Create nova for manila Security Group. nova secgroup-create manila-service 'manila-service description...' nova secgroup-add-rule manila-service icmp -1 -1 0.0.0.0/0 nova secgroup-add-rule manila-service tcp... 22 22 0.0.0.0/0 nova secgroup-add-rule manila-service tcp 2049 2049 0.0.0.0/0 nova secgroup-add-rule... secgroup-add-rule manila-service tcp 445 445 0.0.0.0/0 nova secgroup-add-rule manila-service tcp 137... 139 0.0.0.0/0 nova secgroup-add-rule manila-service udp 137 139 0.0.0.0/0 12.
-min-disk=1 220a96e7-6d92-4a95-9cdc-920a71d50dc7 五、删除镜像 1、glance image-delete +镜像id(name不行) nova 安全组secgroup...一、查看安全组列表 1、nova secgroup-list 二、创建安全组 1、nova secgroup-create +name +'描述' 三、删除安全组 1、nova secgroup-delete
keypair-add oskey > oskey.priv chmod 600 oskey.priv 15、申请floating IP:nova floating-ip-create 16、安全组相关命令: nova secgroup-add-rule...default tcp 22 22 0.0.0.0/0 ---设置虚拟机能ssh nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0 ---设置虚拟机能...ping icmp包 nova secgroup-list nova secgroup-list-rules default 17、查看虚拟机配置种类:nova flavor-list 18、创建虚拟机...image-list nova boot --flavor 2 --key_name oskey --image ea3ffba1-065e-483f-bfe2-c84184ee76be test1 nova secgroup-add-rule...default tcp 22 22 0.0.0.0/0 nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0 20、查看申请flating IP 列表
推荐至少允许ICMP (ping) 和安全shell(SSH)) [root@controller ~]# nova secgroup-add-rule default icmp -1 -1 0.0.0.0...| +-------------+-----------+---------+-----------+--------------+ [root@controller ~]# nova secgroup-add-rule...--------+---------+-----------------------------------------------------+ [root@controller ~]# nova secgroup-lsit
Nova 安全组 1.1 配置 节点配置文件配置项说明controller /etc/nova/nova.confsecurity_group_api = nova 是的 nova secgroup*...-----+-----------+---------+----------------+--------------+ 删除虚机的安全组: s1@controller:~$ nova remove-secgroup...2c59a875-bc23-4605-ad70-5315d7a3f8e2 novasg1 添加安全组到虚机: s1@controller:~$ nova add-secgroup 2c59a875-bc23...:~$ nova secgroup-add-rule novasg2 icmp -1 -1 0.0.0.0/0 +-------------+-----------+---------+--------...------------+-----------+---------+-----------+--------------+ 再添加安全组到虚机: s1@controller:~$ nova add-secgroup
/modules/secgroup - myvpc in ../../modules/vpc Initializing the backend....../modules/secgroup - myvpc in ../../modules/vpc Initializing the backend...
]#novanetwork-list [root@openstack ~]# nova-manage network list (2).设置安全组: [root@openstack~]# nova secgroup-add-rule...default tcp 22 22 0.0.0.0/0 [root@openstack~]# nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0...为了添加一个允许 ping的规则,可以使用Ag的安全组规则的概念: # nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0 之后,就可以看到在此实例的特定链下多创建了一个规则
55.000000 18 nova-compute compute1 nova enabled up 2017-08-25T09:16:52.000000 设置安全组规则 设置默认安全组虚拟机能ssh: nova secgroup-add-rule...0.0.0.0/0 openstack security group rule create --proto tcp --dst-port 22 default 设置虚拟机能ping icmp包 nova secgroup-add-rule...default icmp -1 -1 0.0.0.0/0 openstack security group rule create --proto icmp default 显示安全组列表nova secgroup-list...default Default security group f2c087c678a446929110f5fe67b456ee [root@controller openstack]# nova secgroup-list...default [root@controller openstack]# nova secgroup-list-rules default IP Protocol From Port To Port
keypair-list [root@xiandian ~]#nova keypair-add mykey > mykey [root@xiandian ~]#nova keypair-list #设置安全组secgroup...策略 [root@xiandian ~]#nova secgroup-list #自定义安全组cookbook [root@xiandian ~]#nova secgroup-create cookbook-rules...'create a secgroup for cookbook' #为安全组添加规则 [root@xiandian ~]#nova secgroup-add-rule cookbook-rules ICMP...-1 -1 0.0.0.0/0 [root@xiandian ~]#nova secgroup-add-rule cookbook-rules UDP 83 83 192.168.50.0/24 [root...@xiandian ~]#nova secgroup-list-rules cookbook-rules 第二步:编写编配脚本文件test50.yml [root@xiandian ~]#vi test50
CLI#列表,增加,删除 虚机的安全组 add-secgroup: Add a Security Group to a server list-secgroup: List...remove-secgroup: Remove a Security Group from a server....#操作安全组 secgroup-add-group-rule secgroup-add-rule secgroup-create secgroup-delete...secgroup-delete-group-rule secgroup-delete-rule secgroup-list secgroup-list-rules...3.1 配置 节点配置文件配置项说明controller /etc/nova/nova.confsecurity_group_api = neutron 使得 nova secgroup* 命令使用的是
bare 创建密钥对和安全组: nova keypair-add demo-keypair > demo-keypair.pem chmod 400 demo-keypair.pem nova secgroup-create...demo-security-group "演示安全组" nova secgroup-add-rule demo-security-group tcp 22 22 0.0.0.0/0 让我们启动一个连接到两个网络的实例
172.16.33.201 RABBIT_HOST=172.16.33.201 GLANCE_HOSTPORT=172.16.33.201:9292 ## Neutron options Q_USE_SECGROUP
Platform Link设置各个Platform之间的关系 (2)配置系统(Platform)内的组件(Component)的属性值 Component是最底层的部署(或者配置)单元,如springboot中的secgroup...例如springboot模版对应的组件模版有:secgroup模版、os模版、jdk模版、java application模版等等。
1800 SERVICE_TIMEOUT=90 GLANCE_LIMIT_IMAGE_SIZE_TOTAL=5000 Q_USE_SECGROUP
keystone_tuowazi)]# nova keypair-delete ctf-private-key 删除安全组 [root@computer ~(keystone_tuowazi)]# nova secgroup-delete
00 | +-------+-------------------------------------------------+ 3、创建安全组 [root@linux-node1 ~]# nova secgroup-add-rule...default icmp -1 -1 0.0.0.0/0 [root@linux-node1 ~]# nova secgroup-add-rule default tcp 22 22 0.0.0.0/
826be4f4-a23d-4c5c-bff5-7739936fac76 # 步骤5.1中生成的id amp_image_tag = amphora # 步骤4 中已经定义这个metadata amp_secgroup_list
| +-------+-------------------------------------------------+ 3、创建安全组 [root@linux-node1 ~]# nova secgroup-add-rule...default icmp -1 -1 0.0.0.0/0 [root@linux-node1 ~]# nova secgroup-add-rule default tcp 22 22 0.0.0.0
每一个Platform都是有一组组件(Component)组成的,并且已定义好了组件之间的依赖关系 2.管理Component Component是最底层的部署(或者配置)单元,如springboot中的secgroup
领取专属 10元无门槛券
手把手带您无忧上云