Skip to content

Commit 692aa55

Browse files
committed
Adding docs for noVNC
1 parent d152293 commit 692aa55

File tree

1 file changed

+52
-43
lines changed

1 file changed

+52
-43
lines changed

source/adminguide/systemvm.rst

Lines changed: 52 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ of memory.
5757
the following location:
5858

5959
.. cssclass:: table-striped table-bordered table-hover
60-
60+
6161
========== ================================================================================================
6262
Hypervisor Download Location
6363
========== ================================================================================================
@@ -112,15 +112,23 @@ to the VNC port made available via the hypervisor for the console of the
112112
guest. Both the administrator and end user web UIs offer a console
113113
connection.
114114

115-
Clicking a console icon brings up a new window. The AJAX code downloaded
115+
Clicking a console icon brings up a new window. The console viewer
116116
into that window refers to the public IP address of a console proxy VM.
117117
There is exactly one public IP address allocated per console proxy VM.
118-
The AJAX application connects to this IP. The console proxy then proxies
118+
The viewer application connects to this IP. The console proxy then proxies
119119
the connection to the VNC port for the requested VM on the Host hosting
120120
the guest.
121121

122-
.. note::
123-
The hypervisors will have many ports assigned to VNC usage so that
122+
Since 4.15, noVNC has been integrated into the console proxy and is the
123+
default viewer. It inherently supports multiple keyboard layouts configured
124+
in the guest virtual machine. Additionally, it can scale the display as
125+
well as paste into the console.
126+
127+
noVNC is set as the default console viewer which be changed via the
128+
"novnc.console.default" global setting, which is set to true by default.
129+
130+
.. note::
131+
The hypervisors will have many ports assigned to VNC usage so that
124132
multiple VNC sessions can occur simultaneously.
125133

126134
There is never any traffic to the guest virtual IP, and there is no need
@@ -145,37 +153,37 @@ interrupt existing console sessions for users.
145153
Using a SSL Certificate for the Console Proxy
146154
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
147155

148-
By default, the console viewing functionality uses plaintext HTTP. In
156+
By default, the console viewing functionality uses plaintext HTTP. In
149157
any production environment, the console proxy connection should be
150158
encrypted via SSL at the mininum.
151159

152160
A CloudStack administrator has 2 ways to secure the console proxy
153161
communication with SSL:
154162

155163
- Set up a SSL wild-card certificate and domain name resolution
156-
164+
157165
- Set up SSL certificate for specific FQDN and configure load-balancer
158166

159167

160168
Changing the Console Proxy SSL Certificate and Domain
161169
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
162170

163-
The administrator can configure SSL encryption by selecting a domain
164-
and uploading a new SSL certificate and private key. The domain must
165-
run a DNS service that is capable of resolving queries for addresses
171+
The administrator can configure SSL encryption by selecting a domain
172+
and uploading a new SSL certificate and private key. The domain must
173+
run a DNS service that is capable of resolving queries for addresses
166174
of the form aaa-bbb-ccc-ddd.your.domain to an IPv4 IP address in the
167-
form aaa.bbb.ccc.ddd, for example, 202.8.44.1. To change the console
175+
form aaa.bbb.ccc.ddd, for example, 202.8.44.1. To change the console
168176
proxy domain, SSL certificate, and private key:
169177

170178
#. Set up dynamic name resolution or populate all possible DNS names in
171179
your public IP range into your existing DNS server with the format
172180
aaa-bbb-ccc-ddd.consoleproxy.company.com -> aaa.bbb.ccc.ddd.
173181

174182
.. note::
175-
In these steps you will notice *consoleproxy.company.com* -For
176-
security best practices, we recommend creating a wildcard SSL
177-
certificate on a separate subdomain so in the event that the
178-
certificate is compromised, a malicious user cannot impersonate
183+
In these steps you will notice *consoleproxy.company.com* -For
184+
security best practices, we recommend creating a wildcard SSL
185+
certificate on a separate subdomain so in the event that the
186+
certificate is compromised, a malicious user cannot impersonate
179187
a company.com domain.
180188

181189
#. Generate the private key and certificate signing request (CSR). When
@@ -189,7 +197,7 @@ proxy domain, SSL certificate, and private key:
189197
190198
openssl genrsa -des3 -out yourprivate.key 2048
191199
192-
#. Generate a new certificate CSR. Ensure the creation of a wildcard
200+
#. Generate a new certificate CSR. Ensure the creation of a wildcard
193201
certificate, eg ``*.consoleproxy.company.com``
194202

195203
.. code:: bash
@@ -229,8 +237,8 @@ proxy domain, SSL certificate, and private key:
229237
interruption in console availability.
230238

231239
The Management Server generates URLs of the form
232-
"aaa-bbb-ccc-ddd.consoleproxy.company.com" after this change is made.
233-
The new console requests will be served with the new DNS domain name,
240+
"aaa-bbb-ccc-ddd.consoleproxy.company.com" after this change is made.
241+
The new console requests will be served with the new DNS domain name,
234242
certificate, and key.
235243

236244
Uploading ROOT CA and Intermediate CA
@@ -270,12 +278,12 @@ so the new SSVM and CPVM with new certificates are created.
270278

271279
Load-balancing Console Proxies
272280
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
273-
An alternative to using dynamic DNS or creating a range of DNS entries
281+
An alternative to using dynamic DNS or creating a range of DNS entries
274282
as described in the last section would be to create a SSL certificate
275283
for a specific domain name, configure CloudStack to use that particular
276284
FQDN, and then configure a load balancer to load balance the console
277-
proxy's IP address behind the FQDN. As the functionality for this is
278-
still new, please see
285+
proxy's IP address behind the FQDN. As the functionality for this is
286+
still new, please see
279287
https://cwiki.apache.org/confluence/display/CLOUDSTACK/Realhost+IP+changes
280288
for more details.
281289

@@ -322,26 +330,26 @@ Upgrading a Virtual Router with System Service Offerings
322330
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
323331

324332
When CloudStack creates a virtual router, it uses default settings which
325-
are defined in a default system service offering. See `“System Service
333+
are defined in a default system service offering. See `“System Service
326334
Offerings” <#system-service-offerings>`_. All the
327335
virtual routers in a single guest network use the same system service
328336
offering. You can upgrade the capabilities of the virtual router by
329337
creating and applying a custom system service offering.
330338

331-
#. Define your custom system service offering.
332-
See `“Creating a New System Service Offering”
333-
<#creating-a-new-system-service-offering>`_.
339+
#. Define your custom system service offering.
340+
See `“Creating a New System Service Offering”
341+
<#creating-a-new-system-service-offering>`_.
334342
In System VM Type, choose Domain Router.
335343

336344
#. Associate the system service offering with a network offering. See
337-
`“Creating a New Network Offering”
345+
`“Creating a New Network Offering”
338346
<networking.html#creating-a-new-network-offering>`_.
339347

340348
#. Apply the network offering to the network where you want the virtual
341349
routers to use the new system service offering. If this is a new
342350
network, follow the steps in Adding an Additional Guest Network on
343351
page 66. To change the service offering for existing virtual routers,
344-
follow the steps in `“Changing the Network Offering on a Guest Network”
352+
follow the steps in `“Changing the Network Offering on a Guest Network”
345353
<networking2.html#changing-the-network-offering-on-a-guest-network>`_.
346354

347355

@@ -352,26 +360,26 @@ Best Practices for Virtual Routers
352360
deletes all the iptables rules. To work around this issue, stop the
353361
virtual router and start it from the CloudStack UI.
354362

355-
- .. warning::
356-
Do not use the destroyRouter API when only one router is available
357-
in the network, because restartNetwork API with the cleanup=false
358-
parameter can't recreate it later. If you want to destroy and
359-
recreate the single router available in the network, use the
363+
- .. warning::
364+
Do not use the destroyRouter API when only one router is available
365+
in the network, because restartNetwork API with the cleanup=false
366+
parameter can't recreate it later. If you want to destroy and
367+
recreate the single router available in the network, use the
360368
restartNetwork API with the cleanup=true parameter.
361369

362370

363371
Service Monitoring Tool for Virtual Router
364372
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
365373

366-
Various services running on the CloudStack virtual routers can be
374+
Various services running on the CloudStack virtual routers can be
367375
monitored by using a Service Monitoring tool. The tool ensures that
368-
services are successfully running until CloudStack deliberately disables
369-
them. If a service goes down, the tool automatically restarts the
370-
service, and if that does not help bringing up the service, an alert as
371-
well as an event is generated indicating the failure. A new global
372-
parameter, ``network.router.enableservicemonitoring``, has been
373-
introduced to control this feature. The default value is false, implies,
374-
monitoring is disabled. When you enable, ensure that the Management
376+
services are successfully running until CloudStack deliberately disables
377+
them. If a service goes down, the tool automatically restarts the
378+
service, and if that does not help bringing up the service, an alert as
379+
well as an event is generated indicating the failure. A new global
380+
parameter, ``network.router.enableservicemonitoring``, has been
381+
introduced to control this feature. The default value is false, implies,
382+
monitoring is disabled. When you enable, ensure that the Management
375383
Server and the router are restarted.
376384

377385
Monitoring tool can help to start a VR service, which is crashed due to
@@ -382,9 +390,9 @@ an unexpected reason. For example:
382390
- The services that are terminated by the OS when memory or CPU is not
383391
sufficiently available for the service.
384392

385-
.. note::
386-
Only those services with daemons are monitored. The services that are
387-
failed due to errors in the service/daemon configuration file cannot
393+
.. note::
394+
Only those services with daemons are monitored. The services that are
395+
failed due to errors in the service/daemon configuration file cannot
388396
be restarted by the Monitoring tool. VPC networks are not supported.
389397

390398
The following services are monitored in a VR:
@@ -593,3 +601,4 @@ in an immediate termination of the command and report back to the operator that
593601

594602

595603

604+

0 commit comments

Comments
 (0)