Exoscale Compute Quick Start
Through this quick start you will create and access your first instance.
Setup before you create an instance
Before creating an instance, if you plan to use a Linux- or BSD-based operating system, we strongly encourage you to set up a SSH Keypair for added security and ease of access. This article assumes you did so. Here is a detailed tutorial on setting up SSH Keypairs.
You also need to have enough credit to start and run your instance.
Create your instance
Select the INSTANCES
sub-menu from the COMPUTE
menu on the left.
From the instances list screen, clicking on the ADD
button will bring you to
the instance creation wizard.
Name your instance
You can freely choose a display name for your instance. Only letters, digits and hyphens are allowed. If you leave this field blank the instance’s name will be the instance’s uuid.
A good naming convention for your instances will help you work on them later on, by filtering your instances list. You can also change the display name of your instance later on on the instance detail screen.
Choose the right template
From the templates list you can choose between different operating systems that are either Linux, BSD or Windows based. For this tutorial you can choose either the latest Ubuntu Linux or the latest Microsoft Windows Server distribution (or any other OS if you feel comfortable to follow along!).
Choose how much RAM and CPU you need
You can choose between different service levels (combinations of CPU cores and RAM memory). Some operating systems may be restricted from some choices because of their own specifications.
Please note you will be able to modify this choice later on by scaling your instance up or down to another service level. If you wish you can read more about scaling here.
Choose your instance volume size
Similarly to service levels some disk sizes may be restricted by operating system limitations.
Consider this a starting point for the size of your volume. You can adjust this value later on from the instance detail, scaling down and up to 400GB by steps of 1 GB. More on volume scaling here.
SSH Keypair for Linux-based instances
As we said in the beginning we assume you will use an SSH Keypair if you choose to start a Linux-based instance. Windows users can simply skip this point.
If instead you have chosen a Linux-based instance make sure you have imported an SSH key. If you haven’t, please do so, you can read more about SSH Keypairs on this article.
Your machine will automatically be provisioned with the key you choose and you will be able to access it via SSH straight away.
Firewall rules - Security Groups
Security Groups are firewalling rules. An empty security group called default
is already provided, but you may add more groups and even combine them.
A security group without defined rules behaves like this:
- All incoming traffic is blocked
- All outgoing traffic is allowed
At least one security group has to be associated with an instance. The default group is attributed in case you would choose no group. You can also add and remove Security Groups later on from the instance details screen.
This being your first instance simply choose the default
security group, this
tutorial will assume you did so.
Anti-Affinity Groups and User Data
Anti-Affinity Groups are a way to ensure your machines are created on different hypervisors, and User Data is a way to automatically provision your machine with additional software or settings (like installing Wordpress or importing more SSH keys).
Those may be considered advanced features, and you can skip them for your first instance creation. You may find more information on specific articles:
Launch the instance creation
You may now press the CREATE
button. You will be redirected to the instance
list where you’ll see your new instance listed. The VM will be marked as
STOPPED
at first and you should see the label change to STARTING
and
switch to RUNNING
just after. Now you can log in to your new Compute instance!
You can continue this guide depending on the OS you’ve chosen: log-in to a Linux-based instance or log-in to a Windows-based instance.
Log-in to a Linux-based instance
If you followed along and you attributed the default empty Security Group to your instance, you should by now know that your new server can’t be accessed from outside. Having no rules defined, your security group denies all incoming traffic.
You will access your machine via SSH. This means we have to make sure that inbound traffic is allowed on port 22.
In the COMPUTE
menu, choose the SECURITY GROUPS
sub-menu and then click on the
default
Security Group. You will be presented with the group detail, where all
rules of the group are listed. You’ll also see the list of instances your group
is attached to.
Upper right you’ll find commands to either choose a template (a shortcut to add the most common rules) or add your own configured rule. We’ll choose the SSH template in this case, which will create a new rule with the following underlying settings:
- Type: inbound
- Source Type: CIDR
- CIDR: 0.0.0.0/0
- Protocol: TCP
- Start Port: 22
- End Port: 22
If you followed all the steps you should now be able to simply log-in to your instance from a Linux command line with:
ssh root@<instance IP>
You can find your server’s IP in the instance list view and in the instance detail.
Login to a Windows-based instance
Like we said before speaking about Security Groups, your Windows instance will not be accessible from outside until you define some rules for his security group.
In the COMPUTE
menu, choose the SECURITY GROUPS
sub-menu and then click on the
default
Security Group. You will be presented with the group detail, where all
rules of the group are listed. You’ll also see the list of instances your group
is attached to.
Upper right you’ll find commands to either choose a template (a shortcut to add the most common rules) or add your own configured rule. We’ll choose the RDP template in this case, which will create a new rule with the following underlying settings:
- Type: inbound
- Source Type: CIDR
- CIDR: 0.0.0.0/0
- Protocol: TCP
- Start Port: 3389
- End Port: 3389
Once you have allowed traffic on port 3389, simply point your remote desktop client to the public IP address of your instance using the user name “administrator”. You will find your instance password in the instance detail page.
Please note the following:
- If you don’t see the password in the instance detail, please allow a short lapse of time for the password to bubble up to the interface (generally less than 60 seconds).
- The password will be available through the interface for a very short period (some hours), so please take good note of it. You may in any case reset it when you wish from the same instance detail.