode for creating VMs. When you select an operating system, the number of cores and disk size are determined automatically based on the best recommendations. click to enlarge
At the bottom of the page is a table showing:
  • Resources Needed to create a VM with that configuration
  • Resources in Current Use prior to creation of the VM
  • Resources available After Creation of the VM
  • Total or Max Allocation of your ENA TrustCompute resources
click to enlarge
Note.png If you attempt to create a VM that exceeds your resource allocation, a warning will appear under the section you are exceeding. The VM will not be created until the resources allocated do not exceed the resources available.

Creating a New VM in Advanced Mode

When you create a VM in Advanced mode, you can select different values for System offering and Storage from the drop-down menu. You may also select Custom from the System offering and Storage drop-down menus to enter a discreet value. click to enlarge

Create VM

Once you have configured a VM, click Create. This takes you back to the Virtual Machines page.

From the Virtual Machines page, click the Refresh icon to add the recently created VM to the list of all VMs. Its status will be Starting. The status changes to Powered On when it is ready for use.
click to enlarge
Note.png Whenever you create a new VM with a template you do not currently have deployed, the initial creation may take several minutes. This occurs because templates must be seeded to your secondary storage on first use.



Launch Application



From here you create new VMs pre-configured for a specific application.



Application Name

Name the Application VM. The name can include up to 32 alphanumeric characters. click to enlarge

Zone

If your ENA TrustCompute package is configured for multiple zones, you select the zone into which you would like to place the Application VM. click to enlarge

Application

Select the application you would like to pre-configure on this VM. click to enlarge


Note.png We will continue to add new applications to the list. If there is a specific application you would like for us to add, please click the feedback icon in ENA TrustCompute, and let us know! click to enlarge

Application Storage

Select the amount of storage you would like to allocate to this VM. click to enlarge

Create

Once you have configured your Application VM, click Create to build the machine. click to enlarge



Disks

From here you can create new and manage existing disks.

Create Disk

To create a new disk, click anywhere in the Create Disk header bar. Enter the name of the new disk, select its Capacity and click Create Disk. The newly created disk is added into the list of all available disks. click to enlarge

Available Disks

In this area, you see:
  • Disk Name
  • VM
Disks that have never been attached to a VM show as N/A.
Names of VMs to which disks are attached are blue.
Names of VMs to which disks were previously attached are gray.
  • Capacity
  • Disk Type
Disks are configured as either system or data. System disks may not be deleted.
  • Number of Snapshots
click to enlarge

Find Disk

To search for a specific disk, enter the name of the disk in the Search By Name bar and click Go.

To clear text from the Find Disk box, click Clear or delete the entered text and click GO.

click to enlarge

Sorting by Column Headings

The list of available disks can be sorted up and down clicking on one of the following column headings:
  • Alphabetically by name (the default)
  • VM to which it is attached
  • Disk Capacity
  • Disk Type
  • Number of Snapshots
click to enlarge

Delete

To delete a disk, click Delete in the same row as the desired disk. A confirmation box appears to confirm your choice. A deleted disk is unrecoverable. Click Delete to erase the disk or Cancel to go back. click to enlarge
You may also delete a disk by clicking on the disk name to open Disk Details and clicking Delete. click to enlarge
Note.png A system disk may not be deleted.


Snapshot

To take a snapshot of a disk, click Snapshot. Taking a snapshot of a disk creates a point in time to which the disk can be restored. click to enlarge

Detach

To detach a disk, click Detach. Doing so detaches the disk from all VMs. click to enlarge
You may also detach a disk, by clicking on the disk name to open Disk Details and clicking Detach. click to enlarge

Modifying the Size of a Disk

You can increase the size of a data disk that is not attached to a VM. To modify the size of an unattached disk, click on the disk name to open the Disk Details page. click to enlarge
Click on Edit to the right of Size and select the desired disk size from the drop down menu.

You can increase the size of a disk, but cannot decrease it. The existing data on the disk remains.

click to enlarge
Note.png When you modify the size of a data disk, you must expand the drive size in the OS. This process varies by OS.

Note.png Modifying a disk stops and restarts it. If there are any critical applications running on a disk, you may want to schedule the resizing for a maintenance window.

Manage Disk Snapshots

To Manage Disk Snapshots click on the disk name to open the Disk Details page. click to enlarge
Take Snapshot
  1. Click Snapshot
  2. Enter Snapshot Name
  3. Click Create Snapshot
click to enlarge
Find Snapshot
To search for a specific snapshot, enter the name in the Find Snapshot box and click Go.

To clear text from the Find Snapshot box, click Clear or delete the entered text and click GO.

click to enlarge
Load Snapshot
To revert a disk back to a snapshot, click Load Snapshot.

click to enlarge
Click Load in the dialogue box to confirm. click to enlarge
Delete Snapshot
Click Delete Snapshot. Click Delete in the dialogue box to confirm. click to enlarge

Networking

You direct traffic from the internet into ENA TrustCompute VMs in the Networking area. New VMs are accessible to your internal network. If you would like a VM to be accessible to people outside of your network, you configure it here.

Public IPs

Acquire IP

To acquire a new IP, click Acquire IP. Once you have named the new IP and clicked Done, it is acquired and added to the list. By default, the next IP in the list of IPs available to you is allocated. click to enlarge

Public IPs

Your current allocation of Public IPs is show here. You can sort the list by the IP’s Label or Address.

You can see if an IP is being used as a Static NAT (SN), Load Balancer (LB), Port Forward (PF), or is Available to be assigned.

click to enlarge


Note.png The Source NAT is the default outbound IP which anyone outside of your network sees when traffic comes from your VMs. A Source NAT IP is created at random when your ENA TrustCompute service is initially provisioned.

Actions

Delete

Click Delete to remove an IP from the list of allocated IPs and places it back in the list of IPs to be acquired. click to enlarge

Auto-generated Firewall rules

Click on Firewall in the Actions column to open a description of auto-generated Firewall rules for that IP. click to enlarge

Static NAT

A Static Nat allows you to create a 1-1 association between one of the IPs in your list and a VM inside your network. By default, all of your VMs appear to be coming from the Source NAT IP addressInternet Protocol address. Numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.. A Static NAT allows traffic from a specific machine to look like it is coming from a particular IP addressInternet Protocol address. Numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication., and routes traffic from the internet to this single machine.

Note.png A Static NAT is always between a Public IP and an internal machine.

Create New Static NAT Rule

Click anywhere in the Create a new Static NAT rule bar to open the create tool. Select the Public IP address that you want all traffic from the VM to appear to be coming from and the Destination VM to which you want all traffic to be directed. Click Create. click to enlarge

Static NAT Rules

Here you can view the list of current Static NAT Rules and see which Public IPs are tied to which VMs. You can sort the list up or down by Public IP, IP Label, Destination VM, or Destination IP. You can also delete a Static NAT Rule here.

Any Public IPs attached to a VM via a Static NAT rule will have their statuses updated from Available to SN.

click to enlarge

Load Balancing

You use Load Balancing Rules to route tcp traffic from a Public IP to more than one VM.

Create Load Balancing Rule

Click anywhere in the Create Load Balancing Rule bar to open the panel. Add information to each field and select the Algorithm for balancing the load.

  • roundrobin directs every incoming connection to the next VM in the list. If there are 3 VMs and 4 incoming connections, the first connection will be directed to the first VM, the second to the second, the third to the third, and the fourth will circle around and be directed to the first VM.
  • leastconn directs traffic to the VM with the least established inbound connections.
  • source directs traffic from similar sources on the internet to the same VM.'

After selecting your preferred algorithm, select all the VMs to which you wish to apply this Load Balancing rule. Click Create and it will be added to the below list of Load Balancing Rules.

click to enlarge

Load Balancing Rules

The list of Load Balancing Rules can be sorted by LB Label, Public IP, IP Label, Public Port, Private Port, the Destination VMs, or the Algorithm used.

Each rule can be edited, deleted, or you can open the Firewall Rules that apply to this Load Balancing Rule.
Click Edit to change a Load Balancing Rule's Label or Algorithm, or remove or add VMs to the rule.

click to enlarge

Port Forwarding

Port Forward Rules are created to route tcp or udp traffic from a public IP to a single internal VM.

Create Port Forwarding Rule

Click anywhere in the Create Port Forwarding Rule bar to open the panel. Select the Public IP, the Destination VM, and the Public and Private Port Ranges. Select tcp or udp from the Protocol drop down menu.
click to enlarge

Port Forwarding Rules

The list of Port Forwarding Rules can be sorted up or down by Public IP, the IP Label, the Destination VM, the Destination IP, the range of Private Ports, the range of Public Ports, or the Protocol. Each rule can be deleted, modified, or you can open the Firewall Rules regarding this Port Forwarding Rule.

click to enlarge

Firewall

When you create a networking rule, the system automatically generates an Access Control List (ACL) rule that allows the traffic through. You may create additional firewall rules.


Create Firewall Rule

Click anywhere in the Create Firewall Rule bar to open the panel.

CIDR
The Classless Inter-Domain Routing (CIDR) is always the source of the traffic. Here you input the IP addressInternet Protocol address. Numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.(es) that you wish to control traffic to or from.

  • 0.0.0.0.0 is the network notation for all available IP space.
  • 192.167.0.5/32, for example, would only affect this single IP.
  • 11.12.13.0/24, for example, would affect IPs 11.12.13.1 through 11.12.13.255 because of the 24bit subnet mask.


Protocol
Protocol defines which type of traffic is affected by this Firewall Rule.

  • All: All forms of traffic
  • TCP: Transmission Control Protocol
  • UDP: User Datagram Protocol
  • ICMP: Internet Control Message Protocol


Direction
The two choices here are Inbound and Outbound traffic.

  • Inbound is always public because it is coming from the outside world into your cloud.
  • Outbound is traffic that originates from within your network and then leaves your network.


Action
Once you have specified the direction and destinations of the traffic, you may then choose whether to Allow or Deny this traffic.

Comment
Writing a Comment for a Firewall Rule enables you to keep track of where the rules are coming from and what their purpose is. A rule automatically generated by the system begins with “System Generated ACL for…” followed by the type of Network Rule for which it was created. If you leave the comment section blank, it simply reads “n/a”.

Create
When you have entered the CIDR, Protocol, Direction, and Action, click Create to add your new Firewall Rule to the Firewall list below.

click to enlarge

Firewall

This list contains all existing Firewall Rules and can be sorted using Show to display all rules the rules surrounding a particular IP addressInternet Protocol address. Numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication./address range.

Each Firewall Rule shows the information entered when it was created. Each rule can be Edited to revise this information or Deleted. A deleted rule is unrecoverable.
Deleting the system generated access rules does not affect the actual load balancing or port forwarding. The same load balancing or port forwarding rules will remain, but you can change the way the rule is generated if you like.


click to enlarge
Note.png The order of this list is important. The system applies rules in list order.


Note.png Much of this information is for advanced network configuration only. An Access Control List rules (ACLs) are automatically created when you create a Port Forwarding or Load Balancing rule.


Domain Overview

You can open this page from the menu. It contains an overview of the VM resources allocated and being used.

Global Resource Allocation

Charts show the Memory, Cores, Disk, and IPv4 resources you have used, the resources that are still available, and the total amount of resources that your ENA TrustCompute package includes. click to enlarge
Note.png There is currently no limit placed on your IPv4 space.

Groups

Shows you the allocated and available resources for each group.

You can sort the data up or down by clicking on a header.

click to enlarge
Note.png If you have VMs assigned to more than one group, the total resources shown in the list of groups will exceed your total resource allocation as shown in the charts above.

Group Assignment

You can sort and classify VMs into groups to help you organize and manage your workflow and resources. Groupings are optional and do not affect functionality.


The Group Assignment page can be accessed from the menu.

It shows list of all VMs and the groups to which they are assigned. To find a particular VM, enter its name in the Find VM box. You can also filter all VMs by status using the Show drop down.

By default, all VMs are placed in an Unassigned group. To place a VM in a group, type the name of an existing group in the Groups bar and it will autocomplete.

If you want to place a VM in a group that does not exist yet, just enter the name of the new group in the Groups bar and press Enter. This creates the new group and assigns the VM to it.

Group Assignments can also be viewed on the, Virtual Machines, and Domain Overview pages.

click to enlarge
Note.png VMs may be assigned to more than one group.