FUJITSU Cloud Service K5 IaaS Service Portal User Guide · Community Enterprise Operating System...

278
FUJITSU Cloud Service K5 IaaS Service Portal User Guide Version 3.2 FUJITSU LIMITED

Transcript of FUJITSU Cloud Service K5 IaaS Service Portal User Guide · Community Enterprise Operating System...

FUJITSU Cloud Service K5

IaaS Service Portal User Guide

Version 3.2

FUJITSU LIMITED

i

Preface

Purpose of This Document

This guide describes the operating procedures of the IaaS Service Portal for

the services provided by FUJITSU Cloud Service K5.

You are recommended to also refer to the following related manuals.

- IaaS Features Handbook

- IaaS API References

Abbreviations in the present document

In this document, product names are written as follows.

Official Name Abbreviation

FUJITSU Cloud Service K5 IaaS K5 IaaS

Microsoft Windows Server Windows Server Windows

Microsoft Windows Server 2016 Windows 2016

Microsoft Windows Server 2012 R2 Windows 2012 R2

Microsoft Windows Server 2012 Windows 2012

Microsoft Windows Server 2008 R2 Windows 2008 R2

Microsoft Windows Server 2008 Windows 2008

Windows 10 Windows 10

Windows 8.1 Windows 8.1

Windows 7 Windows 7

Red Hat® Enterprise Linux 6.x (for Intel64) (x

is a number)

RHEL 6.x (x is a

number)

Linux

Red Hat Enterprise Linux 7.x (for Intel64) (x is

a number)

RHEL 7.x (x is a

number)

Red Hat OpenShift Container Platform 3.x

(English) (x is a number)

RHOCP 3.x (x is a

number)

Community Enterprise Operating System 6.x

(x is a number)

CentOS 6.x (x is a

number)

CentOS

ii

Official Name Abbreviation

Community Enterprise Operating System 7.x

(x is a number)

CentOS 7.x (x is a

number)

Red Hat Update Infrastructure RHUI

Red Hat Enterprise Linux AUS (AMC Update

Support)

RHEL AUS

SUSE Linux Enterprise Server 12 Service

Pack 1 for AMD64 & Intel64

SLES 12 SP1 Linux

SUSE Linux Enterprise Server SLES

Windows Server Update Services WSUS

VMware vSphere VMware vSphere VMware

VMware ESX ESX

VMware ESXi ESXi

VMware vCenter Server vCenter Server

VMware vSphere Client vSphere Client

VMware Tools VMware Tools

Trademarks

・ Microsoft, Windows, Windows Server and other Microsoft product names and

model names are either registered trademarks or trademarks of Microsoft

Corporation in the United States and/or other countries.

・ Java is a registered trademark of Oracle Corporation and its subsidiaries or

affiliates in the United States and/or other countries.

・ Xeon is a trademark of Intel Corporation in the United States and/or other countries.

・ Linux® is a registered trademark of Linus Torvalds in the United States and/or

other countries.

・ Red Hat, Red Hat Enterprise Linux, and OpenShift are trademarks of Red

Hat, Inc. registered in the United States and/or other countries.

・ Ubuntu is a registered trademark of Canonical Ltd.

・ The OpenStack Word Mark is either a registered trademark/service mark or

trademark/service mark of the OpenStack Foundation, in the United States

and other countries and is used with the OpenStack Foundation's permission.

・ VMware and VMware product names are either trademarks or registered

trademarks of VMware, Inc. in the United States and/or other countries.

・ SAP and SAP logos, SAP R/3, mySAP.com, mySAP Business Suite, and

iii

other SAP products are either trademarks or registered trademarks of SAP

AG in Germany and/or other countries.

・ Akamai and Akamai Intelligent Platform are either trademarks or registered

trademarks of Akamai Technologies, Inc.

・ Novell is a registered trademark of Novell Inc. in the United States and/or

other countries; SUSE and SUSE logos are either trademarks or registered

trademarks of SUSE LLC in the United States and/or other countries.

・ Other company names and product names mentioned in this manual are

trademarks or registered trademarks of their respective companies.

In addition, the company name and product name described in this document are

trademarks or registered trademarks of each company.

Compliance with Export Control Regulations

When exporting this document or providing it to a third party, check the export

control laws and regulations of your country and the U.S. and take necessary

procedures.

Notices

- The content of this manual is subject to change without notice.

- The content of this manual shall not be reproduced without express written

permission from FUJITSU LIMITED.

- FUJITSU LIMITED shall bear no responsibility for any claims of violation of

a third party's patent or other rights arising from the use of the data described

in this document.

iv

Document history

Version Date Edited places Description

2.0 April 4, 2017 Whole Initial Release

2.1 April 21, 2017 Ch. 11 and 13 Added descriptions.

2.2 May 19, 2017 Whole Modification of section number

Ch. 6 Addition of "Confirm and Cancel

Resize/Migrate" menu.

Ch. 10 Addition of volume type in Table

14.

Addition of storage action (Connect

and Disconnect Storage)

2.3 May 31, 2017 Ch. 10 Update of Table 14 and Table 15

Ch. 12 Table 20 Addition of the link to

Subnet Detail

Ch. 12.2.2 Addition of Delete action

in the Port.

Ch. 12.5 Addition of Subnet

2.4 June 30, 2017 Ch. 23 Addition of the API execution

function

2.5 July 18, 2017 Ch. 16 Addition of functions for

creation/editing/deletion of the

following firewall features.

- Firewalls

- Firewall policies

- Firewall rules

2.5.1 August 1, 2017 Ch. 2 Updated Figure 1

Ch. 3 Overall correction focusing on

Paging and Update button function

addition

Ch. 6 Added explanation of required

entry items in "6.3.1 How to Create

Virtual Server"

2.6 September 1, 2017 Ch. 19 Added VPN Service

v

2.7 September 28, 2017 Ch. 24 Added Operation Log

2.8 December 13, 2017 Ch. 1 Modified the OpenStack

Foundation trademark information

Ch. 11 Added Object Storage

Ch. 27 Added Virtual Server Import and

Export

2.9 March 22, 2018 Ch. 6

Ch. 6.1.1 Added the "Edit

metadata" Action

Ch. 6.3 Added the metadata

function of Creating Virtual Server

Ch. 11 Removed the restriction regarding

object storage in 11.4

Ch. 21 Added the IPsec VPN function

Ch. 23 Updated Table 49

Ch. 27

Ch. 27.1 Added the history function

of API Execution

2.9.1 April 20, 2018 Ch. 15 Ch. 15.5.1 Corrected the port

number of Security Group Rule

(MS SQL)

Ch. 19 Ch. 19.5 Added SRV to the

supported records

2.9.2 April 26, 2018 Ch. 11 Ch. 11.3 Added advisory note

regarding object list display

2.10 June, 1, 2018 Ch. 4 Ch. 4.2 Added Advisory Notes

Ch. 6 Ch. 6.6 Added the Port Creation

Function

Ch. 12 Ch. 12.2.1 Added the Snapshot

Restoration Function

Ch. 14 Ch. 14.4 Added the Routing Setting

Function

Ch. 19 Ch. 19.1 Added display content to

the DNS Zone list

3.0 June 29, 2018 Ch. 1 Ch. 1.2 Added the Functions

Provided by the IaaS Service

Portal

vi

Ch. 19 Added the Load Balancer

(Western Japan Region 3)

Function

Ch. 20 Ch. 20.5 Added PTR to Record

Registration

Ch. 21 Updated Table 43

Ch. 23 Ch. 23.5 Added Starting the

Database Virtual Server After

Patch Application

Ch. 23.8 Added Rebooting the

Database Virtual Server After

Patch Application

3.0.1 July 18, 2018 Ch. 19 Ch. 19.3 Added How to Delete

Load Balancer

3.1 July 31, 2018 Ch. 1 Ch. 1.2 Added Eastern Japan

Region 3

Ch. 3 Ch. 3.1.1 Added the Logout

Function

Ch. 6 Ch. 6.7 Added Create Private

Image

Ch. 18 Ch. 18.8 Updated Add Virtual

Server

Ch. 30 Added Bare Metal Service

(Shared Disks)

3.2 October 12, 2018 Ch. 11 Response for Eastern Japan

Region 3/Western Japan Region

Ch. 22 Response for Eastern Japan

Region 3/Western Japan Region

Ch. 27 Added Alarm (Eastern Japan

Region 3/Western Japan Region

3)

vii

Contents

Preface .................................................................................................................................... i

Document history ................................................................................................................. iv

Chapter 1 Introduction ......................................................................................................... 1

IaaS Service Portal Overview ................................................................................... 1

1.1.1 IaaS Service Portal ......................................................................................... 1

1.1.2 Recommended Environment .......................................................................... 1

1.1.3 Privilege Required for Operation ................................................................... 1

Functions Provided by the IaaS Service Portal ....................................................... 2

Chapter 2 Overall Structure ................................................................................................ 5

GUI Structure ............................................................................................................ 5

Chapter 3 Common Operations ........................................................................................... 6

Description .................................................................................................................. 6

3.1.1 System Area Common Operations ................................................................. 6

3.1.2 Display Area Common Operations ................................................................. 7

Chapter 4 Login .................................................................................................................... 8

How to Login .............................................................................................................. 8

Advisory Notes ........................................................................................................... 9

Chapter 5 Top ...................................................................................................................... 10

Alarm ........................................................................................................................ 10

5.1.1 Select Alarm ................................................................................................... 11

5.1.2 Alarm History ................................................................................................. 11

5.1.3 Graph ............................................................................................................. 12

Service Usage ........................................................................................................... 12

5.2.1 Select Graph of Service Usage ..................................................................... 13

5.2.2 Graph ............................................................................................................. 13

5.2.3 Ranking .......................................................................................................... 14

Resource Usage ........................................................................................................ 15

Chapter 6 Virtual Server .................................................................................................... 16

Virtual Servers List ................................................................................................. 16

6.1.1 Action ............................................................................................................. 17

Virtual Server Details .............................................................................................. 19

6.2.1 Action ............................................................................................................. 21

viii

Create Virtual Server .............................................................................................. 22

6.3.1 How to Create Virtual Server ....................................................................... 22

Edit Virtual Server................................................................................................... 26

6.4.1 How to Edit Virtual Server ........................................................................... 26

Resize Virtual Server ............................................................................................... 27

6.5.1 How to Resize Virtual Server ....................................................................... 27

Port Creation ............................................................................................................ 28

6.6.1 How to Create a Port .................................................................................... 28

Create Private Image ............................................................................................... 31

6.7.1 How to Create Virtual Server Image ........................................................... 31

Chapter 7 Key Pair ............................................................................................................. 32

Key Pair List ............................................................................................................ 32

Key Pair Creation ...................................................................................................... 32

7.2.1 How to Create a Key Pair ............................................................................... 32

Key Pair Import .......................................................................................................... 33

7.3.1 How to import the key pair .............................................................................. 33

Key Pair Details ......................................................................................................... 35

Key Pair Deletion ..................................................................................................... 36

7.5.1 How to delete a key pair ................................................................................. 36

Chapter 8 Image .................................................................................................................. 37

Image List ................................................................................................................. 37

8.1.1 Action ............................................................................................................. 38

Image Details ........................................................................................................... 39

Chapter 9 Schedule ............................................................................................................. 40

Schedule List ............................................................................................................ 40

Create Schedule ....................................................................................................... 40

9.2.1 How to Create Schedule................................................................................ 40

Schedule Details ........................................................................................................ 44

Schedule Deletion ..................................................................................................... 45

9.4.1 How to delete Schedule ................................................................................. 45

Chapter 10 Storage ............................................................................................................. 46

Storage List .............................................................................................................. 46

10.1.1 Action ............................................................................................................. 47

Storage Details ......................................................................................................... 48

Create Storage .......................................................................................................... 50

10.3.1 How to Create Storage .................................................................................. 50

ix

Edit Storage .............................................................................................................. 51

10.4.1 How to Edit Storage ...................................................................................... 51

Disconnect Storage ................................................................................................... 51

Connect Storage ....................................................................................................... 51

Create Snapshot ....................................................................................................... 51

10.7.1 How to Create Snapshot ............................................................................... 51

Chapter 11 Object Storage ................................................................................................. 52

Function Overview ................................................................................................... 52

Usage Methods of Object Storage ........................................................................... 54

11.2.1 Create a Container ........................................................................................ 54

11.2.2 Create an Object ............................................................................................ 59

11.2.3 Download an Object ...................................................................................... 65

11.2.4 Import a VM Image ....................................................................................... 65

Advisory Notes ......................................................................................................... 66

Chapter 12 Snapshot .......................................................................................................... 67

Snapshot List Screen ............................................................................................... 67

12.1.1 Action ............................................................................................................. 68

Snapshot Details Screen .......................................................................................... 68

12.2.1 Restore a Snapshot ....................................................................................... 69

Edit Snapshot Screen .............................................................................................. 70

Advisory Notes ......................................................................................................... 70

Chapter 13 Virtual Network .............................................................................................. 71

Virtual Network List ................................................................................................ 71

13.1.1 Action ............................................................................................................. 72

Virtual Network Details .......................................................................................... 72

13.2.1 Action for Subnet........................................................................................... 74

13.2.2 Action for Port ............................................................................................... 74

Create Virtual Network ........................................................................................... 74

13.3.1 How to Create Virtual Network ................................................................... 74

Edit Virtual Network ............................................................................................... 78

13.4.1 How to Edit Virtual Network ....................................................................... 78

Add Subnet ............................................................................................................... 78

Chapter 14 Virtual Router ................................................................................................. 79

Virtual router list ..................................................................................................... 79

14.1.1 Action ............................................................................................................. 80

Virtual Router Overview ......................................................................................... 80

x

14.2.1 Action ............................................................................................................. 81

Virtual Router Creation ........................................................................................... 82

14.3.1 How to create a virtual router ...................................................................... 82

Edit a Virtual Router ............................................................................................... 82

14.4.1 How to edit a virtual router ......................................................................... 82

Add interface ............................................................................................................ 83

Chapter 15 Security Group ................................................................................................ 84

Security Group List .................................................................................................. 84

15.1.1 About Operation ............................................................................................ 84

Security Group Creation .......................................................................................... 85

15.2.1 How to create a security group..................................................................... 85

Security Group Details ............................................................................................ 86

Manage Security Group Rules ................................................................................ 87

15.4.1 How to Transfer to the Rule Management Screen...................................... 88

Addition of Security Group Rules ........................................................................... 89

15.5.1 How to Add Security Group Rules ............................................................... 89

Export Security Group Rules .................................................................................. 91

15.6.1 How to Export Rules ..................................................................................... 91

Import Security Group Rules .................................................................................. 91

15.7.1 How to Import Rules ..................................................................................... 91

Deletion of Security Group Rules ........................................................................... 92

15.8.1 How to Delete Rules ...................................................................................... 92

Editing a Security Group ......................................................................................... 93

15.9.1 How to Edit a Security Group ...................................................................... 93

Deletion of Security Group ............................................................................... 94

15.10.1 How to Delete a Security Group .................................................................. 94

Chapter 16 Global IP .......................................................................................................... 95

Global IP List ........................................................................................................... 95

16.1.1 Action ............................................................................................................. 95

Reserved Global IP ................................................................................................... 95

Allocate Global IP .................................................................................................... 96

Deallocate Global IP ................................................................................................ 97

Release Global IP ..................................................................................................... 97

Chapter 17 Firewall ............................................................................................................ 98

Function Overview ................................................................................................... 98

Firewall List Screen ................................................................................................. 99

xi

Firewall Creation Procedure ................................................................................. 100

17.3.1 Firewall Rule Sorting Operation ................................................................ 102

Advisory Notes ....................................................................................................... 104

Chapter 18 Load Balancer................................................................................................ 105

Load Balancer List ................................................................................................. 105

18.1.1 Action ........................................................................................................... 105

Load Balancer Details ........................................................................................... 106

Create Load Balancer ............................................................................................ 109

18.3.1 How to Create Load Balancer .................................................................... 109

Add Subnet .............................................................................................................. 111

18.4.1 How to Add Subnet ...................................................................................... 111

Delete Subnet .......................................................................................................... 112

18.5.1 How to Delete Subnet .................................................................................. 112

Add Listener ............................................................................................................ 112

18.6.1 How to Add Listener .................................................................................... 112

Delete Listener ........................................................................................................ 112

Add Virtual Server .................................................................................................. 112

18.8.1 How to Add Virtual Server .......................................................................... 112

Delete Virtual Server .............................................................................................. 113

18.9.1 How to Delete Virtual Server ...................................................................... 113

Create Session Persistence Policy .................................................................. 113

Create SorryServer Policy ............................................................................... 113

18.11.1 How to Create SorryServer policy............................................................... 113

Create/Delete Policy ........................................................................................ 113

Set Health Check Information ........................................................................ 114

Set Security Group .......................................................................................... 114

Set Cipher Suite ............................................................................................... 114

Chapter 19 Load Balancer (Eastern Japan Region 3/Western Japan Region 3) .......... 115

Function Overview .................................................................................................. 115

How to Use Load Balancer ..................................................................................... 116

19.2.1 Create a Load Balancer ............................................................................... 117

19.2.2 Load Balancing Settings .............................................................................. 118

19.2.3 Confirmation after Creation ....................................................................... 125

How to Delete Load Balancer ................................................................................ 127

Points to Note ......................................................................................................... 127

Chapter 20 DNS ................................................................................................................ 128

xii

DNS Zone List ........................................................................................................ 128

20.1.1 About Operation .......................................................................................... 129

DNS Zone Registration .......................................................................................... 129

20.2.1 How to Register DNS Zone ......................................................................... 129

Record List .............................................................................................................. 131

20.3.1 About Operation .......................................................................................... 132

Record Details ........................................................................................................ 132

Record Registration ............................................................................................... 134

20.5.1 How to register records ............................................................................... 134

Editing Records ...................................................................................................... 141

20.6.1 How to edit records ..................................................................................... 141

Record Deletion ...................................................................................................... 142

20.7.1 How to delete records .................................................................................. 142

DNS Zone Deletion ................................................................................................. 142

20.8.1 How to delete DNS zone ............................................................................. 142

Chapter 21 VPN Service (SSL-VPN) ............................................................................... 144

Function Overview ................................................................................................. 144

Usage Method of SSL-VPN Connections .............................................................. 144

Advisory Notes ....................................................................................................... 150

Chapter 22 VPN Service (IPsec VPN) ............................................................................. 151

Function Overview ................................................................................................. 151

Usage Method of IPsec VPN Connections ............................................................ 152

How to Delete IKE and IPsec Policies .................................................................. 162

Advisory Notes ....................................................................................................... 164

Chapter 23 Database Virtual Server ............................................................................... 165

Database Virtual Server List ................................................................................ 165

23.1.1 About Operation .......................................................................................... 167

Database Virtual Server Creation ........................................................................ 168

23.2.1 How to create database virtual server ....................................................... 168

Database Virtual Server Details ........................................................................... 172

Database Virtual Server Startup .......................................................................... 177

23.4.1 How to start up Database Virtual Server.................................................. 177

Starting the Database Virtual Server after Patch Application .......................... 178

23.5.1 How to start the database virtual server after patch application ........... 178

Database Virtual Server Stop ............................................................................... 179

23.6.1 How to stop database virtual server .......................................................... 179

xiii

Database Virtual Server Reboot ........................................................................... 179

23.7.1 How to reboot the database virtual server ................................................ 180

Rebooting the Database Virtual Server after Patch Application........................ 181

23.8.1 How to reboot the database virtual server after patch application ......... 181

Database Virtual Server Deletion ......................................................................... 182

23.9.1 How to delete the database virtual server ................................................ 182

DB Parameter Group Details......................................................................... 183

23.10.1 How to Check DB Parameter Group .......................................................... 183

Database Log List ........................................................................................... 184

23.11.1 How to see log .............................................................................................. 184

Database Log Details...................................................................................... 185

Chapter 24 Stack............................................................................................................... 186

Stack List ................................................................................................................ 186

Stack Details .......................................................................................................... 187

Create Stack ........................................................................................................... 188

24.3.1 How to Create Stack ................................................................................... 188

Edit Stack ............................................................................................................... 189

Chapter 25 Monitoring ..................................................................................................... 190

Monitoring Target Resource List .......................................................................... 190

25.1.1 How to display target resource list ............................................................ 190

Resource Audit Information .................................................................................. 192

Graph ...................................................................................................................... 193

25.3.1 How to change the displayed content of the graph ................................... 193

25.3.2 Graph Operation ......................................................................................... 194

Chapter 26 Alarm .............................................................................................................. 195

Alarm List ............................................................................................................... 195

26.1.1 About Operations ........................................................................................ 196

Alarm Creation ....................................................................................................... 196

26.2.1 How to create an alarm .............................................................................. 196

Alarm Details ......................................................................................................... 210

Action setting ......................................................................................................... 214

26.4.1 How to set an alarm .................................................................................... 214

History of Alarm ..................................................................................................... 218

26.5.1 How to display the history of alarm .......................................................... 218

Alarm Deletion ....................................................................................................... 221

26.6.1 How to delete an alarm ............................................................................... 221

xiv

Chapter 27 Alarm (Easter Japan Region 3/Western Japan Region 3) .......................... 222

Function Outline .................................................................................................... 222

Alarm List ............................................................................................................... 223

27.2.1 About Operations ........................................................................................ 224

Alarm Details ......................................................................................................... 225

Alarm Creation ....................................................................................................... 227

27.4.1 How to create an Alarm .............................................................................. 227

Alarm Editing ......................................................................................................... 230

27.5.1 How to edit an alarm .................................................................................. 230

Delete Alarm ........................................................................................................... 232

27.6.1 How to delete an alarm ............................................................................... 232

History of Alarm ..................................................................................................... 233

27.7.1 How to display History of Alarm ................................................................ 234

Alarm Details ......................................................................................................... 236

Chapter 28 Operation Log ................................................................................................ 239

Function Overview ................................................................................................. 239

Usage Method of Operation Logs .......................................................................... 241

Advisory Notes ....................................................................................................... 242

Chapter 29 API Execution ................................................................................................ 243

Function Overview ................................................................................................. 243

Usage Example ....................................................................................................... 243

29.2.1 Information Necessary for API Execution ................................................. 243

29.2.2 Endpoint List ............................................................................................... 244

29.2.3 Example of Virtual Server List Acquisition .............................................. 246

29.2.4 Example of Virtual Server Creation .......................................................... 248

Chapter 30 VM Import and Export ................................................................................. 252

Function Overview ................................................................................................. 252

Usage Example ....................................................................................................... 253

30.2.1 VM Import ................................................................................................... 253

30.2.2 VM Export ................................................................................................... 256

Advisory Notes ....................................................................................................... 258

Chapter 31 Bare Metal Service (Shared Disks) .............................................................. 259

Function Overview ................................................................................................. 259

How to Use a Shared Disk ..................................................................................... 260

31.2.1 Shared Disk List Display ............................................................................ 260

31.2.2 Shared Disk Detailed Display .................................................................... 260

xv

Advisory Notes ....................................................................................................... 261

1

Chapter 1 Introduction

IaaS Service Portal Overview

1.1.1 IaaS Service Portal

IaaS Service Portal is a GUI application for using FUJITSU Cloud Service (IaaS) service.

On the IaaS Service Portal, you can operate on some of the IaaS resources.

1.1.2 Recommended Environment

The recommended environment for the integrated service portal is as follows.

Table 1 Recommended Operating Environment

OS Windows 7/8.1

Browser Microsoft Internet Explorer 11

1.1.3 Privilege Required for Operation

To operate the IaaS Service Portal, you need the privilege "System Owner Role

(cpf_systemowner)".

If you operate with other privilege, it may not be displayed correctly.

2

Functions Provided by the IaaS Service Portal

The functions available on the IaaS Service Portal vary depending on the

Region. This section explains the available regions and the available functions.

Available Regions

The relationships of the Region Names and the Region Identifiers are

shown below.

Table 2 List of Available Regions

Country Region Name Abbreviation Region

Identifier

Number of

Availability

Zones (AZ)

Japan Eastern Japan Region 1 Japan East 1 jp-east-1 2

Eastern Japan Region 2 Japan East 2 jp-east-2 2

Eastern Japan Region 3 Japan East 3 jp-east-3 1

Western Japan Region 1 Japan West 1 jp-west-1 2

Western Japan Region 2 Japan West 2 jp-west-2 2

Western Japan Region 3 Japan West 3 jp-west-3 1

UK UK Region 1 UK uk-1 2

Finland Finland Region 1 Finland fi-1 2

Germany Germany Region 1 Germany de-1 2

Spain Spain Region 1 Spain es-1 2

US US Region 1 US us-1 2

*For details on regions, refer to the "IaaS Features Handbook – Region".

Available Functions

A list of the available functions in each region is given below.

Table 3 List of Available Functions by Region

[Legend] ✓: Available

- : Not available as at July 2018 (Includes functions to be released later)

3

No Function Eastern Japan

Region 1/Region 2

Western Japan

Region 1/Region 2

UK/US

Finland

Germany/Spain

Eastern Japan

Region 3

Western Japan

Region 3

1 Top ✓ -

2 Virtual Servers ✓ ✓

3 Key Pairs ✓ ✓

4 Images ✓ ✓

5 Schedule ✓ -

6 Storage ✓ ✓

7 Object Storage ✓ ✓

8 Snapshots ✓ ✓

9 Virtual Networks ✓ ✓

10 Virtual Routers ✓ ✓

11 Security Groups ✓ ✓

12 Global IPs ✓ ✓

13 Firewalls ✓ ✓

14 Load Balancers ✓(*1) ✓(*1)

15 DNS ✓(*2) ✓(*2)

16 VPN Service (SSL-VPN) ✓ ✓

17 VPN Service (IPsec VPN) ✓ ✓

18 Database Virtual Servers ✓ -

19 Stacks ✓ -

20 Monitoring ✓ -

21 Alarms ✓ ✓

22 Operation Logs ✓ ✓

23 API Execution ✓ ✓

24 VM Import/Export ✓ -

25 Bare Metal Service

(Shared Disks)

- Only Eastern Japan

Region 3

*1: The functions available in Eastern Japan Region 3/Western Japan Region 3

and the operation screens differ from the other regions indicated in Table 2

4

List of Available Regions.

*2: Only provided in Eastern Japan Region 1

Points to Note

As there is only one AZ in Eastern Japan Region 3/Western Japan

Region 3, AZ information is not displayed on the screen.

Even though functions may be common between regions, depending

on the region the layouts of screens differ slightly. Unless otherwise

noted, the screens shown in this guide are those of Eastern Japan

Region 1.

5

Chapter 2 Overall Structure

GUI Structure

GUI of K5 IaaS service portal is configured as follows.

Table 4 Area Name

No. Name Details

1 System Area Displays a service name, a user name, etc.

2 Side Bar Select a resource and display it in the display area.

3 Display Area Display information on the selected resource.

Figure 1 Service Portal

6

Chapter 3 Common Operations

Description

This section explains the common operations of the IaaS Service Portal window.

3.1.1 System Area Common Operations

Figure 2 System Area Common Operations

・ Switch Language

Selecting a language from the pull-down menu enables switching of the

display language between Japanese and English.

・ Switch Region

Selecting a region name from the pull-down menu enables switching of

regions.

・ Logout

Clicking a user name displays "Logout" in the pull-down menu. Clicking

"Logout" logs you out of the IaaS service portal.

7

3.1.2 Display Area Common Operations

Figure 3 Display Area Common Operations

・ Switch Side Bar Display

Switches between display/non-display of the side bar. When the side bar is

not displayed, the display area is enlarged.

・ Switch Project

Selecting a project name from the pull-down menu enables switching of

projects. There are cases when it is not possible to switch projects, such as

when resources are being created.

・ Update Button

Clicking this button updates (refreshes) the information in the Display Area.

There are cases where updating of information is not possible, such as when

resources are being created.

・ Add Resource

Clicking this displays the Add Resource window.

・ Filter

The items displayed in a list can be filtered using an entered string.

・ Paging

This enables division of a list into multiple pages when there are many

records. The following operations switch the page.

Changing the number of pages.

Clicking the previous or next page button.

8

Chapter 4 Login

How to Login

Enter the contract number, user name, and password, then press the "Login"

button.

Figure 4 Login

In case there are input error of the contract number, user name or password,

following error message is displayed.1

Figure 5 Login with an error message

1 From a security point of view, if login fails five times consecutively, you cannot log in for 30 minutes.

9

Advisory Notes

When an authentication error occurs during login, the browser's cache may

be the cause. Take corrective action following the procedure below.

1. Delete the cache of IE 11.

From the Tool Bar, select "Tools" > "Internet Options" > "General Tab",

and "Delete" in the "Browsing history".

Check "Cookies and website data", and press "Delete".

2. Close all IE 11 windows.

3. Start IE 11 again and log in.

10

Chapter 5 Top

Alarm

Figure 6 Top

Figure 7 Alarm

11

5.1.1 Select Alarm

Select an alarm whose graph you want to display from alarm list.

Figure 8 Select Alarm

5.1.2 Alarm History

Table 5 Items of Alarm

No Item Name Description

1 Insufficient Number of alarms with insufficient condition

settings

2 Action Succeeded Number of successful alarms

3 Action Failed Number of failed alarms

Figure 9 Result of Alarm Collection

Most of data that are highly likely to be conditional settings as meaningless

alarms are distributed to Insufficient.

12

5.1.3 Graph

The graph on the horizontal axis shows time and the vertical axis shows the

number of alarms. When you move the cursor closer to the graph, you can check

the details of each time zone.

Figure 10 Alarm Graph Details

If you move the mouse wheel upwards on the graph you can zoom in, and when

you move the mouse wheel downwards it will zoom out.

Service Usage

You can check the usage of each service in the project by graph or ranking.

Figure 11 Service Usage

13

5.2.1 Select Graph of Service Usage

You can select service usage graphs from the following five.

・ Virtual Server (Default)

・ Block Storage

・ Image

・ Load Balancer

・ Network

Figure 12 Select Service

5.2.2 Graph

The graph on the horizontal axis shows time and the vertical axis shows the

operation time. The graph display period can be selected from the following three.

・ This Month (Default)

・ 6 Months

・ 12 Months

Figure 13 Graph after switching display period

Also, by moving the cursor closer to the graph, you can check the details of each

time zone. When "This month" is selected, daily details are displayed, when "6

months" or "12 months" is selected, monthly details are displayed.

14

Figure 14 Service Usage Graph Details (This Month)

5.2.3 Ranking

We will display usage status of this month in ranking format. The color of the

ranking corresponds to the color of the graph.

Figure 15 Ranking of Service Usage

15

Resource Usage

You can check the number of each item created in the project.

Table 6 Resource Usage List

No. Item Name Description

1 Virtual Server (Green) Number of running virtual server resources

2 Virtual Server (Red) Error number of virtual server resources

3 Virtual Network Number of virtual network resources

4 Port Number of resources on port

5 IP Address Number of global IP address resources

6 Block Storage Number of block storage resources

7 Total Storage Total block storage capacity

Figure 16 Resource Usage List

16

Chapter 6 Virtual Server

Virtual Servers List

You can check the list and status of the virtual servers created in the project.

Figure 17 Virtual Server List

Table 7 Virtual Server List Table

No. Item Name Description

1 Virtual Server Name Name of a virtual server

2 Status Refer to Table 8 Virtual Server Status

3 IP Address IP address of a virtual server

Display multiple lines if you have multiple IP

addresses

4 AZ The availability zone in which virtual servers

reside

5 Dedicated Display of dedicated virtual servers

"true" will be displayed for dedicated virtual

servers

6 Action Various operations on virtual servers

Table 8 Virtual Server Status

No. Status Description

1 ACTIVE Active State

2 BUILD Build State

3 DELETED Deleted State

4 ERROR Error State

5 HARD_REBOOT Forced Reboot State

6 MIGRATING Migration State

17

7 PASSWORD Password Setting State

8 PAUSED Paused state

9 REBOOT Reboot State

10 REBUILD Rebuild State

11 RESCUE Rescue State

12 RESIZE Resize State

13 REVERT_RESIZE Revert Resize State

14 SHELVED Released State (Resource

Pending)

15 SHELVED_OFFLOADED Released State

16 SHUTOFF Stopped State

17 SOFT_DELETED Deleted State (Disk is

suspended)

18 SUSPENDED Suspend State

19 UNKNOWN Unknown State

20 VERIFY_RESIZE Verify Resize State

6.1.1 Action

Figure 18 Virtual Server Action

18

We will provide the following as actions of the virtual server list.

1. Resize

Refer to 6.5 Resize Virtual Server.

2. Soft Reboot

Restart a virtual server.

3. Hard Reboot

Turn off an instance, then turn it back on

4. Shutdown

Shutdown a virtual server.

5. Release

Release a virtual server.

6. Remote Console

Open Remote Console.

Some browsers are blocked by pop-ups. In that case please allow pop-ups.

7. Edit

Refer to 6.4 Edit Virtual Server.

8. Edit Metadata

Edit (Add/Display/Update/Delete) metadata of a virtual server.

9. Create Image

Refer to 6.7 Create Private Image.

10. Delete

Delete a virtual server.

11. Start-up

Start a virtual server.

12. Restore

Restore a virtual server.

13. Confirm Resize/Migration

Execute to resize/migrate a virtual server.

14. Cancel Resize/Migration

Cancel to resize/migrate a virtual server.

19

Virtual Server Details

You can open virtual server details by clicking a virtual server name in a virtual

server list.

Detailed information on a virtual server not displayed in a virtual server list is

displayed.

Figure 19 Virtual Server Details

20

Table 9 Virtual Server Details

No. Classification Item Name Description

1 Information Virtual Server Name Name of a virtual server

2 Virtual Server ID Unique value

3 Status Status of a virtual server

4 AZ Availability Zone

5 Dedicated Display of dedicated

virtual servers

"true" will be displayed

for dedicated virtual

servers

6 Key Pair Key Pair

7 Image Name Image Name

8 Date and Time of

Creation

Date and Time of

Creation

9 Spec Virtual Server Type Specification of a virtual

server

10 Memory Memory Size

11 Virtual CPU Number of CPUs

12 Connected Disk Access Point Connection Block

Storage

13 Connection Destination Connection Destination

Volume

14 Port Port Name Port Name

15 Virtual Network Name Virtual Network Name

16 Private IP Address Private IP Address

17 Global IP Address Displayed when a global

IP address is set.

18 Security Group Security Group Name

19 Action Various operations on

ports

20 Metadata Key Key set for virtual server

metadata

21 Value Value set for virtual

server metadata

21

6.2.1 Action

Figure 20 Port Action

As a port action it provides the following.

1. Edit

2. Security Group Settings

3. Allocate Global IP

4. Deallocate Global IP

5. Delete

22

Create Virtual Server

This is the GUI when creating a new virtual server. Click Create icon of Virtual

Server List.

6.3.1 How to Create Virtual Server

When creating a Virtual Server, it is necessary to create a virtual network in advance.

1. Click an icon of Virtual Server list

2. Set the following and click "Next".

Figure 21 Create Virtual Server (Virtual Server)

Entry of items marked with * (asterisk) to the right of the label is required. (Common to all

windows)

・ AZ

・ Virtual Server Name

・ Virtual Server Type

・ Boot Source

When "Storage" is selected, set the following.

Storage of AZ

Device name

When "Image" is selected, set the following.

Image

23

Device Size

Device Name

When "Snapshot" is selected, set the following.

Storage Snapshot

Device Name

3. Set the following and then click "Next".

Figure 22 Create Virtual Server (Virtual Network)

・ Virtual Network

4. Set the following and click "Next".

Figure 23 Create Virtual Server (Access and Security)

24

・ Key Pair

・ Security Group

5. Set the following and then click "Next".

Figure 24 Create Virtual Server (Optional)

・ Provisioning Script

・ Metadata(Up to 10 items)

Note: You can add, update, and delete the metadata from the virtual server list action

"Edit metadata".

25

6. Confirm the settings so far on the confirmation window. If there are no problems, click

"Create".

Please return to the virtual server list and make sure that the state of the created virtual

server is "BUILD". It will become available when the status is changed to "Active".

Figure 25 Create Virtual Server (Confirmation)

26

Edit Virtual Server

You can edit a server name of a virtual server. You can make transition from

"Edit" in the pull-down of the action of the virtual server you want to edit on the

virtual server list window.

6.4.1 How to Edit Virtual Server

1. Click the "Edit" from the pull-down of the virtual server that you want to edit on the virtual

server list window.

Figure 26 Virtual Server List

2. On the Edit Virtual Server window, enter a new virtual server name and click "Update".

Figure 27 Edit Virtual Server

27

Resize Virtual Server

You can change the specifications (number of virtual CPUs etc.) of a Virtual

Server. You can make transition from "Resize" of the action pull down of the

virtual server you want to change on the virtual server list window.

6.5.1 How to Resize Virtual Server

1. Click "Resize" from the pull-down of the virtual server you want to edit on the virtual server

list window.

Figure 28 Resize

2. Select a new Flavor, the number of Virtual CPUs and Memory allocated to this Flavor will

be shown under the Flavor Details section.

Figure 29 Resize Virtual Server

3. If there are no problems with the new flavor, click the "Resize" button.

4. This completes resizing a virtual server. Return to the server list window, and it will become

available when the status is changed to "ACTIVE".

28

Port Creation

Assign a new port to a virtual server. It is possible to add multiple ports to a

single virtual server.

6.6.1 How to Create a Port

1. Display the port list information from the Virtual Server Details screen

Click the "+" button on the Port List on the Virtual Server Details screen to transfer to the

Create Port screen.

Figure 30 Virtual Server Details Screen(Ports)

29

2. Create a Port

After entering the setting items on the Create Port screen, press the "Create" button to

create the port.

Figure 31 Create Port Screen

The items displayed on the Create Port screen are indicated in the table below.

Table 10 Displayed Content of Create Port Screen

No. Item Name Description

1 Port Name Name of the Port

2 AZ Availability zone where the port is created

3 Management State Management state of the port (true/false)

4 Network Name Select the Network to connect the Port to

5 Subnet Name Select the Subnet of the Network to connect the Port

to

6 Private IP Address Private IP Address settings

Perform settings in the IPv4 format.

*When an IP address that is already in use is specified,

port creation will fail.

30

3. Check the Port Details Screen

Clicking a port name on the port list on the Virtual Server Details screen displays the

Port Details screen. Here it is possible to check detailed information such as the Port ID,

etc.

Figure 32 Port Details Screen

*Operations for ports (editing/setting of security groups/allocation of global IP

addresses/deleting) can be performed from each action in 6.2.1 Action of the Virtual

Server Details screen.

31

Create Private Image

It is possible to create private images of virtual servers.

6.7.1 How to Create Virtual Server Image 1. From the pull-down menu of the target virtual server on the Virtual Server List screen,

click "Create Image". *"Create Image" is displayed when virtual servers are in the

stopped state.

Figure 33 Virtual Server List

2. After setting the image name and the target volume on the Create Virtual Server Image

screen, click the "Create" button to create an image.

Figure 34 Create Virtual Server Image Screen

3. The created image will be displayed with "private" as the visibility on the Image List

screen (For details, refer to 8.1Image List).

Figure 35 Image List Screen

32

Chapter 7 Key Pair

Key Pair List

You can check the list and status of the key pair created in a project.

Figure 36 Key Pair List

Table 11 Displayed Content of Key Pair List Table

No. Item Name Description

1 Key Pair Name Key Pair Name

2 Fingerprint Fingerprint of key pair

3 AZ The Availability Zone the key pair is in

4 Action Deletion of key pair

Key Pair Creation

Newly create the key pair to be used at the time of logging in to the virtual server.

7.2.1 How to Create a Key Pair

1. Click the creation icon "+" on the key pair list screen and display the key pair creation

screen.

33

2. On the "Key Pair Details" step screen, set the below information and click "Next Page".

Figure 37 (Entry of Key Pair Details information)

・ Key Pair Name

・ AZ

3. Check the setting content you have entered so far on "Confirmation" screen. If there are

no problems, click "Create".

Figure 38 (Confirmation for Setting Content)

4. If a key pair has been created, a private key is then started to be downloaded. Keep it in

a secure location.

Key Pair Import

Import the key pair created in another place in order to use it in the virtual server

of IaaS. Here register a public key only.

7.3.1 How to import the key pair

1. Click "Import Key Pair" on the Key Pair List screen.

2. Set the below information and click "Create"

34

Figure 39 Entry of key pair details information

・ Key Pair Name

・ Public Key

・ AZ

3. Check the setting content you have entered so far on the confirmation screen. If there

are no problems, click "Create".

Figure 40 Confirmation of Setting Content

35

Key Pair Details

Click the key pair name on the key pair list to open "Key Pair Details" screen.

Check the detailed information not displayed on the key pair list.

Figure 41 Key Pair Details

Table 12 Displayed Content of Key Pair Details

No. Category Item Name Displayed Content

1 Key Pair Details Key Pair Name Key Pair Name

2 Created At Created At

3 Fingerprint Fingerprint of Key Pair

4 Public Key A string of the key of a key pair

5 AZ Availability Zone where a key

pair exists

36

Key Pair Deletion

You can delete a key pair.

7.5.1 How to delete a key pair

1. On "Key Pair List" screen, click the "Delete" button of the key pair you want to delete.

Figure 42 Key Pair List (Deletion)

2. If you check the content to be deleted and there are no problems, click the "Delete" button.

Figure 43 Confirmation Dialog of Deletion

37

Chapter 8 Image

Image List

You can check an available image list and status, etc.

*Images that have "shared" as their visibility are not displayed in the image list.

Figure 44 Image List

Table 13 Image List Table

No. Item Name Description

1 Image Name Name of an image

2 Status Status of an image

3 Visibility Visibility of an image

4 Protection Protected or not

5 Disk Format Format of an image disk

6 Action Various operations on an image

38

8.1.1 Action

Figure 45 Images Action

Provides the following as an action of an image list.

1. Create Virtual Server

Create a virtual server based on the selected image. For the virtual server

creation, refer to 6.3 Create Virtual Server.

2. Create Storage

Create storage based on the selected image. For the storage details, refer to

10.2 Storage Details.

39

Image Details

You can open image details by clicking an image name on an image list.

Detailed information on an image not displayed in an image list is displayed.

Figure 46 Image List

Table 14 Image Details

No. Classification Item Name Description

1 Information Image Name Image Name

2 Image ID ID to identify an image in unique

3 Status Status

4 Visibility Visibility

5 Protection Protection

6 Checksum Checksum of an image

7 Date and Time

of Creation

Date and Time of Creation

8 Date Updated Date Updated

9 Spec Size Size

10 Storage Format Storage Format

11 Disk Format Disk Format

12 Minimum Disk Minimum Disk Size

40

Chapter 9 Schedule

Schedule List

You can check a list and status of schedule created in a project.

Figure 47 Schedule List

Table 15 Schedule List Table

No. Item Name Description

1 Schedule Name Name of a Schedule

2 Time of Execution Time of Schedule Execution

3 Action Deletion of Schedule

Create Schedule

This is the GUI when creating a new schedule .Click Create icon of Schedule List

9.2.1 How to Create Schedule

When creating a Schedule, it is necessary to create a stack including a scaling policy.

1. Click an icon of schedule list

2. Set the following and click "Next".

41

Figure 48 Entry of Schedule Details information

Schedule Name

Time of Execution

Click "Setting" and set the following.

If "Monthly" is selected, set the below information

Figure 49 Time of Execution Setting(Monthly)

42

If "Weekly" is selected, set the below information

Figure 50 Time of Execution Setting(Weekly)

If "Daily" is selected, set the below information

Figure 51 Time of Execution Setting(Daily)

43

If "Hourly" is selected, set the below information

Figure 52 Time of Execution Setting(Hourly)

If "cron" is selected, set the below information

Figure 53 Time of Execution Setting (cron)

3. Set the following and click "Next"

Figure 54 Setting Execution URL

44

・ Stack

・ Resource

・ Execution URL

Execution URL is automatically set from "Stack" and "Resource".

4. Confirm the settings so far on the confirmation window. If there are no problems, click

"Create"

Figure 555 Confirmation for Setting Content

Schedule Details

Click the schedule name on the schedule list to open "Schedule Details" screen.

Check the detailed information not displayed on the schedule list.

Figure 56 Schedule Detail

45

Table 16 Displayed Content of Schedule Details

No. Category Item Name Displayed Content

1 Schedule Details Schedule Name Schedule Name

2 Time of Execution Time of Schedule

Execution

3 Execution URL Execution URL

Schedule Deletion

You can delete a schedule.

9.4.1 How to delete Schedule

On "Schedule List" screen, click the "Delete" button of the schedule you want to delete

Figure 57 Schedule List

1. If you check the content to be deleted and there are no problems, click the "Delete" button.

Figure 58 Confirmation Dialog of Deletion

46

Chapter 10 Storage

Storage List

You can check a list and status of block storage created in a project.

Figure 599 Block Storage List

Table 17 Block Storage List Table

No. Item Name Description

1 Volume Storage Name of the volume

2 Status Major Storage Status

・ in-use : In use

・ creating : Creating

・ available : Available

3 Connected Virtual

Server

Access point when connected to a virtual server.

4 Size (GB) Volume Capacity

5 Type Type of volume

6 AZ The availability zone in which block storage

reside

7 Action Various operations for a volume

47

10.1.1 Action

Figure 60 Storage Action

Provide the following as actions of a storage list.

1. Edit Storage

Refer to 10.4 Edit Storage.

2. Delete Storage

Delete a storage.

3. Disconnect Storage

Refer to 10.5 Disconnect Storage.

4. Edit Connection

Refer to 10.6 Connect Storage.

5. Create Snapshot

Refer to 10.7 Create Snapshot.

48

Storage Details

You can open storage details by clicking a volume name of a storage list.

Detailed information on a storage not displayed in a storage list is displayed.

Figure 61 Storage Details

49

Table 18 Virtual Server Details

No. Classification Item Name Description

1 Information

Volume Name Volume Name

2 Volume ID Volume ID

3 Description Description of the volume

4 Status The volume status, in-use, etc.

5 Connected

Virtual Server

The connected virtual server

6 Size(GB) Volume capacity

7 Type Volume type

8 AZ Availability Zone

9 Date and Time

of Creation

Created date of Volume

10 readonly Readonly mode

11 attached_mode Read, write, execute

12 Snapshot Date and Time

of Creation

Created date of Snapshot

13 Snapshot

Name

Name of Snapshot

14 Description Snapshot description input by a user

15 Size (GB) Capacity of Snapshot

16 Action Various operations on a snapshot

50

Create Storage

This is the GUI when creating a new storage. You can make transition from an

icon on a storage list window.

10.3.1 How to Create Storage

1. Click an icon on a storage list window.

2. Set the following and click "Create".

Figure 62 Create Storage

・ Volume Name

・ Description

・ Size (GB)

・ Storage Source

Select a type and an AZ if you select "None".

Select a snapshot name to use if you select "snapshot".

Select an image to use, a type, and an AZ if you select "image".

Select a storage to use if you select "storage".

51

Edit Storage

10.4.1 How to Edit Storage

Figure 63 Edit Storage

You can edit the following. Click "UPDATE" after editing.

・ Volume Name

・ Description

Disconnect Storage

If a selected volume is connected to a Virtual Server, you can detach it from the

Virtual Server.

Connect Storage

It is possible to connect selected volumes to a Virtual Server.

Create Snapshot

10.7.1 How to Create Snapshot

1. Enter the following in Create Snapshot window, and click "CREATE".

Figure 64 Create Snapshot

・ Snapshot Name

・ Description

52

Chapter 11 Object Storage

Function Overview

This function provides the functionality for object storage on the IaaS Service

Portal. It enables use of online storage in which data can be stored and

retrieved on an object (their content and metadata) basis.

The functions provided are as follows:

・ Containers

Display of lists and details of containers

Creation, editing, and deletion of containers

Setting of access policies (ACL) for containers *1

Creation and deletion of container metadata *2

・ Objects

Display of lists and details of objects

Creation and deletion of objects

Re-upload of objects

Editing of object metadata *2

Download of objects

Importing of object VMs (Virtual Servers) *2

53

*1 The setting of access policies (ACL) for containers is a function that

enables the setting of container read privileges (X-Container-Read)

and write privileges (X-Container-Read). Using these settings it is

possible control access to containers by the following:

- Projects/users

- Referer headers included in HTTP requests

*2 These functions are not provided in Eastern Japan Region 3 and

Western Japan Region 3.

54

Usage Methods of Object Storage

This chapter explains the following usage methods:

・ Create a container

・ Create an object

・ Download an object

・ Import a VM image

11.2.1 Create a Container

1. Display the Containers List window

Clicking [Storage] -> [Object Storage] displays the Containers List window.

On this window it is possible to refer to the container name, the number of

objects, the amount of usage, and the access policies (ACL) of each

container.

Clicking the "+" button on the Containers List window displays the Create

Container window.

Figure 65 Containers List Window

2. Create a container

After entering each item on the Create Container window, click the "Create"

button and create the container. The created container will be displayed in the

Containers List window.

55

Figure 66 Create Container Window

The setting items listed below are those required when creating a

container.

Table 19 Entry Items for Container Creation

No. Item *1 Description

1 Container Name The name of the container

2 X-Container-Read The access policy (ACL) settings for read

privileges

3 X-Container-Write The access policy (ACL) settings for write

privileges

4 X-Versions-Location *2 The name of the container for versioning

management

5 Container Metadata *2 The key and value to set for the container

metadata

X-Container-Meta-

Access-Control-Allow-

Origin *2

"*" : Initial value

Note: If this value is changed uploading and

downloading of files from the portal is not

possible.

X-Container-Meta-

Access-Control-Max-Age

*2

"3628800" : Initial value

56

*1: For details on each item, refer to the "API Reference - Foundation Service".

*2: These items are not displayed in Eastern Japan Region 3 and Western Japan Region 3.

*3: Container names specified in Eastern Japan Region 3 and Western Japan Region 3 must

be unique within those regions.

3. Check the Container Detail window

The detailed information of a container can be referred to by clicking the

container name on the Containers List window. The Container Detail window

displays objects, container information, and container metadata.

Figure 677 Container Detail Window

57

The following table indicates the items displayed on the Container Detail

window.

Table 20 Container Detail Window Display Items

No. Category Item Description

1 Objects Object Name The name of the object

2 Size The size of the object

3 Content-Type The MIME type of the

object

4 Update Date and

Time (UTC)

The date and time when

the object was created or

metadata was changed

5 Container Info Container Name The name of the container

6 Object Counts The total number of

objects in the container

7 Size The size (in bytes) of the

objects in the container

8 X-Container-Read The access control (ACL)

for read privileges

9 X-Container-Write The access control (ACL)

for write privileges

10 X-Versions-

Location *1

The name of the container

for versioning

management

11 X-Trans-Id The ID assigned to the

request

12 Execution Date

and Time (UTC) *2

The date and time the

transaction is to be

executed

13 X-Fcx-Endpoint-

Request *2

The number indicating

that the request was

received as an API

endpoint

14 X-

Timestamp(UTC)

*2

The time the request was

processed

58

15 Container

Metadata

Container

Metadata Key *1

The key to set for the

container metadata

16 Container

Metadata Value *1

The value to set for the

container metadata

*1: This item is not displayed in Easter Japan Region 3 or Western Japan Region 3.

*2: These items are only displayed in Easter Japan Region 3 and Western Japan Region

59

11.2.2 Create an Object

1. Display the object list information from the Container Detail window

The object list information can be referred to from the Container Detail

window. The object name, size, Content-Type, and Update Date and Time

(UTC) are displayed in the object list information.

Clicking the "+" button on the Container Detail window displays the Create

Object window.

Figure 68 Container Detail Window (Object Section)

Another method for transferring to the Create Object window is to click

"Create Object" in the Action menu on the Containers List window.

60

2. Create an object

After entering each item on the Create Object window, click the "Create"

button and create the object. If the name matches that of an existing object, a

dialog checking whether to update the object will be displayed.

Figure 69 Create Object Window

61

The following table indicates the items displayed on the Create Object

window.

Table 21 Create Object Window Display Items

No. Item* Description

1 Object Name The name of the object

2 File The file to register

The maximum file size is 1 GB.

*When registering a file larger than 1 GB, the

setting for a large object is necessary.

*Please split files by yourself.

3 X-Detect-Content-

Type *2

Automatic and manual setting of the MIME

type of the object

4 Content-Type The MIME type setting of the object

5 X-Copy-From

Container *2

The name of the container of the source object

6 X-Copy-From Object

*2

The name of the source object

7 ETag The setting for the MD5 check sum value of

the object

8 Content-Disposition

*2

The setting for the behavior of the browser

9 Delete At Date (UTC) Specification of the time and date for deletion

of the object, in UTC format

10

Large Object *2

The setting regarding large objects

There are the following three methods

No settings The setting when not handling as a large

object

X-Object-Manifest The setting for dynamic large objects

Sets the container name/object name.

multipart-manifest The setting for static large objects

Sets using JSON format.

11 Object Metadata *2 The key and value to set for the object

metadata

*1: For details on each item, refer to the "API Reference - Foundation Service".

*2: These items are not displayed in Eastern Japan Region 3 and Western Japan Region 3.

62

3. Check the Object Detail window

Clicking the object name in the Object List on the Container Detail window

displays the Object Detail window. You can refer to detailed information such

as object metadata, etc.

Figure 70 Object Detail Window

63

The following table indicates the items displayed on the Object Detail

window.

Table 22 Object Detail Window Display Items

No. Item Description

1 Object Name The name of the object

2 Size The size of the object

3 Content-Type The MIME type of the object

4 Update Date The date and time when the object was

created or metadata was changed

5 ETag The MD5 check sum value of the object/

"A character string consisting of the ETag of

each segment of the manifest combined with

the value of the MD5 check sum" (for manifest

objects)

6 Content-Encoding

*1

The Content-Encoding meta data value

7 Content-Disposition

*1

The setting value for the behavior of the

browser

8 Delete At Date (UTC)

*1

The scheduled time and date for deletion of the

object

9 X-Object-Manifest

*1

The setting for dynamic large objects (the

container name and the prefix name of the split

object)

10 X-Static-Large-Object

*1

If the object is the manifest object of a static

large object, "True" will be returned

11 X-Trans-Id The ID assigned to the request

12 Transaction Date The date and time the transaction is to be

executed

13 URL The URL of the download target object

14 Object Metadata Key

*1

The key to set for the object metadata

15 Object Metadata

Value *1

The value to set for the object metadata

16 Connection *2 The status of persistent connection.

17 X-Fcx-Endpoint-

Request *2

The number indicating that the request was

received as an API endpoint

64

18 X-Timestamp(UTC)

*2

The time the request was processed

*1: These items are not displayed in Easter Japan Region 3 or Western Japan Region 3.

*2: These items are only displayed in Easter Japan Region 3 and Western Japan Region 3.

65

11.2.3 Download an Object

There are the following two methods for downloading an object.

Clicking the "Download" button on the Object Detail window

Selecting from the Action menu of the object list on the Container Detail

window

Figure 71 Object Action Menu on the Container Detail Window

Advisory Notes

・ It is necessary to configure the following setting in IE 11:

Click [Tools] > [Internet options] > [Security] > [Custom level], and then

select "Enable" for [Access data sources across domains].

Uploading and downloading of files may take approximately 90 minutes per

GB depending on the time of day, the amount of data, and the distance to the

target region the data is being transferred to.

Note: By viewing [F12 developer tools] > [Network] in IE 11, it is possible to

confirm the processing status of each API issued from the portal.

11.2.4 Import a VM Image

It is possible to select VM Import from the Action menu on the Container

Detail window to import a virtual server image to the IaaS service. Selecting

"VM Import" on the Action menu transfers you to the VM Import window. For

details on VM import, refer to 30.2.1 VM Import.

66

Advisory Notes

With the container deletion function, it is only possible to perform "Delete"

from the Action menu on the Container List window when the number of

objects in a container is "0".

Regarding the access policy (ACL) settings, as setting permission for

referrer makes reading possible without authentication using a token, it

is not recommended as it lowers the security level. For details, refer to

the "API Reference - Foundation Service".

When you want to register split objects as a single object, perform

settings for a large object. This integrates split objects, enabling batch

download as a single object and VM import.

The maximum number of objects that can be displayed on the Container

Detail window is 10,000. If it is necessary to obtain a list of objects when

the maximum has been exceeded, obtain the list using an API.

67

Chapter 12 Snapshot

Snapshot List Screen

You can display a list of snapshots created in a project and perform operations for

(edit/delete) the snapshots.

Figure 72 Snapshot List

Table 23 Displayed Content of Snapshot List Table

No. Item Name Description

1 Snapshot Name Name of a snapshot

2 Description Description set by a user

3 Capacity(GB) Capacity of snapshot a snapshot (GB)

4 Status Snapshot Status

5 AZ Availability Zone in which a snapshot resides.

6 Action Various Operations for a snapshot

68

12.1.1 Action

Figure 73 Snapshot Action

The following are provided as the actions toward a list of snapshots.

1. Edit

Refer to 12.3 Edit Snapshot Screen.

2. Delete

Delete a snapshot.

Snapshot Details Screen

Click a specific Snapshot Name on the Snapshot List screen and you can check the

detailed information on the snapshot.

Figure 74 Snapshot Details

69

Table 24 Displayed Content of a Snapshot Details Table

No. Classification Item Name Description

1 Information Snapshot Name Name of a snapshot

2 Snapshot ID Unique value attached to a snapshot

3 Description Description set by a user

4 Status Snapshot Status

5 Volume ID The ID of the volume from which a

snapshot is obtained

6 Connected

Virtual Server

The name of the connected virtual

server

7 AZ Availability Zone in which a snapshot

resides

8 Spec Capacity Capacity of snapshot a snapshot (GB)

9 Date and Time of

Creation

Date and time in UTC time when a

snapshot was created

12.2.1 Restore a Snapshot

It is possible to restore block storage from a snapshot. Click the "Restore"

button on the Snapshot Detail screen.

Figure 75 Restore a Snapshot

70

Edit Snapshot Screen

You can edit the following information. After you have edited it, click "UPDATE".

Figure 76 Edit Snapshot

・ Snapshot Name

・ Description

Advisory Notes

Snapshots can only be restored when the following conditions are met.

- The Status of the snapshot is "available"

- The Status of the volume is "in-use"

- The Status of the server is "SHUTOFF"

71

Chapter 13 Virtual Network

Virtual Network List

You can check the list and status of Virtual Networks created in the project.

Figure 77 Virtual Network List

Table 25 Virtual Network List

No. Item Name Description

1 Virtual Network Name Name of a virtual network

2 Status Network Status

3 Allocated Subnet Allocated Subnet

4 AZ Availability Zone in which a virtual network

resides

5 Shared Shared Status

6 Management State Management State

7 Action Various operations on a virtual network

72

13.1.1 Action

Figure 78 Virtual Network Action

As actions of a virtual network list we provide the following.

1. Edit

Refer to 13.4 Edit Virtual Network.

2. Delete

Delete a virtual network.

Virtual Network Details

You can open virtual network details by clicking a virtual network name in the

virtual network list.

Display detailed information on a virtual network that is not displayed in a

virtual network list.

Figure 79 Virtual Network Details

73

Table 26 Virtual Network Details

No. Classification Item Name Description

1 Virtual Network

Overview

Virtual Network Name Name of a virtual server

2 Virtual Network ID Unique Value

3 Project ID Virtual Server Status

4 AZ Availability Zone

5 Status Always ACTIVE

6 Management State UP / DOWN

7 Shared Yes / No

8 External Virtual Network Yes / No

9 Provider Virtual Network -

10 Subnet Subnet Name Subnet Name

Link to Subnet Detail

11 Virtual Network Address Virtual Network Address

12 IP Version IPv4 / IPv6

13 Gateway IP Set Gateway IP

14 Action Various operations on

subnet

15 Port Port Name Port Name

16 Private IP Private IP

17 Connected Device Type of Connected

Device

18 Connected Virtual Server Virtual Server ID

19 Status ACTIVE, etc.

20 Management State UP / DOWN

21 Action Edit operation for port

74

13.2.1 Action for Subnet

Figure 80 Subnet Action

As subnet actions, it provides the following.

1. Edit (edit subnet name, select Gateway "Yes" or "No")

2. Delete

13.2.2 Action for Port

Figure 81 Port Action

As port actions, it provides the following.

1. Edit (edit a port name, select an management state "UP" or "DOWN", edit a private IP

address)

2. Delete

Create Virtual Network

This is a screen to create a new virtual network. Click Create icon of Virtual

Network List window.

13.3.1 How to Create Virtual Network

1. Click an icon of virtual server list window.

75

2. Set the following and click "Next".

Figure 82 Create Virtual Network (Virtual Network)

・ AZ

・ Virtual Network Name

・ Management State

3. Set the following and click "NEXT".

Figure 83 Create Virtual Network (Subnet)

・ Create Subnet (Yes/No)

・ Subnet Name

・ Virtual Network Address (e.g. 192.168.0.0/24)

・ Gateway (Yes/No)

・ Gateway IP

Existing

Existing

76

4. Set the following and click "Create".

Figure 84 Create Virtual Network (Subnet Details)

・ DHCP (Enable/Disable)

・ IP Address Allocation Pool

Click "Add" to assign multiple address ranges.

・ DNS Server

Click "Add" to set multiple DNS servers.

・ Adding a Routing Setting

Click "Add" to set multiple routes.

5. Confirm the settings so far on the confirmation window. If there are no problems, click

"CREATE".

77

Figure 85 Confirmation of Setting Details

78

Edit Virtual Network

13.4.1 How to Edit Virtual Network

You can edit the following. After editing, click "UPDATE".

Figure 86 Edit Virtual Network

・ Virtual Network Name

・ Management State (UP/ DOWN)

Add Subnet

In case user does not create subnet in the timing of "Create Virtual Network"

operation, it is possible to add subnet from Virtual Network Detail Window.

79

Chapter 14 Virtual Router

Virtual router list

On the Virtual router list screen, you can display a list of virtual routers

created in a project and perform operations (Newly create/Delete/Gateway

settings/Delete gateway) for the virtual routers.

Figure 87 Virtual router list

Table 27 Displayed Content of a Virtual Router List Table

No. Item Name Description

1 Virtual router name Name of a virtual router

2 Status Virtual router status

*ACTIVE : In operation

3 AZ Availability Zone in which a virtual router is

located

4 Action Various operations for a virtual router

80

14.1.1 Action

Figure 88 Virtual Router Actions

The following are provided as the actions for a list of virtual routers.

1. Edit

Edit virtual router.

2. Delete

Delete a virtual router.

Virtual Router Overview

Click a specific Virtual Router Name on the Virtual router list screen and you

can check the detailed information on the snapshot. If ports exist, you can

display a list of ports and perform operations (Delete/Edit/Allocate Global IP) for

the ports.

Figure 89 Virtual Router Overview

81

Table 28 Displayed Content of a Virtual Router Details Table

No. Classification Item Name Description

1 Virtual Router

Overview

Virtual Router Name Name of a virtual router

2 Virtual Router ID Unique value attached to a virtual

router

3 AZ Availability Zone

4 Status Virtual router status

5 External Gateway IP address of an external gateway

6 Routing

Configuration

Destination Destination network address(CIDR)

7 Nexthop Nexthop IP address

8 Interface Port Name Name of a port

9 Private IP Private IP

10 Global IP Global IP

11 Classification network:router_interface, etc.

12 Management State true / false

13 Status Interface Status

ACTIVE, etc.

14 Action Various operations for an interface

14.2.1 Action

Figure 90 Interface actions

The following are provided as the actions for an interface.

1. Delete

Deletes a port.

2. Edit

Edits a port.

3. Allocate Global IP

Allocates a global IP.

82

Virtual Router Creation

On the Create a new router screen, you can newly create a virtual router.

14.3.1 How to create a virtual router

1. Click the icon of the Virtual router list.

2. Set the below information and click "CREATE".

・ AZ

・ Virtual router name

Figure 91 Create a new router

Edit a Virtual Router

On the Edit Virtual Router screen, it is possible to edit the gateway settings and

the routing configuration.

14.4.1 How to edit a virtual router

1. On the Virtual Router Detail screen, click the "Edit" Action of the virtual router to edit.

2. On the Edit Virtual Router screen, you can edit the following. After editing, click "Update".

・ Gateway Setting

You can select a candidate External Virtual Network from the pull-down menu.

・ Routing Configuration

Routing can be added by clicking "Add" after configuring the Destination and

Nexthop.

Routing can be deleted by clicking "Delete".

83

Figure 92 Edit Virtual Router

Add interface

You can newly add an interface on the Virtual Router Overview screen. See below

for the Add interface screen.

Figure 93 Add interface

84

Chapter 15 Security Group

Security Group List

You can check the list and status of the Security Group created in a project.

Figure 94 Security Group List

Table 29 Displayed Content of Security Group List Table

No. Item Name Description

1 Security Group Name Security Group Name

2 Description Description of Security Group

3 Action Various Operations for Security Group

15.1.1 About Operation

Figure 95 Security Group Action

85

See below for the operations for security group.

1. Manage Rules

Refer to 15.4, 15.5, 15.6, and 15.7.

2. Edit a Security Group

Refer to 15.9.

3. Delete

Refer to 15.10.

Security Group Creation

Newly create a security group.

15.2.1 How to create a security group

1. Click the creation icon "+" at the upper right on the security group list screen.

2. Set the below information and click "Next Page".

Figure 96 (Security Group Details)

・ Security Group Name

・ Description

3. Check the setting content you have entered so far on the confirmation screen. If there

are no problems, click "Create".

86

Figure 97 Confirmation for Setting Content

Security Group Details

Click Security Group Name on the security group list to open the Security Group

Details.

You can check the detailed information not displayed on the security group list.

Figure 98 Security Group Details

87

Table 30 Displayed Content of Security Group Details

No. Category Item Name Description

1 Security Group Details Security Group Name Security Group Name

2 Security Group ID Security Group ID

3 Description Description of Security

Group

4 Applied Rule Direction ingress/egress

5 IP Version IPv4/IPv6

6 Protocol TCP / UDP / ICMP /

Other protocols

7 Port Range Port Range

* In case of "ICMP"

specified as protocol,

this value should be

ICMP type and code.

8 Connected to Connected to

Manage Security Group Rules

You can check the list and status of the security group and add/import/export

rules.

Figure 99 Security Group Rule Management

88

Table 31 Displayed Content of Manage Security Group Rules

No. Item Name Description

1 Security Group Name Security Group Name

2 Direction ingress/egress

3 IP Version IPv4/IPv6

4 Protocol HTTP / HTTPS / TCP / SSL

5 Port Range Port Range

6 Connected to Destination of Connection

7 Action Deletion of security group rules

15.4.1 How to Transfer to the Rule Management Screen

On the security group list, select "Manage Rules" from the pull-down menu of the

security group you want to manage for its rules, or click the "Manage Rules"

button on the Security Group Details screen to go to the Rule Management

screen.

Figure 100 Security Group List (Rule Management)

Figure 101 Security Group Details (Rule Management)

89

Addition of Security Group Rules

You can newly add the rules to an existing security group.

15.5.1 How to Add Security Group Rules

1. Click the "Add Rule" button on the Manage Security Group Rules screen.

Figure 102 Rule Management (Rule Addition)

2. Set the below information and click "Add". (*1)

Figure 103 Add Rule

・ Rule

If "Custom TCP Rule" or "Custom UDP Rule" is selected, set the below information.

Direction (Receive/Send)

Open Port (Port/Port Range)

Connected to (CIDR/Security Group)

If "Custom ICMP Rule" is selected, set the below information.

Direction (Receive/Send)

Type

Code

Connected to (CIDR/Security Group)

If you select "Other Protocols", set the below information.

90

Direction (Receive/Send)

IP Protocol

Connected to (CIDR/Security Group)

If you select "ALL ICMP", "ALL TCP(1-65535)", or "ALL UDP(1-65535)", set the

information below.

Direction (Receive/Send)

Connected to (CIDR/Security Group)

If you select "DNS(53)", "HTTP(80)", "HTTPS(443)", "IMAP(143)", "IMAPS(993)",

"LDAP(389)", "MS SQL(1433)", "MYSQL(3306)", "POP3(110)", "POP3S(995)",

"RDP(3389)", "SMTP(25)", "SMTPS(465)", or "SSH(22)", set the information

below.

Connected to (CIDR/Security Group)

*1

In "Add Rule", you cannot add the same rule as the one added by default when

a security group is created. If you want to add the same rule, export the default

rule and import it. Please refer to 15.6 for how to export and 15.7 for how to

import.

Figure 104 Rule Management (Default Rules)

91

Export Security Group Rules

You can export security group rules.

15.6.1 How to Export Rules

1. Click the "Export" button on the Manage Security Group Rules screen.

Figure 105 Rule Management (Export)

2. The security group rule list is downloaded in the JSON format.

Figure 106 Rule Management (Export File Download)

Import Security Group Rules

You can import security group rules.

15.7.1 How to Import Rules

1. Click the "Import" button on the Manage Security Group Rules screen.

Figure 107 Rule Management (Import)

2. Click the "Import" button and select a file to import.

Figure 108 Confirmation of Importing Rules

92

3. A security group rule is created from an imported file.

Deletion of Security Group Rules

You can delete security group rules.

15.8.1 How to Delete Rules

1. Click the "Delete" button of the rule to be deleted on the Manage Security Group Rules

screen.

Figure 109 Manage Security Group Rules (Deletion)

2. If you check the content to be deleted and there are no problems, click the "Delete" button.

Figure 110 Confirmation of Deletion

93

Editing a Security Group

You can edit the group name and description of a security group.

15.9.1 How to Edit a Security Group

1. On the Security Group List screen, select "Edit a Security Group" from the pull-down

menu of the security group to be edited.

Figure 111 Security Group List (Edition)

1 On the Edit a Security Group screen, enter the new security group name and description

and click "Update".

Figure 112 Edit a Security Group

94

Deletion of Security Group

You can delete a security group.

15.10.1 How to Delete a Security Group

1. On the security group list screen, select "Delete" from the pull-down menu of the security

group to be deleted.

Figure 113 Security Group List (Deletion)

2. If you check the content to be deleted and there are no problems, click the "Delete" button.

Figure 114 Confirmation of Deletion

95

Chapter 16 Global IP

Global IP List

You can refer to a list of reserved global IP.

Figure 115 Global IP List

16.1.1 Action

Figure 116 Global IP Action

Reserved Global IP

You can allocate global IP from a port action of virtual server details. Click "Add"

from a global IP list window when you get a new global IP.

1. Select Global IP Pool and click "NEXT".

Figure 117 Reserved Global IP (Reserved Global IP)

96

2. When you want to associate the acquired global IP with a port, select

"Global IP Address assignment port", and click "Next".

If you do not assign to a port, leave a "Global IP Address assignment port"

blank and click "Next".

Figure 118 Reserved Global IP (port assignment)

3. Confirm the settings so far on the confirmation window. If there are no problems, click

"SETTING".

Figure 119 Reserved Global IP (Confirmation)

Allocate Global IP

Select a resource to be allocated from the global IP address assignment port, and click

"SETTING".

Figure 120 Allocate Global IP

97

Deallocate Global IP

Deallocate the global IP assigned to the resources like a virtual server from the

resource.

Figure 121 Deallocate Global IP

Release Global IP

IP addresses that are no longer needed will be released from the global IP pool

by clicking "Release".

Figure 122 Release Global IP

98

Chapter 17 Firewall

Function Overview

This function provides the functionality for managing firewalls. The following

functions are provided.

・ Firewall

Display of lists and details of firewalls

Creation, editing, and deletion of firewalls

Association of firewalls and virtual routers

Association of firewalls and firewall policies

・ Firewall Policy

Display of lists and details of policies

Creation, editing, and deletion of policies

Association of policies and firewall rules (Registration, deletion, and

sorting)

・ Firewall Rule

Display of lists and details of rules

Creation, editing, and deletion of rules

The created firewall, firewall rule, firewall policy, and virtual router must be in

the same availability zone to be used.

99

Firewall List Screen

Selecting [Side Bar]-[Networking]-[Firewall] displays the Firewall List screen

(Refer to "Figure 123 Firewall List"). This section explains the screen that is

initially displayed.

Figure 123 Firewall List

Create a Firewall

Display Firewall Details

Display Policy Details

Display Firewall Rule List

Operate the Firewall

Display Firewall Policy List

100

Firewall Creation Procedure

The procedure for creating a firewall is given below.

(1) Confirm a Virtual Router

When creating a firewall, associate the firewall with a virtual router. Confirm

that the virtual router has been created in advance. If it has not been

created, refer to "14.3 Virtual Router Creation" and create a virtual router.

Figure 124 Virtual Router List

(2) Create a Firewall Rule

Click the "Rule List" button on the Firewall List screen. Clicking the "+"

button on the Firewall Rule List screen creates a firewall rule.

Figure 125 Firewall Rule List

z

z

z

101

(3) Create a Firewall Policy

Click the "Policy List" button on the Firewall List screen. Clicking the "+"

button on the Firewall Policy List screen creates a firewall policy. On the

Create Firewall Policy screen, select the firewall rule created in (2). Clicking

the "Sort" button enables sorting of the selected rules into the desired order.

For the sorting method, refer to "17.3.1 Firewall Rule Sorting Operation".

図 1 ファイアーウォールポリシー一覧

(4) Create a Firewall Policy

It is possible to register multiple firewall rules with a firewall policy. The

validity of registered rules is verified in ascending order, and if verification is

successful the action set for the rule (Allow/Deny) is performed. If you want

to change the order of rule application, selecting the following menu displays

the Sort Firewall Rule screen (Refer to "Figure 119 Sorting Firewall Rules").

- Click "Reflect order display" on the Create Firewall Policy screen.

- Click "Reflect order display" on the Edit Firewall Policy screen".

Figure 126 Firewall Policy List

102

(5) Create a Firewall

Clicking the "+" button on the Firewall List screen creates the firewall. On the

Create Firewall screen, set the firewall policy created in (3) and the already

created virtual router from (1).

Figure 127 Firewall List

17.3.1 Firewall Rule Sorting Operation

It is possible to register multiple firewall rules with a firewall policy. The validity

of registered rules is verified in ascending order, and if verification is successful

the action set for the rule (Allow/Deny) is performed. If you want to change the

order of rule application, selecting the following menu displays the Sort Firewall

Rule screen (Refer to "Figure 128 Sorting Firewall Rules").

- Click "Reflect order display" on the Create Firewall Policy screen

- Click "Reflect order display" on the Edit Firewall Policy screen

Figure 128 Sorting Firewall Rules

103

This section explains the operation procedure for the Sort screen.

(1) Set the values in the "Sort" text field in the desired order. An example of sorting

is given in the following figure.

*The default value (integer) of the order of sorting is the same as the order

defined on this portal. It has no connection to the upper limit of rules.

*If you need to set a higher sorting priority than 1, it is possible to do so by

specifying a minus integer for sorting. [Input value: Integers in the range of -

999 (high priority) to 999 (low priority)]

*If the same value is set at the same time in multiple rules, reordering of those

rules will not be performed.

Example:

When moving FirewallRuleA to between FirewallRuleC and FirewallRuleD.

(2) Clicking the "Reflect order display" button sorts the rules in the order of the

specified values.

(3) After confirming the rules are in the desired order, click the "Fix" button to

close the window. If the "Fix" button is clicked even without the "Reflect order

display" button being clicked, the order settings will be reflected anyway.

Change

FirewallRuleA's order to

Reflect order

104

Advisory Notes

This section explains the advisory notes for each function.

・ Indication of "Source IP [Port]" and "Destination IP [Port]" on the Firewall Rule

List

If an IP address and port number are not set, "(any)" will be displayed in the

"Source IP [Port]" and "Destination IP [Port]" fields. If the source or

destination port is set, "[the_port_number]" or

"[the_range_of_port_numbers]" will be displayed.

105

Chapter 18 Load Balancer

Load Balancer List

The load balancers explained in this section are provided for Japan East

1/Japan East 2/Japan East 3/Japan West 1/Japan West

2/UK/Finland/Germany/Spain/US region. Please refer to Chapter 19 Load

Balancer (Eastern Japan Region 3/Western Japan Region 3) when using

Eastern Japan Region 3 or Western Japan Region 3.

You can check a list and status of load balancers created in the project.

Figure 129 Load Balancers List

Table 32 Load Balancer List Table

No. Item Name Description

1 Load Balancer Name Name of a load balancer

2 DNS Name FQDN for accessing a load balancer

3 Status Status of a load balancer (In Service, etc.)

4 Action Various operations on a load balancer

18.1.1 Action

Figure 130 Load Balancer Action

You can select the necessary Action based on the content of each target screen.

106

Load Balancer Details

You can open load balancer details by clicking a load balancer name in a load

balancer list.

Detailed information on a load balancer not displayed in a load balancer list is

displayed.

Figure 131 Load Balancer Details

Table 33 Load Balancer Detailed

No. Classification Item Name Description

1 Load Balancer

Information

Load Balancer Name Name of a load balancer

2 Type public / internal

3 Grade Standard / Middle / High

4 Listener Load Balancer

Protocol

HTTP / HTTPS / TCP /

SSL

5 Load Balancer Port Listen Port Number of a

load balancer

6 Virtual Server

Protocol

HTTP / HTTPS / TCP /

SSL

7 Virtual Server Port Listen Port Number of a

virtual server

8 Certificate Select for HTTPS, SSL

107

9 Session Persistence

Policy

Policy Name

10 SorryServer Redirect

Policy

Policy Name

11 Subnet Information Subnet Subnet Name

12 Security Group

Information

Security Group Security Group Name

13 Health Check

Information

Health check

consecutive success

times judged as

recovery

Times

14 Health check

execution time

interval (sec)

Seconds

15 Protocol HTTP / HTTPS / TCP /

SSL

16 Port Port Number

17 URL Health check target URL

18 Health check

response timeout

time (sec)

Seconds

19 Health check

consecutive failed

times judged as faulty

Times

20 Virtual Server

Information

Virtual Server Name Virtual server name of

distribution target

21 IP Address IP Address

22 Status Virtual Server Status

23 AZ Availability Zone

24 Dedicated Display Dedicated Virtual

Servers

"true" is displayed for

dedicated virtual servers.

25 Policy Information Policy Name Policy Name

108

26 Session

Persistence Policy

Information

Maximum time to

maintain session

(sec)

Seconds

27 Policy Information

Policy Information

to redirect to

SorryServer

Policy Name Policy Name

28 Redirect Destination

Location URL

URL

109

Create Load Balancer

This is the GUI when creating a new load balancer. You can make transition

from an icon on a load balancer list window.

18.3.1 How to Create Load Balancer

1. Click an icon of load balancer list.

2. Set the following and click "NEXT".

Figure 132 Create Load Balancer (Load Balancer Definition)

・ Load Balancer Name

・ Type (public/internal)

・ Grade (Standard, Middle or High)

・ Load Balancer Protocol (HTTP/HTTPS/TCP/SSL)

・ Listen Port Number of a load balancer

・ Virtual Server Protocol (HTTP/HTTPS/TCP/SSL)

・ Listen Port Number of a virtual server

・ Certificate (if you select HTTPS or SSL as a load balancer protocol)2

2 Certificate cannot be registered on IaaS Service Portal. For certificate registration, please use API.

110

3. Set the Subnet and click "NEXT".

Figure 133 Create Load Balancer (Subnet Settings)

4. Perform settings for the Security Group then click "NEXT".

Figure 134 Create Load Balancer (Security Group Settings)

111

5. Confirm the settings so far on the confirmation window. If there are no problems, click

"CREATE".

Figure 135 Create Load Balancer (Confirmation)

Add Subnet

You can select a subnet to add to a load balancer.

18.4.1 How to Add Subnet

1. Select a predefined subnet you want to add to a load balancer displayed in the "Subnet"

then move to the "Selected Subnet".

2. Click "Add".

112

Delete Subnet

You can select a subnet to remove from a load balancer.

18.5.1 How to Delete Subnet

1. Select the deletion target from the subnet displayed in the list and click "Delete".

Add Listener

You can select a listener to add to a load balancer.

18.6.1 How to Add Listener

It is possible to select the listener to add to a load balancer. The method for adding

a listener is indicated below.

1. In "Load Balancer Protocol", select a protocol accepted by a load balancer. (HTTP/HTTPS/

TCP/SSL).

2. Enter a port number acceptable for a load balancer in "Load Balancer Port".

3. Select a protocol to communicate from a load balancer to a virtual server in "Virtual Server

Protocol". (HTTP/HTTPS/TCP/SSL)

4. Enter a port number acceptable for a virtual server in "Virtual server port".

5. Select a credential if you select "HTTPS" or "SSL" in "Load Balancer Protocol".

6. Click "Add".

Delete Listener

You can delete listeners of load balancers from the displayed list screen.

Add Virtual Server

You can select a virtual server to which a load balancer distributes requests.

18.8.1 How to Add Virtual Server

1. From a virtual server list, select a server you want to add to a load balancer.

2. Select a port, and confirm the IP address that will be the target of load distribution by the

load balancer.

3. Click "Add".

113

Delete Virtual Server

You can delete a virtual server to which a load balancer distributes requests.

Just out of the load balancer distribution target, the virtual server itself will

remain.

18.9.1 How to Delete Virtual Server

1. From a virtual server list, select a server you want to delete from a load balancer.

2. Click "Delete".

Create Session Persistence Policy

You can create a session persistence policy for a load balancer.

1. Set the following items and click "Create".

・ Policy Name

・ Maximum time to maintain session (sec)

Create SorryServer Policy

You can create a policy to redirect to SorryServer when there is no destination

for a load balancer to distribute.

18.11.1 How to Create SorryServer policy

1. Set the following items and click "Create".

・ Policy Name

Redirect Destination Location URL

Create/Delete Policy

For a load balancer, you can set a session persistence policy created and a

SorryServer policy to set.

1. Set the following items and click "Set".

・ Load Balancer Port

・ Session Persistence Policy to set

114

・ SorryServer Policy to set

* The values of Session persistence policy and SorryServer policy are displayed by

selecting a policy.

Set Health Check Information

You can set health check information of a virtual server by a load balancer.

The items that can be set are as follows:

・ Health check consecutive success times judged as recovery

・ Health check execution time interval (sec)

・ Protocol (HTTP/HTTPS/TCP/SSL)

・ Port

・ URL

・ Health check response timeout time (sec)

・ Health check consecutive failed times judged as faulty

Set Security Group

You can set a security group on a load balancer.

1. Select a predefined security group you want to add to a load balancer displayed in "Security

Group", then move to "Security Group Settings", and click "Set".

Set Cipher Suite

You can set cipher suites on a load balancer. The method for setting is given

below.

1. Select "Add" or an action of the created cipher suite.

2. Select a cipher suite name and a cipher suite to use in the cipher suite add (edit) dialog.

3. Click "Set".

115

Chapter 19 Load Balancer (Eastern Japan Region

3/Western Japan Region 3)

Function Overview

This section explains the load balancer function that provides the load

distribution function. By using load balancers, it is possible to distribute the load

among multiple virtual servers when requests are received from the network.

This prevents specific virtual servers from having excessively high loads, and

enables continued provision of smooth speed.

However, the load balancers explained in this section, and the operation

screens displayed are those of the function provided in Eastern Japan Region

3/Western Japan Region 3. Please refer to Chapter 18 Load Balancer since the

provided functions differ from those of the regions other than Eastern Japan

Region 3/Western Japan Region 3.

The provided functions are as follows:

・ Create Load Balancer

By creating load balancers and entering the load distribution settings as

shown in the Creation screens, it becomes possible to use load

balancers.

・ Refer to Load Balancer (List / Details )

It is possible to check the statuses of create load balancers on the List

screen, and to check their detailed information.

・ Delete Load Balancer

It is possible to delete created load balancers (for details, refer to the

"19.3How to Delete Load Balancer").

.

116

How to Use Load Balancer

This section explains the method of using load balancers, from the creating of

load balancers, entry of settings for load distribution, up to confirming the settings

after creation.

Table 34 Load Balancer Creation Procedure

No. Creation Procedure Main Entry Content

1 Create a

Load

Balancer

Set Basic

Information

Set the load balancer name, and

information such as the subnet where

the load balancer is to be deployed, etc.

2 Load

Balancing

Settings

Load Balancing

Settings (1/2)

Set the Listener*1 name and the

protocols of the target requests, etc.

3 Load Balancing

Settings (2/2)

Set the Pool*2 name and the load

distribution algorithms, etc.

4 Select Virtual

Servers

Select the virtual servers that are

associated with the pool.

5 Health Monitor*3 Set the method for monitoring the

activity statuses of the virtual servers

that are associated with the pool.

6 Confirmation Confirm the content of settings, and set

load distribution.

7 Check After

Creation

Check Detailed

Information

From the Load Balancer List / Details

screens, confirm the detailed

information of load balancer settings.

*1 Listener: A process that checks for connection requests for the load balancer.

*2 Pool: The unit in which virtual servers that will handle requests are managed.

*3 Health Monitor: Performs "alive monitoring" for the virtual servers in the pool.

117

19.2.1 Create a Load Balancer

1. Display the Load Balancer List Screen

Press the [Load Balancers] menu to display the Load Balancer List screen.

On this screen it is possible to refer to information such as the load balancer

names, private IP addresses, provisioning statuses, and operation statuses of

each load balancer.

Click the "+" button on the upper-right of the Load Balancer List screen, and

transfer to the Create Load Balancer screen.

Figure 136 Load Balancer List Screen

2. Create a Load Balancer

After entering the basic information on the Create Load Balancer screen,

click the "Create" button to create the load balancer.

When there is already a load balancer that was created in advance, by

selecting the already created load balancer from "Reflected source

Loadbalancer", it is possible to reflect the settings of that load balancer on the

entry items. This makes it possible to create a load balancer with that setting

content.

Figure 137 Create Load Balancer Screen

118

The setting content that is necessary when creating a load balancer is as

follows:

Table 35 Setting Content when Creating a Load Balancer

Item Name Setting Content

Loadbalancer Name Set the name for the load balancer.

Description It is possible to set any desired character string.

Admin Status Set the management state for after creation is complete.

- UP: Active state (default value)

- DOWN: Inactive state

Private IP Address Specify the private IP address that will be used for requests

to the load balancer.

Subnet Specify the subnet that the virtual servers that will be

associated with the pool belong to.

After a load balancer is created, that load balancer will be displayed on the

Load Balancer List screen.

19.2.2 Load Balancing Settings

The statuses of created load balancers can be confirmed on the Load

Balancer List screen. When it has been confirmed that the Provisioning Status

of a load balancer is "ACTIVE", it is possible to perform load balancing settings

using "Load Balancing Setting" in the Action menu.

1. Loadbalancing Info (1/2)

On the Loadbalancing Info (1/2) screen, set the Listener Name, the protocol

to use for handling requests, etc., and create the listener.

When there is already a listener that was created in advance, by selecting

the already created listener from the "Reflected Source Listener Name" it is

possible to reflect the settings of that listener on the entry items. This makes it

possible to create a listener with that setting content.

119

Figure 138 Loadbalancing Info (1/2) Screen

The items to set are as follows:

Table 36 Setting Content of the Load Balancing Info (1/2) Screen

Item Name Setting Content

Listener Name Set the name for the listener.

Description It is possible to set any desired character string.

Admin Status Set the management state for after creation is complete.

- UP: Active state (default value)

- DOWN: Inactive state

Protocol Specify the communication protocols for the Front End and Back End

sides. The following four combinations of [Front End Protocol]-[Back

End Protocol] can be specified.

[Setting Values] HTTP-HTTP, HTTPS-HTTP, HTTPS-HTTPS, TCP-

TCP

Frontend Port Specify the port number that will be used for requests to the load

balancer.

Specifiable range of port numbers: 1 - 65535

Max Connections The maximum number of connections that the listener will process.

Specifiable values: 1 - 32768

SSL Certificate

URL

When using HTTPS communication, set the URL of the server

certificate.

120

After the listener is created, click "Next".

2. Loadbalancing Info (2/2)

On the Loadbalancing Info (2/2) screen, set the Pool Name, the Load

Distribution Algorithm, etc. and create the pool.

When there is already a pool that was created in advance, by selecting the

already created pool from the "Reflected Source Pool Name", it is possible to

reflect the settings of that pool on the entry items. This makes it possible to

create a pool with that setting content.

Figure 139 Loadbalancing Info (2/2) Screen

The items to set are as follows:

Table 37 Setting Content of the Loadbalancing Info (2/2) Screen

Item Name Setting Content

Pool Name Set the name of the pool.

Description It is possible to set any desired character string.

Load Balancing

Algorithm

Set the algorithm to use for load balancing to the virtual

servers.

Set one of the following values:

- ROUND_ROBIN: The round robin method.

Requests are distributed to virtual servers in order.

- LEAST_CONNECTIONS: The least connections

121

method.

Requests are distributed to the virtual server that currently

has the least connections.

- SOURCE_IP: The source IP address method.

Requests are distributed based on the source IP address.

Session Persistence

Policy

The session persistence policy applied to the pool. Set one of

the following values:

- HTTP_COOKIE

Maintains sessions using the cookies generated by load

balancer.

- APP_COOKIE

Maintains sessions using the cookies generated from

virtual servers.

- SOURCE_IP

Maintains sessions using the IP addresses of clients.

Back End Protocol The same value as the communication protocol that was

specified for the back end of the listener is displayed.

Backend Port The number of the TCP or UDP port for listening

When settings for the pool are complete, click "Next".

3. Select a Virtual Server

Select a virtual server to perform load distribution for. As shown in the

screen below, check the virtual server that you want to perform load

distribution for, and set the port for communication using the pull-down menu.

Figure 140 Select Virtual Server Screen

122

When selection of virtual servers is complete, click "Next".

4. Health Monitor

Perform settings for the load balancer to check the operational status of the

virtual server from the Health Monitor screen.

Figure 141 Health Monitor Screen

The items to set are as follows:

123

Table 38 Setting Content for the Health Monitor Screen

Item Name Setting Content

Check Method Set the monitoring method to use for the virtual server that is that

target of load balancing.

- PING/TCP/HTTP/HTTPS

Admin Status Specify the admin status after creation.

- UP: Enabled status (default value)

- DOWN: Disabled status

Check Interval (sec) Specify the execution interval for health checks, using a value of

1 – 99999.

Timeout (sec) Specify the length to time to timeout of health checks, using a

value of 1 – 99999.

* Set a value smaller than that of the Check Interval.

Abnormality

Detection Threshold

(times)

Set the number of consecutive times a health check must fail for

the virtual server that is the target of load balancing to be

considered as having failed, using a value of 1 - 99999.

HTTP Method Set the HTTP request method to use when executing health

checks, using one of the values below.

- DELETE/GET/POST/PUT

Check Path Set the path that is the target of the health check.

Assumed Response

Code

Set the response code to return when a health check is

successful.

- When there is one response code assumed, enter that value

- When there are multiple response codes assumed, enter the

values separated by commas

Example: 200, 204

- When the assumed response codes are a range, enter the

values connected by a hyphen

Example: 200-204

When selection of the health monitor is complete, click "Next".

124

5. Confirm

On the confirm screen, check each of the settings in order, and if there are

no corrections necessary, click "Create". A load balancer with these settings

will be created.

Figure 142 Confirm Screen

125

19.2.3 Confirmation after Creation

After creating a load balancer, it is possible to confirm it from the Load

Balancer List screen. When the created load balancer is displayed, clicking the

link of the load balancer name displays the content that was set when it was

created.

Figure 143 Load Balancer List Screen

Figure 144 Load Balancer Detail Screen

126

Figure 145 Listener Detail Screen

Figure 146 Loadbalancing Server Pool Details Screen

127

How to Delete Load Balancer

To delete load balancer, you need to delete each item in the following steps.

Step 1: Delete pool

On the Listener Detail screen, click action menu and then select "Delete".

Step 2: Delete listener

On the Load Balancer Detail screen, click action menu and then select "Delete".

Step 3: Delete load balancer

On the Load Balancer List screen, click action menu and then select "Delete".

Points to Note

When editing each setting, it is necessary to do so using the API, or delete

the load balancer and create a new one.

128

Chapter 20 DNS

DNS Zone List

You can check the list and status of DNS zone which is created in project.

Figure 147 DNS Zone List

Table 39 Displayed Content of DNS Zone List Table

No. Item Name Displayed Content

1 DNS Zone Name Name of DNS zone

2 Number of Records Number of records registered in a zone

3 Name Server Name server assigned to the zone

4 Description Description of DNS zone

5 Action Various operation for DNS zone

129

20.1.1 About Operation

Figure 148 DNS zone action

The following items will be provided as the operation of DNS zone list.

1. Record Settings

Refer to 20.3, 20.4 and 20.6.

2. Zone Delete

Refer to 20.8.

DNS Zone Registration

DNS zone will newly be registered.

20.2.1 How to Register DNS Zone

1. Click the icon "+" at the upper right on the DNS zone list screen.

2. Enter appropriate information as below and click "Next".

Figure 149 Registration

130

・ DNS Zone Name

・ Description

3. Check the setting details you have entered so far on the confirmation screen. If there are

no problems, click "Create".

Figure 150 Confirmation of Setting Details

4. If "Confirmation authentication of DNS zone registration" dialog is displayed after it is

created, follow the displayed content and register DNS zone again. The successfully

registered DNS zone information and name server information can be confirmed using

the DNS Zone List screen.

Figure 151 "Confirmation Authentication of DNS Zone Registration" Dialog

131

Record List

You can move to this screen by selecting "Record Management" in the pull-down

menu of "Action" in the DNS zone you want to edit on the DNS zone list screen.

Figure 152 Record List

Table 40 Displayed Content of Record List Table

No. Item Name Displayed Content

1 Record Name Record Name

2 Type NS / A / AAAA / CNAME / MX / TXT / LBR / SRV

/ PTR

3 Value Value

4 TTL TTL Value

5 Policy None / Fail Over / Weighting

6 Action Various Operations for Record

132

20.3.1 About Operation

Figure 153 Record List Action

The below items will be provided as the operations of Record List.

・ Setting

Refer to 20.6 Editing Records.

・ Delete

Please refer to 20.7 Record Deletion.

Record Details

You can open record details by clicking the record name in the Record List.

You can check the detailed information that is not displayed directly in the record

list.

Figure 154 Record Details (When policy is "None")

133

Figure 155 Record Details (When policy is "Weighting")

Figure 156 Record Details (When policy is "Fail Over")

134

Table 41 Displayed Content of Record Details Table

No. Category Item Name Displayed Content

1 Record Details DNS Zone DNS Zone

2 Record Name Record Name

3 Type NS / A / AAAA / CNAME / MX /

TXT / LBR / SRV / PTR

4 TTL TTL Value

5 Value Value

6 Description Description of Records

7 Policy None/Fail-Over/Weighting

8 Weight Weight Weighting Value

9 Failover Failover PRIMARY / SECONDARY

10 Health Check

Preference

(If failover is selected)

IP Address Health Check Destination IP

Address

11 Port Health Check Destination Port

12 Protocol HTTP / HTTPS / TCP

13 Health Check

Path

Health Check Path

14 Health Check

Destination

Domain Name

Health Check Destination

Domain Name

Record Registration

Records can newly be registered.

20.5.1 How to register records

1 Click the icon "+" on the upper right of the Record List screen.

2 Enter the Record Information and click "Next".

Note: The setting items of Record Information differ depending on the Record Type. For

details of Record Information, refer to "Record Management Functions" of "DNS Service"

in the "IaaS Features Handbook".

The setting screens of Record Information for each type are shown below.

135

・ If type "A" or "AAAA" is selected, enter appropriate information on the screen below.

Figure 157 Create Record (Record Information: For type A)

Record Name

TTL

Value (Usable IPv4 address for type "A" and Usable IPv6 address for type "AAAA")

Description

Policy (No/Failover/Weight Settings)

Details of Failover (When Failover is selected in Policy)

Figure 158 Record Information (Failover Details)

Failover (PRIMARY / SECONDARY)

Health Check Setting (When Failover is selected in Policy)

136

Figure 159 Record Information (Health Check Settings)

IP

Port

Protocol (HTTP / HTTPS / TCP)

Health Check Path

Health Check Destination Domain Name

Weight Details (When Weight is selected in Policy)

Figure 160 Record Information (Weight Details)

137

・ Setting screen when the Type "NS" is selected

Figure 161 Record Registration (Record Information: When Type is NS)

・ Setting screen when the Type "CNAME" is selected

Figure 162 Record Registration (Record Information: When Type is CNAME)

138

・ Setting screen when the Type "MX" is selected

Figure 163 Record Registration (Record Information: When Type is MX)

・ Setting screen when the Type "TXT" is selected

Figure 164 Record Registration (Record Information: When Type is TXT)

139

・ Setting screen when the Type "LBR" is selected

Figure 165 Record Registration (Record Information: When Type is LBR)

・ Setting screen when the Type "SRV" is selected

Figure 166 Record Registration (Record Information: When Type is SRV)

140

・ Setting screen when the Type "PTR" is selected

Figure 167 Record Registration (When Type is PTR)

3 You can check the setting details you have entered so far on the confirmation screen. If

there are no problems, click "Create".

Figure 168 Record Registration (Confirmation)

141

Editing Records

You can edit the details of registered records.

20.6.1 How to edit records

1. On the Record List scree, click "Edit" from the pull-down menu of the record you want to

edit.

Figure 169 Record List (Edition)

2. You can edit the below information on the record edition screen. Depending on the type

you selected, the items to be edited are changed. Please refer to 20.5.1 for the edition

items of each type.

Figure 170 Record Edition

3. Click "Update" after edited.

142

Record Deletion

You can delete the registered records.

20.7.1 How to delete records

1. On the record list screen, click "Delete" by selecting from the pull-down menu of the

record you want to delete.

Figure 171 Record List (Delete)

2. Click the "Delete" button if there are no problems after you have checked the deletion

details.

Figure 172 Confirmation of Deletion

DNS Zone Deletion

You can delete the registered DNS zone.

20.8.1 How to delete DNS zone

1 On the DNS zone list screen, click "DNS Zone Deletion", selecting from the pull-down

menu of the DNS zone to be deleted.

143

Figure 173 DNS Zone List (DNS Zone Deletion)

2 Click the "Delete" button if there are no problems after you have checked deletion details.

Figure 174 Confirmation of Deletion

144

Chapter 21 VPN Service (SSL-VPN)

Function Overview

This function provides an SSL-VPN connection function for secure connections to virtual

environments created on the system. This enables safe access from client terminals to virtual

servers on the system using SSL-VPN.

The following functions are provided.

Creation of VPN services

Creation of SSL-VPN Connections

Usage Method of SSL-VPN Connections

Preparations are necessary to use SSL-VPN connections. The flow from preparation to

creation of an SSL-VPN connection is indicated below.

Figure 175 Flow of VPN Environment Configuration (SSL-VPN)

145

(1) Preparation (Required)

To create a VPN service, the preparations indicated below, such as creation of a virtual

router and changes to settings, are necessary.

1.1 Create a Virtual Router

Create a virtual router (Refer to Chapter 14 Virtual Router).

1.2 Configure the Gateway for the Virtual Router

Configure the gateway for the created virtual router (Refer to 14.4 Edit a Virtual

Router).

1.3 Create a Virtual Network

Create a virtual network (Refer to Chapter 13 Virtual Network).

1.4 Add an Interface to the Virtual Router

From the Details window of the virtual router created in 1.1, add an interface.

For the subnet, specify the subnet configured in 1.3.

For the IP address, specify the last unused IP address in the subnet.

(2) Configure a VPN Service

After preparations are complete, create a VPN service and an SSL-VPN connection.

2.1 Create a VPN Service

Press [Network] -> [VPN Service], and click the "+" button displayed on the VPN

Service List window.

Figure 176 Create VPN Service Window

146

The setting items necessary when creating a VPN service are given in the

following table.

Table 42 Setting Items for VPN Service Creation

Item Setting Content

AZ Select the same availability zone as that of the prepared

virtual router. * Selection of a virtual router becomes

possible after an AZ is selected.

Virtual Router Name Select the virtual router created in 1.1.

* Specification of a Subnet Name becomes possible after a

virtual router is selected.

Subnet Name Select the subnet configured in 1.3.

VPN Service Name Enter the name of the VPN service.

Description Enter the description of the VPN service.

Management State Select "true" or "false" (The default value is "true").

After the VPN service is created, it will be displayed in the VPN Service List

window.

Figure 177 VPN Service List Window

147

2.2 Create an SSL-VPN Connection

SSL-VPN connections can be created from the VPN Service Detail window.

Figure 178 VPN Service Detail Window

The setting items necessary when creating an SSL-VPN connection are given in

the following table.

Table 43 Setting Items for SSL-VPN Connections

Item Setting Content

SSL-VPN connection name Enter the name for the SSL-VPN connection.

Protocol Select "TCP" or "UDP" (The default value is "TCP").

In Eastern Japan Region 3/Western Japan Region 3, only

"TCP" can be set.

Management State Select "true" or "false" (The default value is "true").

Credential Select the credential to use (The default value is the K5

credential).

When using a credential other than the K5 credential,

register the credential in advance.

Security Group Check the box of the security group to be used.

The number of security groups that can be registered is

6 or less.

148

Global IP Select the global IP to be used.

In Eastern Japan Region 3/Western Japan Region 3, only

automatic allocation can be set.

Client IP pool Configure the client IP pool in CIDR format (For example,

192.168.10.0/24).

[Important notice]

・ Do not specify the following network addresses.

Used network address

Local network address connected by client PC

If above network address is set, communication may

not be possible. Please contact the help desk.

・ The value of "192.168.122.0/24" can not be specified

as network address.

* In Eastern Japan Region 3/Western Japan Region 3, only one global IP address and one

client IP pool can be set.

Click the add SSL-VPN connection icon and enter the items on each window.

Finally, click "Create" to create the SSL-VPN connection.

149

Figure 179 Create SSL-VPN Connection Window

(3) Firewall Setting (Optional)

The setting of firewall rules is optional. Setting of firewall rules is recommended in order to

enable safe connections with configured virtual environments.

3.1 Create a Firewall Rule

Create a firewall rule (Refer to Chapter 17 Firewall).

3.2 Create a Firewall Policy

Create a firewall policy that applies the created firewall rules.

3.3 Create a Firewall

Create a firewall (Refer to Chapter 17 Firewall).

3.4 When creating a firewall, select the firewall policy and virtual router.

150

Advisory Notes

・ When creating an SSL-VPN connection, if using a credential other than the

K5 credential, register that credential with the API in advance (Refer to the

IaaS Features Handbook and the IaaS API Reference - Management

Administration).

・ After creating an SSL-VPN connection, connect to the target virtual server

using an OpenVPN client, etc. For the installation method for an OpenVPN

client, refer to the "IaaS Features Handbook".

151

Chapter 22 VPN Service (IPsec VPN)

Function Overview

This function provides an IPsec VPN connection function for secure

connections to virtual environments created on the system. This enables access

from client terminals to virtual servers on the system, and access between virtual

servers to be performed more safely.

The following functions are provided.

Display of lists and details of IPsec VPN connections

Creation, editing, and deletion of IPsec VPN connections*

Creation of IKE policies

Creation of IPsec policies

*For creation of IPsec VPN connections, refer to "IPsec VPN Connection

Patterns" in the "IaaS Design and configuration Guide (Design

Pattern/Implementation Samples)".

152

Usage Method of IPsec VPN Connections

Preparations must be made in order to be able to use IPsec VPN connections.

The flow from preparation to creation of an IPsec VPN connection is indicated

below.

Figure 180 Flow of VPN Environment Configuration (IPsec VPN)

(1) Preparation (Required)

To use the same settings as the previous chapter, refer to 21.2 (1) Preparation

(Required). When using a configured environment, additional settings are not

necessary.

(2) Configure a VPN Service

After preparations are complete, create a VPN service and an IPsec VPN

connection.

(2.1) Create a VPN Service

Refer to 2.1 Create a VPN Service in the previous chapter.

153

(2.2) Create an IPsec VPN Connection

IPsec VPN connection list information can be referred to from the

VPN Service Details window.

Figure 181 VPN Service List Window

Click the "+" button of the IPsec VPN connection and configure the

following items on the Create IPsec VPN Connection Window.

Create an IPsec VPN connection

Configure an IKE policy and an IPsec policy

Configure connection information

154

Create an IPsec VPN connection.

Figure 182 Create IPsec VPN Connection Window (IPsec VPN Connection)

The setting items necessary when creating an IPsec VPN connection

are given in the following table.

155

Table 44 Setting Items for the Create IPsec VPN Connection Window

Item Setting Content

IPsec VPN

Connection Name

Enter the name of the IPsec VPN connection.

Description Enter the description of the IPsec VPN connection.

AZ Enter the availability zone.

Admin_State_Up Select the management status of the VPN connection.

* When it is "false", the VPN connection will not transfer packets.

Pre Shared Key

(PSK)

Enter the Pre Shared Key (PSK)

Initiator Select an initiator mode.

- "bi-directional": Confirms the connection in both directions.

- "response-only": Confirms the connection on the response

side.

* This item is not displayed in Easter Japan Region 3 or

Western Japan Region 3.

DPD-Action Select the action to take when traffic confirmation with the

connection destination using DPD fails.

- "hold":

Performs confirmation using DPD, and reconnects when

communication becomes possible again.

- "restart":

Performs confirmation using DPD, and reconnects

immediately when disconnected.

DPD-Interval Enter the interval for DPD detection, using seconds.

DPD-Timeout Enter the timeout for DPD detection, using seconds.

* This is fixed as 120 seconds in Eastern Japan Region 3 and

Western Japan Region 3.

IKE Version Enter the IKE version (The default value is "v1")

* This item is only displayed in Easter Japan Region 3 and

Western Japan Region 3.

Select an IKE policy and an IPsec policy.

156

Figure 183 Create IPsec VPN Connection (Policy)

157

When there are no IKE policies, create one using the "+" button.

Figure 184 Create IKE Policy Window

The setting items necessary when creating an IKE policy are given in

the following table.

Table 45 Setting Items for IKE Policies

Item Setting Content

IKE Policy Name Enter the IKE policy name.

Description Enter the description of the IKE policy.

AZ Select an availability zone

IKE Phase1 Negotiation Mode Enter the key conversion mode

(The default value is "main")

Auth Algorithm Enter the encryption hash algorithm

(The default value is "sha1")

Encryption Algorithm Select an encryption algorithm

(The default value is "aes-128")

Perfect Forward Secrecy

(PFS)

Select Perfect Forward Secrecy

(The default value is "group5")

Lifetime Enter the lifetime of the security association (SA)

(The default value is "2000")

IKE Version Enter the IKE version

(The default value is "v1")

* These item is not displayed in Easter Japan Region

3 and Western Japan Region 3.

158

When there are no IPsec policies, create one using the "+" button.

Figure 185 Create IPsec Policy

The setting items necessary when creating an IPsec policy are given

in the following table.

Table 46 Setting Items for IPsec Policies

Item Setting Content

IPsec Policy Name Enter the IPsec policy name

Description Enter the description of the IPsec policy

AZ Select an availability zone

Transform Protocol Enter the transformation protocol being used

(The default value is "esp")

Auth Algorithm Enter the encryption algorithm

(The default value is "sha1")

Encapsulation Mode Select an encapsulation mode

(The default value is "tunnel")

Encryption Algorithm Select an encryption algorithm

(The default value is "aes-128")

Perfect Forward Secrecy (PFS) Enter the Perfect Forward Secrecy

(The default value is "group5")

Lifetime Enter the lifetime of the security association (SA)

(The default value is "3600")

159

Initiator Select the initiator mode

- "bi-directional": Connection is confirmed in both

directions

- "response-only": Connection is confirmed on the

response side

* This is only displayed in Easter Japan Region 3

and Western Japan Region 3.

160

Configure the connection information of the peer router.

Figure 186 Create IPsec VPN Connection Window (Connection destination information)

The setting items necessary when creating the connection

destination information of an IPsec VPN connection are given in the

following table.

Table 47 Setting Items for the Connection destination information of Create IPsec VPN

Connection

Item Setting Content

Peer: Global IP Address Specify the peer's global IP address

* The possible entry methods include selection from a list of

IP addresses inside the IaaS contract and direct entry of the

IP address.

Peer: Private IP Address

(CIDR)

Enter the private IP address of the peer in CIDR format

161

Check the configured details, and then click "Create" to create the

IPsec VPN connection.

Figure 187 Create IPsec VPN Connection (Confirmation)

162

How to Delete IKE and IPsec Policies

Created IKE policies and IPsec policies cannot be deleted from the VPN

Service window. To delete them, do so from the API Execution window or by

executing an API.

This section explains the deletion method using the API Execution window.

(1) Obtain Policy List Information

Set the following values on the API Execution window, press the Execute

API button, and the policy list information will be displayed in the response

display section.

- HTTP Method: "GET"

- Endpoint: "networking"

- URI: "/v2.0/vpn/ikepolicies" For an IKE policy

"/v2.0/vpn/ipsecpolicies" For an IPsec policy

* In Eastern Japan Region 3 and Western Japan Region 3, specify the

following:

- Endpoint: "nfv"

- URI:

"/vpn/nfv/ikepolicies" For an IKE policy

"/vpn/nfv/ipsecpolicies" For an IPsec policy

Figure 188 Obtain Policy List Information (For an IPsec policy)

(2) Check the Policy ID of the Policy to Delete

163

The policy ID of the policy to delete can be checked using the policy name

in the response display section of the policy list information.

Figure 189 Check the Policy ID (For an IPsec policy)

(3) Execute Policy Deletion

Set the following values on the API Execution window, and perform deletion

of the policy using API execution.

- HTTP Method: "DELETE"

- Endpoint: "networking"

164

- URI:

"/v2.0/vpn/ikepolicies/{Policy_ID_of_deletion_target}" For an IKE policy

"/v2.0/vpn/ipsecpolicies/{Policy_ID_of_deletion_target}" For an IPsec policy

* In Eastern Japan Region 3 and Western Japan Region 3, specify the

following:

- Endpoint: "nfv"

- URI:

"/vpn/nfv/ikepolicies/{Policy_ID_of_deletion_target}" For an IKE policy

"/vpn/nfv/ipsecpolicies/{Policy_ID_of_deletion_target}" For an IPsec

policy

Figure 190 Execute Policy Deletion (For an IPsec policy)

Advisory Notes

・ Information of IKE policies and IPsec policies cannot be viewed or updated.

To view or update the information, do so from the API Execution window or

by executing an API.

・ When the status of an IPsec VPN connection is not ACTIVE, check from the

API Execution window or an API that the information of the connection

destination and the setting information match (for details, refer to the "IaaS

API Reference - Network").

165

Chapter 23 Database Virtual Server

Database Virtual Server List

You can check the list and status of the database virtual server created in

project.

Figure 191 Database Virtual Server List

Table 48 Displayed Content of Database Virtual Server List Table

No. Item Name Displayed Content

1 Database Virtual Server

Name

Database Virtual Server Name

2 Status Database Virtual Server Status

Refer to Table 49 Database Virtual

Server Status

3 Action Various Operations for database virtual

server

Table 49 Database Virtual Server Status

No. Status Description

1 Active SQL Statement Receiving State

2 Backup Back-up Status

3 Build DB Virtual Server Creating Status

4 Failed State where POST/PUT API execution

has failed

5 Error Illegal state

166

6 Deleted State where DB Virtual Server has

already been deleted but the snapshot

linked to the virtual server exists

7 Reboot Start-up State

8 Resize State where data volume is being

resized

9 Modifying State where an attribute is being

changed

10 Restart_Required State where restart is required

11 Degenerated State where one DB virtual server is in

degenerate operation

12 Switched State where original server is switched

with duplicate one due to DB fail-over

167

23.1.1 About Operation

Figure 192 Database Virtual Server List Action

See below for the operations of database virtual server list.

1. Start

Refer to 23.4.

2. Starting After Patch Application

Refer to 23.5.

3. Stop

Refer to 23.6.

4. Reboot

Refer to 23.7.

5. Rebooting After Patch Application

Refer to 23.8.

6. Delete

Refer to 23.9.

7. Show Parameters

Refer to 23.10.

8. Show Database Logs

Refer to 23.11 and 23.12.

168

Database Virtual Server Creation

Database Virtual Server is newly created.

23.2.1 How to create database virtual server

1. Click the icon "+" at the upper right on the Database Virtual Server List screen.

2. Enter the appropriate information as below and click "Next Page".

Figure 193 Database Virtual Server Information

・ Database Virtual Server Name

・ Database Master User Name

・ Database Master Password

・ Database Master Password Confirmation

・ Data Disk Size (GB)

・ Backup Retention Period (Days)

If you select "Set", you need to set the following information.

169

Figure 194 Backup Retention Period

Number of Days for Backup Retention (1 to 10 days)

・ Redundancy (Enabled/Disabled)

・ Description

3. Enter the appropriate information as below and click "Next Page".

Figure 195 Flavor Type

・ Flavor Type

4. Enter the appropriate information as below and click "Next Page".

Figure 196 DB Subnet Group

・ DB Subnet Group

170

5. Enter the appropriate information as below and click "Next Page".

Figure 197 Security Group

・ Security Group

171

6. You can check the setting details you have entered so far on the confirmation screen. If

there are no problems, click "Create". (*1)

Figure 198 Confirmation for Setting Content

*1

"Automatically generated parameters", which is displayed on the confirmation

screen for database creation, is automatically set from "recommended value of

database engine".

172

Table 50 Content of "Automatically generated parameters"

No. Item Name Displayed Content

1 shared_buffers Buffer size which is about 20% of the

memory size of selected flavor.

2 effective_cache_size Cache size which is about 50% of the

memory size of selected flavor.

3 log_line_prefix Log format for the database log.

Database Virtual Server Details

You can open the database virtual server details by clicking the database virtual

server name of database virtual server list.

The detailed information not displayed on the database virtual server list can

be checked.

Figure 199 Database Virtual Server Details (Database Virtual Server Information)

173

Figure 200 Database Virtual Server Details (Flavor Type Network Information)

Figure 201 Database Virtual Server Details (Database Information)

174

Figure 202 Database Virtual Server Details (Database Operation Information)

Figure 203 Database Virtual Server Details (Parameters to be changed at the time of next

reboot)

Table 51 Displayed Content of Database Virtual Server Details

No. Category Item Name Displayed Content

1 Database Virtual

Server Details

ID Database Virtual Server

ID

2 Database Virtual

Server Name

Database Virtual Server

Name

3 Status Database Virtual Server

Status.Refer to Table 49

Database Virtual Server

Status

4 Creation Time Created Date and Time

175

5 Update Time Update Date and Time

6 Data Storage Size Data Storage Size

7 Data Storage Type Data Storage Type

8 Availability Zone of

Master Running

Availability Zone where

the main server is

starting up

9 Redundancy true / false

10 Multi AZ Option true / false

11 Associated Read

Replica

Linked Read Replica

12 Original ID of Read

Replica

Replication Source

Database Virtual Server

ID

13 Availability Zone of

Slave Running

Availability Zone where

duplicate server is

starting up

14 Status of Read Replica Status of Read Replica

15 Security Group Security Group

16 Description Description

17 Flavor Type Flavor ID Flavor ID

18 Network

Information

Internal FQDN Internal FQDN

19 External FQDN External FQDN

20 Internal IP Address IP Address

21 Global IP Address Global IP Address

22 Connectable from

Internet

true / false

23 DB Subnet Group Subnet Group

24 Database

Information

Port Number Port Number

25 DB Encoding Database Encoding

26 DB Collation Order Checking Flow

27 DB Type Type

28 DB Version Version

29 DB Minor Version Minor Version

30 Database Master User

Name

Database Management

User Name

176

31 DB Parameter Group

ID

DB Parameter Group ID

32 Database

Operation

Information

Backup Retention

Period

Number of Days for

Backup Storage

33 Backup Retention

Period

Backup Time Range

34 Time Zone of Backups Maintenance Time Range

35 Recover Redundancy

Immediately

true / false

36 Automatic Recovery of

Redundancy Start At

Automatic Recovery Start

Time

37 Parameters to be

changed when

next rebooting

Data Storage Size Data Storage Size

38 Data Storage Type Data Storage Type

39 Backup Retention

Period

Number of Days for

Backup Storage

40 Flavor ID Flavor ID

41 ID Database Virtual Server

ID

42 Name Database Virtual Server

Name

43 DB Parameter Group

ID

DB Parameter Group ID

44 DB Version Database Version

45 Database Master User

Name

Database Management

User Name

46 Database Master

Password

Database Management

Password

47 Multi DB Option true / false

48 Multi AZ Option true / false

49 Port Number Port Number

50 Engine Minor Version Database Engine Minor

Version

51 Security Update Existence of Security

Update settings

177

Database Virtual Server Startup

You can start up Database Virtual Server.

23.4.1 How to start up Database Virtual Server

1. On the Database Virtual Server List screen, click "Start" selecting from the pull-down

menu of the database virtual server that is starting up.

Figure 204 Database Virtual Server List (Start)

2. If you check the start-up status and there are no problems, click the "Start" button.

Figure 205 Start-up Check

178

Starting the Database Virtual Server after Patch

Application

It is possible to start the database virtual server after application of patches.

23.5.1 How to start the database virtual server after patch

application

1. On the Database Virtual Server List screen, select "Update patch and start" from the pull-

down menu of the database virtual server to start.

Figure 206 Database Virtual Server List (Start after Patch Application)

2. Check the content and there are no problems, click "Start".

Figure 207 Confirm Start After Patch Application

179

Database Virtual Server Stop

You can stop the database virtual server.

23.6.1 How to stop database virtual server

1. On the database virtual server list screen, click "Stop" selecting from the pull-down menu

of the database virtual server that you want to stop.

Figure 208 Database Virtual Server List (Stop)

2. If you check the stop status and there are no problems, click the "Stop" button.

Figure 209 Stop Check

Database Virtual Server Reboot

You can reboot the database virtual server.

180

23.7.1 How to reboot the database virtual server

1. On the database virtual server list screen, click "Reboot" selecting from the pull-down

menu of the database virtual server that you want to reboot.

Figure 210 Database Virtual Server List (Reboot)

2. If you check reboot status and there are no problems, click the "Reboot" button.

Figure 211 Reboot Check

181

Rebooting the Database Virtual Server after Patch

Application

It is possible to reboot the database virtual server after application of patches.

23.8.1 How to reboot the database virtual server after patch

application

1. On the Database Virtual Server List screen, click "Update patch and reboot" in the pull-

down menu of the database virtual server to reboot.

Figure 212 Database Virtual Server List (Reboot after Patch Application)

2. Check the content and if there are no problems, click "Reboot".

Figure 213 Confirm Reboot After Patch Application

182

Database Virtual Server Deletion

You can delete the database virtual server.

23.9.1 How to delete the database virtual server

1. On the database virtual server list screen, click "Delete" selecting from the pull-down

menu of the database virtual server that you want to delete.

Figure 214 Database Virtual Server List (Deletion)

2. If you check the deletion status and there are no problems, click the "Delete" button.

Figure 215 Deletion Check

183

DB Parameter Group Details

You can check the details of DB parameter group.

23.10.1 How to Check DB Parameter Group

1. On the database virtual server list screen, click "Show Parameters" selecting from the

pull-down menu of DB parameter group check.

Figure 216 Database Virtual Server List (Show Parameters)

2. DB Parameter Group Details screen is open.

You can check the detailed information on DB parameter group.

Figure 217 DB Parameter Group Details (Show Parameters)

184

Figure 218 DB Parameter Group Details (Parameter Details)

Table 52 Displayed Content of DB Parameter Group Details

No. Category Item Name Displayed Content

1 DB Parameter Group DB Parameter Group

Name

DB Parameter Group

Name

2 DB Parameter Group

ID

DB Parameter Group

ID

3 Parameter Group Details Parameter Name Parameter Name

4 DB Parameter Name DB Parameter Values

Database Log List

You can check the database log list.

Figure 219 Database Log List

23.11.1 How to see log

1. On the database virtual server list screen, click "Show Database Logs" selecting from the

pull-down menu of the database in which you want to see log.

185

Figure 220 Database Virtual Server List (Show Database Logs)

Database Log Details

Click the log file name of database log list to open database log details.

You can check the detailed information which is not displayed on the database

log list.

Figure 221 Database log details

Table 53 Displayed Content of Relational Database Log Details

No. Item Name Displayed Content

1 Log File Name Log File Name

2 Log Log

186

Chapter 24 Stack

Stack List

You can check a list and status of a stack created in a project.

Figure 222 Stack List

Table 54 Stack List Table

No. Item Name Description

1 Stack name Name of a stack

2 Description Description of a stack

3 Stack ID ID to identify a stack in unique

4 Status Status of a stack

5 Action Various operations on a stack

187

Stack Details

You can check a list and status of a stack created in a project.

Figure 223 Stack Details

Table 55 Stack Details Table

No. Classification Item Name Description

1 Information Description Description of a stack

2 Status Status

3 Date and time of

creation

Date and time of creation

4 Timeout (minutes) Timeout

5 Resource deletion

at stack creation

failure

Behavior at creation failure

6 Parameters Name Key

7 Value Value corresponding to the key

8 Outputs Outputs Outputs Information

188

Create Stack

24.3.1 How to Create Stack

1. Click an icon on Virtual Server List window.

2. Set the following and click "CREATE".

Figure 224 Create Stack

・ Stack Name

・ How to Specify Template

If you select "URL", specify the following.

"URL"

If you select "File", specify the following.

Drop a configuration file in "File".

If you select "YAML", specify the following.

"YAML"

・ Timeout (minutes)

・ Resource deletion at stack creation failure (Delete or not)

189

Edit Stack

You can edit the created stack.

Figure 225 Edit Stack

You can edit the following. Click "UPDATE" after editing.

・ How to Specify Templates

・ Timeout

・ Parameter

190

Chapter 25 Monitoring

Monitoring Target Resource List

Monitoring Target Resource List is displayed.

Figure 226 Monitoring Target Resource List

Table 56 Displayed Content of Monitoring Target Resource List Table

No. Item Name Displayed Content

1 Resource Resource Name

2 Resource ID Resource ID

3 AZ Availability Zone

25.1.1 How to display target resource list

1. On the Monitoring Target Resource List screen, select the menu from the pull-down menu

of the audit menu.

Figure 227 Monitoring Target Resource List (Audit Item Sorting : Audit Menu)

191

・ Audit Menu

Compute

Storage

Database

Network

Custom

2. Select the resource from the pull-down menu of the target resource.

*By selecting any of the Audit Menu items, items are displayed in the pull-down menu of

Target Resource. The target resource that corresponds to the Audit Menu is as follows.

Figure 228 Monitoring Target Resource List (Audit Item Sorting : Target Resource)

・ Target Resource if "compute" is selected

Virtual Server

Image

・ Target Resource if "storage" is selected

Block Storage

Object Storage

・ Target Resource if "database" is selected

Database

・ Target Resource if "network" is selected

Port

Global IP

Load Balancer

・ Target Resource if "Custom" is selected

Custom Audit

3. Resource List is displayed.

192

Figure 229 Monitoring Target Resource List (After Audit Item Sorting)

Resource Audit Information

By clicking the resource name of the resource displayed on the Monitoring Target

Resource List, you can open the resource audit information screen. Here you can

check the detailed information not displayed on the target resource list.

Figure 230 Resource Audit Information (Resource Information)

Figure 231 Resource Audit Information (Graph)

193

Figure 232 Resource Audit Information (Sample Statistical Value)

Table 57 Displayed Content of Resource Audit Information

No. Category Item Name Displayed Content

1 Resource Information Resource Resource Name

2 Resource ID Resource ID

3 Graph Meter Refer to 25.3

4 Line Chart

5 Sample Statistical

Value

Minimum Value Minimum Value of Statistical

Value

6 Maximum Value Maximum Value of Statistical

Value

7 Average Value Average Value of Statistical

Value

Graph

The graph with the horizontal axis being time and vertical axis being sample

values is displayed.

25.3.1 How to change the displayed content of the graph

From the pull-down menu of Meter of the resource audit information, select the

meter for which you want to display a graph.

194

Figure 233 Resource Audit Information (Graph : Meter)

25.3.2 Graph Operation

If you move a cursor to a graph, the details of each time range (date, time, and

sample values) are displayed.

Figure 234 Resource Audit Information (Graph Details)

If you move the mouse wheel upwards on the graph you can zoom in, and when

you move the mouse wheel downwards it will zoom out.

195

Chapter 26 Alarm

The alarm explained in this section are provided for Japan East 1/Japan East

2/Japan East 3/Japan West 1/Japan West 2/UK/Finland/Germany/Spain/US

region.

Please refer to Chapter 27 Alarm (Easter Japan Region 3/Western Japan

Region 3) when using Eastern Japan Region 3 or Western Japan Region 3.

Alarm List

You can check the list and status of the alarm created in project.

Figure 235 Alarm List

Table 58 Displayed Content of Alarm List Table

No. Item Name Displayed Content

1 Alarm Name Alarm Name

2 Type threshold / combination

3 Enable/Disable true / false

4 Status ok / insufficient data / alarm

5 Action Various Operations for Alarm

196

26.1.1 About Operations

Figure 236 Alarm List Action

The below are provided as the alarm list operations.

1. Update

Refer to 26.4 Action setting.

2. History

Refer to 26.5 History of Alarm.

3. Delete

Refer to 26.6 Alarm Deletion.

Alarm Creation

An alarm can newly be created.

26.2.1 How to create an alarm

1. Set the below information and click "Next Page".

2. Set the below information and click "Next Page".

Figure 237 Alarm Type

・ Alarm Type (threshold / combination)

197

3. Set the below information and click "Next".

Figure 238 Alarm Details

・ Alarm Name

・ Enable/Disable

・ How to Execute Action (Rerun / Do Not Rerun)

・ Description

4. Set the below information and click "Next".

If Alarm Type "threshold" is selected

Figure 239 Audit Item

・ Audit Item

Click the "Set" button and a pop-up window will be displayed. The below information

should be set.

198

Figure 240 Audit Item Setting

Resource Type

Virtual Server

Database

Global IP

Virtual Network

Virtual Router

Load Balancer

・ Threshold

Figure 241 Audit Item (Threshold)

Threshold

Operator for comparing threshold and sampling value

(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)

199

Threshold Evaluation Interval (sec)

Number of Threshold Evaluation Repeats

Statistics for comparing with threshold (Average Value/Number of

Samples/Maximum Value/Minimum Value/Total Value)

Treatment of data point when the number of samples is abnormally small

(Exclude/Does not exclude)

・ Query

If you click the "Add Query" button, a pop-up window will be displayed. Please set

the appropriate information.

Figure 242 Alarm Creation (Add Query)

Figure 243 Add Query

Field Name (Project Name/User Name)

Relative Operator

(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)

Value

If an alarm type "combination" is selected

・ How to evaluate a combination (AND condition / OR condition)

200

Figure 244 Alarm Selection (How to evaluate a combination)

・ Alarm List for Combination

If you click the "Add alarm" button, a pop-up window will be displayed. Please set

the information below.

Figure 245 Alarm Selection (Alarm List for combination)

Figure 246 Add alarm

Alarm to add

201

5. Please set the appropriate information and click "Next".

Figure 247 Alarm Evaluation Schedule (No setting)

To be set no matter whether the alarm type "threshold" or "combination" is selected

・ Setting/No Setting

If "setting" is selected, evaluation schedule can be added.

If you click the "Add evaluation schedule" button, a pop-up window will be

displayed. Set the below information.

Figure 248 Alarm Evaluation Schedule (Set)

202

Figure 249 Add evaluation schedule

・ Basic Setting

Setting name

Description

・ Start Date

If you select "Monthly", set the below information.

203

Figure 250 Start Date and Time (Monthly)

Day

Hour

minutes

Monitoring period (sec)

Time Zone

If "Weekly" is selected, set the below information.

Figure 251 Start Date (Weekly)

204

WEEK

Hour

minutes

Monitoring period (sec)

Time Zone

If you select "Daily", set the below information.

Figure 252 Start Date and Time (Daily)

Hour

minutes

Monitoring period (sec)

Time Zone

205

If "Hourly" is selected, set the below.

Figure 253 Start Date and Time (Hourly)

minutes

Monitoring period (sec)

Time Zone

If "cron" is selected, set the below.

Figure 254 Start Date and Time (cron)

CRON format

Monitoring period (sec)

Time Zone

206

6. Set the below information and click "Next".

Figure 255 Action Setting (Not Set)

To be set no matter whether the alarm type "threshold" or "combination" is selected

・ Setting / No Setting

If you select "Set", you can add "Action at alarm", "Action at OK", "What to do when

sufficient data is not collected". If you click the "Add action" button, a pop-up window

will be displayed. Please set the information below.

Figure 256 Action Setting (Set)

207

Figure 257 Add action at alarm

・ Service (compute / mail)

If you select "compute", set the below.

Figure 258 Add action at alarm (compute)

Parameter 1

Parameter 2

Figure 259 Add Action when OK

208

・ Service (compute / mail)

If you select "compute", set the below.

Figure 260 Add Action when OK (compute)

Parameter 1

Parameter 2

Figure 261 Add Action when data is lacking

・ Service (compute / mail)

If you select "compute", set the below.

209

Figure 262 Add Action when sufficient data is not collected (compute)

Parameter 1

Parameter 2

7. The setting content you have entered so far can be checked on the confirmation screen.

If there are no problems, click "Create".

Figure 263 Create Alarm

210

Alarm Details

If you click the alarm name of alarm list, you can open the alarm details. The

detailed information not displayed on alarm list can be checked.

Figure 264 Alarm Details (Alarm Type and Alarm Details)

Figure 265 Alarm Details (Monitoring Item and Threshold)

211

Figure 266 Alarm Details (Query and Alarm evaluation schedule)

Figure 267 Alarm Details (Select alarm and Alarm evaluation schedule)

Figure 268 Alarm Details (Action at alarm, Action at OK, and What to do when sufficient

data is not collected)

212

Table 59 Displayed Content of Alarm Details

No. Category Item Name Displayed Content

1 Alarm Type Alarm Type threshold / combination

2 Alarm Details Alarm Name Alarm Name

3 Resource ID Resource ID

4 Enable/Disable true / false

5 How to Execute

Action

true / false

6 Description Alarm Description

7 Monitoring Item Monitoring Item Monitoring Item

8 Threshold Threshold Threshold

9 Operator for

comparing threshold

and sampling value

equal/larger than/equal

to or larger

than/smaller

than/equal to or

smaller than

10 Threshold

Evaluation Interval

Number of seconds

11 Number of

Threshold

Evaluation Repeats

Number of Threshold

Evaluation Repeats

12 Statistics for

comparing with

threshold

Average value/Number

of samples/Maximum

value/Minimum

value/Total value

13 Treatment of data

point when the

number of samples

is abnormally small

Exclude/Does not

exclude

14 Query Field Name Project Name/User

Name

15 Relative Operator equal/larger than/equal

to or larger

than/smaller than/equal

to or smaller than

16 Value Value

213

17 Select alarm Condition of

combination

AND condition / OR

condition

18 Alarm Name Names of alarm to be

evaluated in the

combination

19 Alarm Type Type of each alarm:

threshold / combination

20 Enable / Disable True / false

21 Status The latest status of

each alarm:

ok / insufficient data /

alarm

22 Alarm evaluation

schedule

Setting name Setting name

23 Start Date Start Date

24 Monitoring period

(sec)

Number of seconds

25 Time Zone Time Zone

26 Description Description of Alarm

evaluation schedule

27 Action at alarm Service compute / mail

28 Parameter 1 Parameter 1

29 Parameter 2 Parameter 2

30 Action at OK Service compute / mail

31 Parameter 1 Parameter 1

32 Parameter 2 Parameter 2

33 What to do when

sufficient data is not

collected

Service compute / mail

34 Parameter 1 Parameter 1

35 Parameter 2 Parameter 2

214

Action setting

You can edit the created alarm.

26.4.1 How to set an alarm

1. On the alarm list screen, click "Update" selecting from the pull-down menu of the alarm

you want to edit.

Figure 269 Alarm List (setting)

2. On the alarm setting screen, you can set the below. Items to be edited change depending

on the alarm type you selected. Please refer to 20.2 for the items to be edited of each

type.

Figure 270 Alarm Setting (Alarm type and alarm details)

・ Alarm Type (threshold / combination)

・ Alarm Name

・ Resource ID

・ Enable/Disable

・ How to Execute Action (Rerun / Do Not Rerun)

・ Description

215

Figure 271 Alarm Setting (Monitoring Item and threshold)

Figure 272 Alarm Setting (Query)

・ Alarm Type (if threshold is selected)

Monitoring Item

Threshold

Operator for comparing threshold and sampling value

(equal/larger than/equal to or larger than/smaller than/equal to or smaller than)

Threshold Evaluation Interval (sec)

Number of Threshold Evaluation Repeats

Statistics for comparing with threshold

Treatment of data point when the number of samples is abnormally small

(Exclude / Not Exclude)

Query

216

Figure 273 Alarm Setting (Select alarm)

・ If an alarm type "combination" is selected

Select alarm (And / Or)

Combination alarm list

Figure 274 Alarm Setting (Alarm evaluation schedule)

To be set no matter whether alarm type "threshold" or "combination" is selected

・ Set/Not Set

Figure 275 Alarm Setting (Action setting)

To be set no matter whether alarm type "threshold" or "combination" is selected

・ Set/Not Set

217

Figure 276 Alarm Setting (Action at alarm, Action at OK, What to do when sufficient data

is not collected)

To be set no matter whether alarm type "threshold" or "combination" is selected

・ Action at alarm

・ Action at OK

・ What to do when sufficient data is not collected

3. Click "Update" after edition.

218

History of Alarm

The alarm history is displayed.

Figure 277 History of Alarm

Table 60 Displayed Content of Alarm History

No. Item Name Displayed Content

1 Alarm Name Alarm Name

2 Filtering conditions See 26.5.1

3 Date and time Alarm date and time

4 Alarm Type creation / rule change / state transition /

deletion / action

5 Description Description of Alarm

26.5.1 How to display the history of alarm

1. Click "history" of the pull-down menu of the alarm that displays the history of alarm on

the Alarm List screen.

Figure 278 Alarm List (History)

219

2. Set the below information under the filtering conditions on the alarm history screen, and

click the "View" button.

Figure 279 History of Alarm (Filtering Conditions "time stamp")

・ If a time stamp is selected, set the below.

Start Date

Click next to the text form of Start Date and select a date.

Figure 280 Time Stamp (Start Date)

End date

Click next to the text form of Start Date and select a date.

220

Figure 281 Time Stamp (End date)

・ If "alarm type" is selected, set the below.

Figure 282 History of Alarm (Filtering conditions "Alarm Type")

Alarm Type

creation

rule change

state transition

deletion

action

221

Alarm Deletion

You can delete an alarm. On the alarm list screen, click "Delete" of the pull-

down menu of the action of the alarm that will be deleted.

26.6.1 How to delete an alarm

1. On the alarm list screen, click "delete" of the pull-down menu of the alarm that will be

deleted.

Figure 283 Alarm List (Deletion)

2. Click the "Delete" button if there are no problems after you have checked the content to

be deleted.

Figure 284 Deletion of Alarm

222

Chapter 27 Alarm (Easter Japan Region 3/Western

Japan Region 3)

Function Outline

The IaaS Service Portal provides an alarm function. Setting threshold values and

conditions for the Monitoring items of resources makes it possible to send notification of

alarms, and browse their histories.

The explanation in this chapter is for the alarm function and operation screens provided

in Eastern Japan Region 3 and Western Japan Region 3. The functions provided in

regions other than Eastern Japan Region 3 and Western Japan Region 3 are different,

so refer to "Chapter 26 Alarm" if information is necessary.

The functions provided are as follows:

・ Alarm Functions

List display and detailed display of alarms Creation, editing, and deletion of alarms Searching of alarm histories and display of history details

223

Alarm List

It is possible to check a list of the alarms created inside a project.

From this screen, it is possible to perform operations for creating, updating, and deleting

alarms, and view details and histories.

Figure 285 Alarm List

Table 61 Alarm List Table Displayed Content

No. Item Name Displayed Content

1 Alarm name The value when created

2 Status *1 The status of the alarm

Enabled / Disabled

3 Severity - (when not set) / information / warning / error

/ critical

4 Monitoring Item *2

The name of the monitoring item of the

resource

5 Threshold The value and unit from when created

* "heartbeat" uses no unit

6 Operator equal / above / below

7 Statistic average / max / min / sum

8 Action The various operations for the alarm

*1: The setting values for status (alarm status) are as follow:

Enabled

The monitoring item is monitored, and notification is sent when the

item reaches its threshold.

Disabled

The monitoring and notification functions are stopped.

224

*2: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of

Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".

27.2.1 About Operations

Figure 286 Alarm List Actions

The following operations are provided for the Alarm List.

1 History

Refer to "27.7".

2 Edit

Refer to "27.5".

3 Delete

Refer to "27.6".

225

Alarm Details

It is possible to check the details of an alarm by clicking the alarm name in the Alarm

List. Detailed information about the alarm can be confirmed.

Figure 287 Alarm Details

226

Table 62 Alarm Details Displayed Content

No. Classification Item Name Displayed Content

1 Alarm Alarm name The value when created

2 Alarm ID Automatically assigned during

creation

3 Severity - (when not set) / information / warning

/ error / critical

4 Alarm action *1 - (when not set) / mail

5 Alarm status *2 Enabled / Disabled

6 Monitoring Resource Type The virtual server

7 Monitoring Item *3 The monitoring item of the resource

8 Threshold

Threshold The value and unit from when created

* "heartbeat" uses no unit

9 Operator equal / above / below

10 Interval Displayed using minutes

11 Statistic average / max / min / sum

*1: The setting values for actions when alarms occur are as follows:

Blank (when not set)

Email notifications are not sent. Checking is only possible from the History of

Alarm screen.

mail

When the threshold condition set for a resource that is a monitoring target is

reached, email is sent to notify the people who are the targets of notification.

The information of the email can be checked on the History of Alarm screen.

*2: The setting values for status (alarm status) are as follows:

Enabled

The monitoring item is monitored, and notification is sent when the item reaches

its threshold.

Disabled

The monitoring and notification functions are stopped

*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of

Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".

227

Alarm Creation

In alarm creation, alarms can be set by specifying threshold values and conditions for

the Monitoring items of the specified Resource types.

27.4.1 How to create an Alarm

1 Click the [Create] icon ("+") on the upper-right of the Alarm List screen.

2 Make the following settings and click the [Create] button.

Figure 288 Create Alarm (Overall)

*Item names that have a "*" (asterisk) on their right must be entered (This applies to all

screens).

228

Table 63 Create Alarm Entry Content

No. Classification Item Name Required/Optional Entry Content

1 Alarm Alarm name Required String length: 1 – 255

bytes

Usable characters:

(A – Z, a – z, 0 – 9, , -)

3 Severity Optional Blank (when not set) /

information / warning /

error / critical

4 Alarm action *1 Optional Blank (when not set) /

mail

5 Alarm status *2 Required Enabled / Disabled

6 Monitoring Resource type Required The virtual server

7 Monitoring item *3 Required The monitoring item of

the resource

8 Threshold Threshold Required Enterable value:

Integer over 0

9 Operator Required equal / above / below

10 Interval Required Entered using minutes

Enterable value: 1 -

1440

11 Statistic Required average / max / min /

sum

*1: The setting values for actions when alarms occur are as follows:

Blank (when not set)

Email notifications are not sent. Checking is only possible from the History of

Alarm screen.

mail

When the threshold condition set for a resource that is a monitoring target is

reached, email is sent to notify the people who are the targets of notification.

The information of the email can be checked on the History of Alarm screen.

*2: The setting values for status (alarm status) are as follows:

Enabled

The monitoring item is monitored, and notification is sent when the item reaches

its threshold.

Disabled

The monitoring and notification functions are stopped

229

*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of

Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".

230

Alarm Editing

It is possible to edit alarms that have been created.

It is possible to change the settings for the Alarm action and enable or disable the Alarm

status.

27.5.1 How to edit an alarm On the Alarm List screen, click [Edit] in the pull-down of the alarm you want to edit.

Figure 289 Alarm List (Edit)

From the Update Alarm screen it is possible to edit the following.

Figure 290 Update Alarm

231

Table 64 Update Alarm Entry Content (Specifiable Items)

No. Classification Item Name Required/

Optional

Displayed Content

1 Alarm Alarm action *1 Optional Blank (when not set) /

mail

2 Alarm status *2 Required Enabled / Disable

*1: The setting values for actions when alarms occur are as follows:

Blank (when not set)

Email notifications are not sent. Checking is only possible from the History of

Alarm screen.

mail

When the threshold condition set for a resource that is a monitoring target is

reached, email is sent to notify the people who are the targets of notification.

The information of the email can be checked on the History of Alarm screen.

*2: The setting values for status (alarm status) are as follows:

Enabled

The monitoring item is monitored, and notification is sent when the item reaches

its threshold.

Disabled

The monitoring and notification functions are stopped

After editing the alarm click "Update".

232

Delete Alarm

It is possible to delete alarms.

27.6.1 How to delete an alarm On the Alarm List screen, click [Delete] in the pull-down menu of the target alarm.

Figure 291 Alarm List (Delete)

Check the content to delete, and if there are no problems, click the [Delete] button.

Figure 292 Delete Alarm

233

History of Alarm

It is possible to search and display the History of Alarm using the dates and times of

occurrence.

Figure 293 History of Alarm

Table 65 History of Alarm Display Content

No. Classification Item Name Displayed Content

1 Alarm Alarm name The value when created

2 Filter Start datetime(UTC) Default value: 15 days before the current

date and time (UTC)

3 End datetime(UTC) Default value: The current date and time

(UTC)

4 Search Results Date and time of

occurrence(UTC))

The date and time that the alarm

occurred

5 Alarm state at

occurrence

active / inactive / disabled

6 Description Detailed information from when the

alarm occurred

234

27.7.1 How to display History of Alarm

On the Alarm List screen, click [History] in the pull-down menu of the target alarm.

Figure 294 Alarm List (History)

235

Set the following as the filtering conditions on History of Alarm screen and then click

the "Search" button.

Figure 295 History of Alarm (Filtering Conditions)

・ Method for setting the Start datetime(UTC) and the End datetime(UTC)

Start Date, End Date Select the dates to use for the start date and end date by clicking the text form.

Figure 296 Start Date, End Date

Start Time, End Time Select the times to use for the start time and end time by clicking the text form.

Figure 297 Start Time, End Time

236

Alarm Details

It is possible to open the details of alarms by clicking the alarm name in the Alarm Details

list.

Figure 298 Alarm Details

237

Table 66 Alarm Details Displayed Content

No. Classification Item Name Displayed Content

1 Alarm Date and time of

occurrence(UTC)

The date and time the alarm

occurred

Display Format: yyyy-mm-

ddThh:mm:ssZ

2 Alarm state at

occurrence

active / inactive / disabled

3 Description Detailed information about the

alarm that occurred

4 Alarm name The value when created

5 Resource ID Automatically assigned during

creation

6 Severity - (when not set) / information /

warning / error / critical

7 Alarm action *1 - (when not set) / mail

8 Alarm status *2 Enabled / Disabled

9 Monitoring Resource type The virtual server

10 Monitoring item *3 The monitoring item of the

resource

11 Threshold

Threshold The value and unit from when

created

* "heartbeat" uses no unit

12 Operator equal / above / below

13 Interval Displayed using minutes

14 Statistic average / max / min / sum

*1: The setting values for actions when alarms occur are as follows:

Blank (when not set)

Email notifications are not sent. Checking is only possible from the History of

Alarm screen.

mail

When the threshold condition set for a resource that is a monitoring target is

reached, email is sent to notify the people who are the targets of notification.

The information of the email can be checked on the History of Alarm screen.

*2: The setting values for status (alarm status) are as follows:

Enabled

238

The monitoring item is monitored, and notification is sent when the item reaches

its threshold.

Disabled

The monitoring and notification functions are stopped

*3: For the provided monitoring items, refer to "Features Handbook – Appendix Lists of

Monitored Items (Eastern Japan Region 3/Western Japan Region 3)".

239

Chapter 28 Operation Log

Function Overview

This function provides the functionality for checking the history of operations

performed on the IaaS service portal. The history of operations performed in the

last three days can be referred to.

The following functions are provided.

・ List Display of Operation Logs

Search function

Select a period from the last three days to filter the displayed operation

log. The displayed items are those listed in Table 67. Clicking a displayed

request ID displays the details of the relevant operation log.

- Specifiable range of date and time to search: The last three days

- Amount of operation logs displayable at once: One day's worth

- Date and time specification format: UTC time

Export function

The list information of displayed operation logs can be output in csv

format.

- File format: csv

・ Detailed Display of Operation Logs

Clicking a specific request ID in the list of the operation log displays the

detailed information indicated in Table 67. This enables checking of API

request parameters and response bodies.

240

The items displayed in the Operation Log List Display screen and the Detailed

Display screen is indicated below.

Table 67 Operation Log Display Items (List Display and Detailed Display)

Item Description List

Display

Detailed

Display

Operation time

(UTC)

The time the request was sent

from the screen

Yes Yes

Session ID The ID that indicates the

uniqueness of the browser

Yes Yes

Request ID The ID assigned to the request

sent from the screen

Yes Yes

Screen name The name of the screen that sent

the request

Yes Yes

Operation The sent request Yes Yes

Status code The HTTP status code

corresponding to the request

Yes Yes

User name The user that executed the

request

Yes Yes

HTTP request The content of the sent request No Yes

HTTP response The body of the response to the

request

No Yes

Yes: Displayed

No: Not displayed

241

Usage Method of Operation Logs

1. List Display of Operation Logs

Enter the date and time to use as the search scope (in UTC time), and

then click the "Search" button.

The operation log for the specified search scope is displayed.

To save the search results, click the "Export" button to save the results as a

file in csv format.

Figure 299 Operation Log List Screen

2. Detailed Display of Operation Logs

To check the details of an operation log, click the Request ID.

242

Figure 300 Operation Log Details Screen

Advisory Notes

・ This function cannot store operation logs covering long periods of time.

If you need to store logs covering long periods of time, regularly export the operation

log.

・ The export function for the operation log only outputs the list information.

The detailed information of the Operation log cannot be output.

・ When specifying a time in a search of the operation log, searches are performed using

times rounded down to the nearest 5-minute interval.

For example: 12:09 will be handled as 12:05.

・ The details of operations are recorded in the operation log, but it may take some time

until it is possible to search them.

243

Chapter 29 API Execution

Function Overview

This function is for executing APIs from the IaaS Service Portal and displaying

the response results on the portal. It can be used when executing functions not

provided by the IaaS Service Portal, or when there is no environment for

executing APIs using the command line. In addition, up to 10 executed APIs are

saved in the history function3.

Note: This function is not guaranteed to work with all APIs. If it does not work

correctly, please use the API.

Refer to the following URL for the "API Reference".

https://k5-doc.jp-east-1.paas.cloud.global.fujitsu.com/doc/en/iaas/document/list/doclist_iaas.html

Usage Example

This chapter explains examples of the following two methods that can be

executed using APIs. For other methods, use them after referring to the "API

Reference".

・ GET method: An example of virtual server list acquisition is explained.

・ POST method: An example of virtual server creation is explained.

29.2.1 Information Necessary for API Execution

The following information is necessary on the API execution window. The example explains

the methods for confirming and setting this information.

3 The history is deleted when the project or region is changed.

244

Table 68 Information Necessary for API Execution

Item Description Required /

Optional

Region Select the region to execute the API in. A specific

region or Global can be selected.

Required

HTTP Method Select the HTTP method to be used when

executing the API.

Required

Endpoint Select the component to use for API execution.

Refer to 29.2.2 Endpoint List.

Required

URI Refer to the "API Reference", and then enter the

URI.

Required

Query Parameters Enter the Key and Value of the query.

Refer to the "API Reference", and then enter the

Key and Value.

Optional

HTTP Header Enter the key and value of the HTTP header. Optional

Request Body Enter the HTTP request body. Optional

29.2.2 Endpoint List

The endpoints available when a specific region and Global is selected are different. Refer

to the tables below for details and then specify the endpoint.

Table 69 Endpoint List (Regional Service)

Endpoint Service Name Note

autoscale Auto-Scaling

blockstoragev2 Block Storage

compute Compute (Standard Service)

compute-b Compute (Service for SAP HANA) Only available with SAP

HANA contracts

compute-w Compute (Service for SAP)

database Database

dns DNS Service

identityv3 Regional User Management

image Image Management

import-export Virtual Server Import and Export

keymanagement Key Management

loadbalancing Load Balancer

245

networking Virtual Network

networking-ex Virtual Network Expansion

objectstorage Object Storage

orchestration Template Management

(Orchestration)

software Software Management

telemetry Monitoring

appmanagement Application Management

Not available

blockstorage Block Storage

certificate Certificate Management

contract Regional Contract Management

identity Regional User Management

queue Queue Management

vmimport Virtual Server Import

global-identity Global User Management Not available

* When using global-

identity, use the endpoint

of Global Service.

Note: Different endpoints are provided in each region.

Table 70 Endpoint List (Global Service)

Endpoint Name of Service Note

global-billing Billing Management

global-catalog Product Management

global-cdn Content Delivery Service

global-contract Contract Management

global-identity User Management (Global)

global-rolemanagement Role Management Not available

Note: Different endpoints are provided in each region.

246

29.2.3 Example of Virtual Server List Acquisition

This section explains the method for acquiring a list of the virtual servers in a project.

Figure 301 Example of Entry on the API Execution Window

1. Select the region to execute the API in. You can select the currently selected region or

Global. When acquiring a list of virtual servers, select the currently selected Region.

For the relationship between regional and global services, refer to the "Features

Handbook 1.2 Location Services".

2. Specify the HTTP method, the URI, query parameters, the HTTP header, and the request

body.

Search in the "API Reference - Foundation Service" for the explanation of the desired API.

Figure 302 Extract from API Reference - Foundation Service

TenantID

/v2/ /serversTenantID

247

As shown in Figure 302, set the following for the HTTP method.

- HTTP Method: "GET"

It is possible to specify changes since, image, flavor, name, status, and host in the Query

Parameters, but this example filters the virtual servers to those with the status "ACTIVE".

- Query Parameters

Key : "status"

Value : "ACTIVE"

- HTTP Header: Setting is unnecessary

- Request Body: Setting is unnecessary

3. Select the Endpoint

Refer to Endpoint List and select the relevant endpoint. To acquire the list information of

virtual servers, select "compute".

4. Execute the API

After all of the necessary information has been entered, click the "Execute API" button.

5. Execution Results

The execution results are displayed in the response field.

Figure 303 API Response

248

29.2.4 Example of Virtual Server Creation

This section explains the method for creating virtual servers in a project.

Figure 304 Entry Example

Figure 305 Response Example

TenantID

/v2/ /serversTenantID

249

1. Select the Region

When creating a virtual server, select the currently selected Region.

2. Select the Endpoint

As in the preceding Example of Virtual Server List Acquisition, select "compute".

3. Specify the HTTP Method, the URI, the Query Parameters, the HTTP Header, and the

Request Body

Search in the "API Reference - Foundation Service" for the explanation of the desired

API.

Figure 306 Extract from API Reference - Foundation Service

As shown in Figure 306, set the following for the HTTP method.

- HTTP Method: "POST"

- URI : "/v2/{tenant_id}/servers"

- Query Parameters: Setting is unnecessary

- HTTP Header: Setting is unnecessary

- Request Body: Create the body referring to the following section in the "API Reference".

250

Figure 307 Extract from API Reference - Foundation Service

Figure 308 Example of Request Body Creation

Remainder

omitted

251

4. Execute the API

After all of the necessary information has been entered, click the "Execute API" button.

5. Execution Results

6. The execution results are displayed in the response field.

Figure 309 API Response

252

Chapter 30 VM Import and Export

Function Overview

This function provides the functions (VM import and export) for importing and

exporting virtual server images (vmdk format) that are stored on object storage

to and from the service. For details on the environment settings necessary for VM

import and export, refer to "Virtual Server Import" and "Virtual Server Export" in

the "IaaS Features Handbook".

The OSs supported by VM import and export are as follows:

VM import and export only support the following OSs:

Windows Server 2008 R2 SE

Windows Server 2008 R2 EE

Windows Server 2012 SE

Windows Server 2012 R2 SE

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 7

CentOS

Ubuntu

253

Usage Example

This section explains execution examples of the following:

VM Import : Explains an example of import of a virtual server image.

VM Export : Explains an example of export of a virtual server image.

30.2.1 VM Import

This section explains the confirmation and setting methods for VM import.

1. Display the VM Import List window

Clicking [Import / Export] -> [VM Import] displays the VM Import List window.

Using this window it is possible to refer to the import status of each image that

has been imported. Clicking the "Import" button on the VM Import List window

displays the VM Import window.

There are four types of VM import status:

succeeded

failed

processing

queued

Figure 310 VM Import List Window

2. Information necessary for VM import

After entering each item on the VM Import window, click the "Import" button and

import the image.

254

Figure 311 VM Import Window

The following table indicates the items necessary for VM import.

Table 71 VM Import Window Display Items

No. Item Description Required/

Optional

1 Image Name Enter the image name. Required

2 Container

Name

Select the name of the container to import.

*When there are no containers, transfer to the

Create Container window using the text link, and

then create a container. Refer to 11.2.1 Create a

Container.

Required

3 Object Name Select the name of the object to import.

*When there are no objects, transfer to the

Create Object window using the text link, and

then create an object.

Refer to 11.2.2 Create an Object.

Required

4 OS Type Select the OS type.

* Specify an OS type that matches that of the

OS to be imported.

Required

5 Check Sum

(SHA1)

Enter the value of the check sum. Optional

6 Min Disk Enter the minimum disk value. Optional

7 Min RAM Enter the minimum RAM value. Optional

255

3. Check from the VM Import Detail window

Clicking the desired image name on the VM Import List window displays the

VM Import Detail window. You can refer to detailed information such as object

pass, etc.

Figure 312 VM Import Detail Window

256

30.2.2 VM Export

This section explains the confirmation and setting methods for VM export.

1. Display the VM Export List window

Clicking [Import / Export] -> [VM Export] displays the VM Export List window.

Using this window it is possible to refer to the export status of each image that

has been exported. Clicking the "Export" button on the VM Export List window

displays the VM Export window.

There are six types of VM export status:

succeeded

failed

processing

queued

cancelling

canceled

Figure 313 VM Export List Window

257

2. Information necessary for VM export

After entering each item on the VM Export window, click the "Export" button

and export the image.

Figure 314 VM Export Window

The following table indicates the items necessary for VM export.

Table 72 VM Export Window Display Items

No. Item Description Required/

Optional

1 Image Name Enter the image name. Required

2 Container

Name of

Object

Storage

Select the container name of the

object storage where exported

image files will be stored.

*When there are no containers, transfer to

the Create Container window using the

text link, and then create a container.

Refer to 11.2.1 Create a Container.

Required

258

3. Check from the VM Export Detail window

Clicking the desired image name on the VM Export List window displays the

VM Export Detail window. You can refer to detailed information such as

container pass, etc.

Figure 315 VM Export Detail Window

Advisory Notes

The retention period of the status of VM import and export processing is

seven days from the completion of the VM import or VM export process.

259

Chapter 31 Bare Metal Service (Shared Disks)

Function Overview

This chapter explains the Bare Metal Service (shared disks) provided in

Eastern Japan Region 3. To use this service, you will need to apply separately.

Bare Metal Server

Bare Metal servers (physical servers) can be displayed on the screen

(List/Details) in the same way as Virtual Server. As it is not possible to

distinguish between virtual servers and Bare Metal servers on the reference

window, have customers set names that enable them to distinguish the server

type.

Network

Before creating Bare Metal servers or shared disks, it is necessary to create

the network that Bare Metal servers and shared disks will be connected to.

Perform creation of a network using either the API Execution window or API

(For details, refer to the "IaaS API Reference").

Bare Metal Network (network, subnet, security group, port, virtual router) can

be displayed on the screen in the same way as Virtual Server Network.

Shared Disk

Shared disk functions are provided as the dedicated menu for Bare Metal. The

following functions can be used for shared disks.

List display of shared disks

Detailed display of shared disks

However, operations of shared disks (creation/editing/deletion), snapshot

operations, backup operations, and job management operations are not

provided. If you want to perform these operations, use an API.

This chapter explains how to use shared disks and related advisory notes.

260

How to Use a Shared Disk

For shared disks, it is possible to confirm the information of shared disks

created by customers on screen. *It is necessary to use an API to create a

shared disk.

31.2.1 Shared Disk List Display

It is possible to refer to a list of the shared disks created in a project. Clicking

the link of a volume name enables confirmation of the detailed information of

the volume.

Figure 316 Shared Disk List Screen

31.2.2 Shared Disk Detailed Display

The detailed information of the shared disk (Volume List, Snapshot List,

Backup Volume Schedule, and Backup Generation List) can be referred to from

the Volume Detail Screen.

The Volume Details Screen of the volume selected on the Shared Disk List

screen is displayed as shown in the figure below.

261

Figure 317 Volume Details Screen

Advisory Notes

Bare Metal Servers

When an operation that is not possible for a Bare Metal server is executed

from the Action menu of a virtual server, the operation may not be possible.

Shared Disks

It may take up to a maximum of 5 minutes for the information of shared disks

created using an API to be reflected on the List or Details screen. If the

information is not reflected, wait for a while and then refresh the screen again.

262

FUJITSU Cloud Service K5

IaaS Service Portal User Guide

All Rights Reserved, Copyright FUJITSU LIMITED

- The content of this manual is subject to change without any prior notice.

- No part of this manual may be reproduced in any form whatsoever without the

written permission of FUJITSU LIMITED.