The client in this section is the physical computer and software environment used to interface with Pan-Net Cloud Services. In this documentation, we assume that the client is configured on a PC running on Ubuntu 20.04 and with Python 3 installed. The procedures described should be easily adapted to any Unix-like system.
It is good practice is to create a virtual environment for the project to prevent Python conflict with other applications. The commands in the text are invoking Python 3 using python and pip, but these may have to be replaced by python3 and pip3, respectively, depending on the Python installation.
Virtual environments in Python are managed by the builtin module venv which is used to create dedicated work spaces for projects, making it possible to use different site package versions. A new virtual environment is easily created by
python -m venv .venv
where the argument .venv is the name of the virtual environment folder, and which can be changed to anything convenient (as long as it is a proper folder name). To use the virtual environment, it needs to be activated with
When a virtual environment is active, its name shows before the terminal prompt, for example (.venv) $. This name should therefore be rather short. Any site packages can now be installed in the usual way, but accessible only locally in the virtual environment. To exit the environment, type deactivate after the prompt:
(.venv) $ deactivate
From this point onward, we assume that all Python commands are executed from within a virtual environment, unless otherwise stated.
The OpenStack CLI
Install OpenStack client
OpenStack commands are run from the client, so it needs to have the OpenStack client software installed. It is easily installed through the Python package manager pip by the command
On the Pan-Net portal, an OpenStack RC resource script file with environment variables is generated at the same time as the tenancy space and it can be downloaded from there following Project > Compute > API Access > Download OpenStack RC File v2.0 (Figure 1) and stored in a project folder.
Figure 1. Download button for the OpenStack RC file.
Alternatively, it can be found in the user profile in the right-hand upper corner (Figure 2).
Figure 2. Alternative link for download of the OpenStack RC file.
The name of the OpenStack RC file is <project-name>-openrc.sh, which is a bash script file that can be opened in any text editor. The <project-name> is the name given to your tenant at the time of its creation. Your credentials should be visible in the following variables in the downloaded file
The authentication in the OpenStack client is handled by the Keystone module. Beryllium uses version 2 whereas in Boron version 3 is used. The version used can be seen in the resource file, where the URL has either v2 or v3 as part of it.
Recent versions of OpenStack client support both Keystone versions, but may be using version 2 by default. By passing the optional parameter os-identity-api-version with value 3 to the openstack command, it is forced to use version, for example
openstack flavor list --os-identity-api-version 3
To set this version to be used permanently, modify the resource file to include the environment variable
Connect to cloud via OpenStack CLI
Next, move into the location of the downloaded bash script file and run it by
When the file contains spaces, it is necessary to type brackets around the file name, for example
source “<project-name> - openrc.sh”
to execute the command. The script will ask for a password. Type the same password as used to login to Horizon and press <Enter>. Now the cloud connection information is set with the correct environment variables.
To test the connection, run a simple Openstack CLI command, like
openstack image list
If the connection is established with the proper credentials, the command will print out a list of accessible images which can be used to build a VM.
Note that when the client is restarted, the exported environment variables can be lost. This raises an error like in Figure 3. It is the necessary to re-execute the source command.
Figure 3. OpenStack authentication error message.
The protocols used for secure communication with the cloud and encryption of data are based on Public Key Infrastructure (KPI), including TLS (HTTPS), SSH and GPG. The methods build on two keys - a public key used for encryption which is publicly available, and a private key used for decryption which kept secret.
Transport layer security (TLS)
OpenStack uses TLS (HTTPS) for encrypted API. This requires a certificate signed by a trusted party being accessible on the client (known as a root certificate). In most cases, such a certificate is already present in the OS distribution. On Ubuntu, such certificates reside in the folder /etc/ssl/certs.
In some cases, a special certificate is issued to distribute the public key and other information. It is typically digitally signed by a Certification Authority (CA), a trusted third-party organization that has validated that the information in the certificate is accurate. All users of Pan-Net Cloud Services should install the Pan-Net root certificate.
A new certificate is installed on the client with the ca-certificates utility in a few simple steps. Install the utility with
sudo apt install ca-certificates -y
Next, under /usr/share/ca-certificates create a sub-directory, with some more or less meaningful name, say, extras:
sudo mkdir /usr/share/ca-certificates/extras
Download the Pan-Net root certificate, copy it to the new directory and update the CA certificate store with the commands
The Secure Shell protocol uses certificates for host and user authentication. An open source implementation of SSH (client and server) is contained in the OpenSSH package. On Ubuntu, SSH is installed by default. To verify this, run
which prints out the version details. To use SSH it also requires that an SSH server is running on the remote host (which it is after successful instance launch).
SSH uses key pairs, where a public (shared) key is exchanged between the client and the tenant, and further associated with an instance for secure communication. The key pair can be generated either in the tenant or in the client. Generating the keys in the tenant has the advantage that the same key can be used to access an instance from different clients, as long as the same public key is used.
Create key pair in tenant
A key pair can be generated and shared by a single OpenStack command. The shared key is locally stored in PEM (Privacy Enhanced Mail) format, so the following command creates a key with name <key-pair-name> and stores the file as <key-pair-name>.pem.
Note that the variable <key-pair-name> is contained in angle brackets, followed by the scripting output operator >, which writes the result to the specified file, <key-pair-name>.pem.
A suitable location to store the file is a project directory created for the tenant on the client machine. Set the correct permissions by
chmod 0600 <key-pair-name>.pem
Finally, import the file to the SSH client by
To establish a connection with an instance with the key <key-pair-name> associated to it, no password is needed, only the command
ssh <user>@<IP address>
Create key pair in client
Linux operating systems have the SSH client pre-installed, and a key pair is generated by the command ssh-keygen. The keyword takes a number of arguments. We will use the following arguments to ensure correct format of the keys:
-t key_type specifies the algorithm used to generate the keys. The value replacing key_type should be rsa (which is also the default)
-b bits specifies the key size. The default value of bits is 2048. A stronger key (larger key size) is generated by setting it to 4096. A larger key may slow down the initial connection but has no effect on the speed of the encryption after the connection has been established.
-f <filename> To avoid the keyword to prompt for a file name, it can be passed directly to it before execution. It is advisable to name the key so that it easily can be associated with the intended project, for example <project-name>.key.
First, change the directory to the standard directory for security keys by
Generate the key pair by executing
ssh-keygen -t rsa -b 4096 -f <project-name>.key
If you don’t specify the filename as an argument to ssh-keygen, it will ask for it or use the default nameid_rsa. You will also be prompted to enter a passphrase to protect your key. Either enter the same memorable passphrase twice, or press <ENTER> twice to continue without passphrase protection. SSH will prompt for the passphrase before establishing a connection to your instance, so please select an adequate level of protection for the key. The output will look something like shown in Figure 4.
Figure 4. Creating key pair in the client with ssh-keygen.
Your key pair has now been created and is ready to be used. You can inspect the content of the public key by open it in a text editor of just by typing in your console
The final step to enable SSH is to import the public key to the portal. In Horizon, open the window Compute/Key Pairs. Click on the button Import Key Pair to open the window form shown in Figure 5.
In the form, enter a key pair name - it is advisable to use a name that can be used to identify the name of the key previously generated. Next, copy and paste the full contents of the public key in the designated free-text field and press the button Import Key Pair.
Figure 5. Importing the public key to the instance.
After importing the key, it is visible in the Key Pairs window (Figure 6). If there are more than one key pair in the list, and the new key pair name is not selected as active, click on the arrow buttons to deselect the old key pair and select the new one.
Figure 6. Verifying public key status.
Secure file transfer is typically utilizing secure file transfer protocol (SFTP) or secure copy protocol (SCP), which are both related to SSH. File transfer can be performed from a terminal or a file client with a GUI, including the Ubuntu native Nautilus.
In particular for Windows, an alternative to SSH authentication from the terminal is access through an SSH client, such as PuTTY. The client includes a command-line SFTP component, called PSFTP.
There is a number of graphical SFTP clients available that can be used for secure file management, such as FileZilla, which can be a convenient solution for both Linux and Windows.
Command-line file transfer
The SCP utility (using the same acronym as the protocol it uses) is installed by default on Ubuntu and provides an easy-to-use method to copy files between two hosts securely.
SCP relies on ssh for the data transfer, so an ssh key or password is needed to authenticate access on remote. The operation also requires read permission on the source file and write permission on the destination host.
The colon (:) is used by SCP to distinguish between local and remote locations. If the source or destination host specification is omitted, the end-point is the local client itself. Remote hosts can be reached with the usual ssh argument, ubuntu@<ip-address>. The arguments file1 and file2 are the relative paths and file names to the file being copied and the file name it is saved as at the destination. Note that the folder in the path at the destination must exist for the transfer to succeed. To transfer a file.txt from the client to a remote host with IP address 18.104.22.168, the syntax is
scp file.txt firstname.lastname@example.org:file.txt
To transfer a file in the other direction, simply reverse the source and destination arguments:
scp email@example.com:file.txt file.txt
Command options include:
-C use data compression during the transfer
-i include key file (the same as for ssh)
-P specify the SSH port used by the remote host
-p preserve file modification and access timestamps
-q suppress the progress bar and warning messages
-r copy recursively, that is, all files in a folder
SCP also works nicely with back-end servers accessed through a bastion host. Simply replace the <username>@<ip-address> part with the server nickname defined in ~/.ssh/config. If a server can be reached with, say,
then file transfers to and from the server are done with
scp file.txt my_backend:file.txt
scp my_backend:file.txt file.txt
SCP shows a progress bar of the transfer (Figure 7).
Figure 7. SCP file transfer through a bastion host showing progress bar.
The stability of an SSH session can be a problem when handling large files. A session can be made persistent by launching it inside a terminal multiplexer, such as GNU screen or tmux. Below, GNU screen is described briefly.
The utility is installed through
sudo apt install screen
The installation can be tested with screen --version, which prints out the version of screen currently installed. Screen is controlled by a special control sequence (similarly to text editors). The control mode is invoked by ^A, meaning pressing the Ctrl and A keys (lowercase) simultaneously, followed by a control character.
To run a SSH or SCP session in screen, launch the utility from a regular terminal with
Available commands are listed by ^A followed by the ? character (which may require simultaneously pressing the Shift key). The sequence ^A and c opens a terminal from which a session is started as usual, but from within the screen environment. Exit screen with ^A and \. A notification is shown as in Figure 8. Press y to close the utility and return to the regular terminal.
Figure 8. Notification on exiting screen.
Using a file manager
There are many file managers providing a graphical user interface for file transfer between the client and the cloud. Unfortunately, many of these clients can only connect directly to instances having a floating IP assigned, but not to servers and volumes behind an SSH proxy (bastion host).
Based on SFTP, the file browser Nautilus can be used for file operations. Highlight the item Other Locations and in the field Server type
and press ENTER. This opens the home directory on the remote server (Figure 9).
Figure 9. Using Nautilus to explore files on remote server.
An virtual machine accessible by an IP address can also be mapped to a file manager such as FileZilla which supports both FTPS (SSL) and SFTP (SSH).
The mapping can be set up over SFTP using the IP address, login details and the key or certificate. A file manager typically has a site or connection manager, where the user can enter the details needed to connect to the VM. In FileZilla the site manager looks as shown in Figure 10.
Figure 10. Site manager in FileZilla - connect to remote server over SFTP.
In the Site Manager form, the user only needs to add host (IP address), user name and link to the key file. After connecting, the file manager displays the folder structure in the virtual machine and allows file upload, download and remote file operations (Figure 11).
Figure 11. FileZilla displaying file structures on the local host (left pane) and remote host (right pane).
Encrypted data storage
To use data encryption, the data needs to be encrypted on the client side before being uploaded to the cloud. This means that the encrypted files have to be visible to the local file system.
The Linux-native Gnu Privacy Guard (GPG) invoked by the gpg command relies on key pairs and can be used to encrypt and decrypt files for secure storage and file sharing. Encrypted files can then be stored or shared on the cloud.
Backup and restore with rsync
It is crucial for any system to have a well-defined backup and restore strategy. For a cloud deployment there are a few important points to consider. OpenStack provides methods that can be used for backup purposes, but these backup copies are mainly remaining in the cloud. It is often desirable to implement an incremental backup procedure. This can be done with rsync - even for servers behind a bastion host.
A backup plan should detail all systems that need to be backed up regularly, with which frequency, and where to store the copies or database replicas.
OpenStack can be used to create snapshots or images of entire volumes (see https://pannet.atlassian.net/wiki/spaces/DocEng/pages/501022851 ). This is usually not a suitable method in many situations where some files or folders are updated much more often than others. A more granular level of backup on folder level can be performed with rsync.
Remote sync (rsync) is a command-line incremental backup utility included in the Ubuntu 18.04 distribution. It is used to pull and back up files from the cloud to the user client for secure storage. It uses SSH (among other possibilities) and can be used to fetch files and folders from back-end servers through a bastion host
If the remote host has a public IP assigned, the files can be downloaded directly to the client with SSH or a file manager. When the host is located behind a bastion host, the rsync command takes the argument -e ssh specifying that SSH is to be used as remote shell - the SSH addressing and key pair handling is conveniently implemented in the bastion host.
To back up files from the cloud, located in the remote folder <folder-on-remote> to the folder <folder-on-client>, simply issue a command like
which will pull the content of the remote folder <folder-on-remote> and store the entire remote folder under <folder-on-client>. The folder <folder-on-client> must exist, but any subfolders will be created if necessary.
The options suggested here are
-a - enable archive mode, which preserves file permissions, ownership, and preserves symbolic links
-r - pull files recursively, that is, all files in a folder and its subfolders
-v - enable verbose output mode
-z - use file compression during transfer
--progress - show progress bar during transfer
In the example shown in Figure 12, the server <remote-nickname> is griselda and the contents of the remote folder www is stored on the client under test/www. The folder test on the client has to exist, but the subfolder www is created by rsync.
Figure 12. Verbose output from rsync.
The rsync utility is very flexible and can be tailored to specific needs using a selection of its many available options. Please refer to the rsyncman page for details. To push files, only swap the order of the source and destination folders.
It simplifies the backup process to have server data, log files etc. on a volume separate from the running instances themselves. Also note that databases and other applications should be backed up before the file transfer is initiated.
Note that for maximum security, a dedicated key pair should be used for the rsync operations. It is also possible to restrict SSH to a set of predefined commands.
View tenant resources
The OpenStack command quota is used to list the initial resources in a tenant (project). For a complete list, execute
openstack quota show
Sometimes it is more convenient to print only a specific resource, which is done by giving the option --column (or, equivalently, the flag -c) before a resource type, for example
openstack quota show -c gigabytes
There are several different interfaces available for instance configuration:
OpenStack via Horizon or CLI
SSH remote access
Web console of an instance
To be able to login directly on the virtual machine, create a username and set a password with
sudo useradd <username>
sudo passwd <username>
The web console can be opened following a link generated by Horizon or by issuing the command
openstack console url show <server-id>
The output contains an URL that can be copied into a browser window (Figure 13). On the login screen that is shown, enter the credentials for <username> to login. The console is for example useful for monitoring boot processes and troubleshooting networking issues.
Figure 13. The web-based instance console opened from Horizon.
Please note that the web console requires an encrypted connection, that is, connection over a virtual private network.
Copy object data to variable
Whenever the identity of an OpenStack object is needed repeatedly, it is convenient to store it in an environment variable. The value can be extracted from the command
openstack <object> show <object-name>
The displayed table contains key-value-pairs for all important parameters. For example, the identity string has key id, and can be filtered out from the show request - in this case the identity string of an image with name <image-name>:
IMG_ID=`openstack image show -f value -c id <image-name>`
The variable can called anything as long as it is not used as environment variable in any other context. Note the slanted apostrophes surrounding the OpenStack command. The variable can then be used, returning its value when prefixed by $, like this
Nova provides a Compute instance metadata service, which is reachable through a REST API. Metadata can be provided by the user, by Nova itself or by Pan-Net Cloud at creation time.
The OpenStack metadata API has a number of supported versions concurrently. To retrieve a list of supported versions for the metadata API, log in to the Compute instance and make a GET request to http://169.254.169.254/openstack, which will return a list of directories
The content of a directory (version) is retrieved with
The output is shown in Figure 14.
Figure 14. Output from the Nova metadata service.
For the client, a computer running on Linux is strongly recommended but not strictly necessary. However, some utility software currently run only under Linux. On Linux, superuser (or root) access is required to install software, modify system files and change file permissions. On a Windows PC or Mac, administrator rights may be needed to install some software. For Windows, there are several possibilities to enable the necessary CLI tools:
Activate Windows Subsystem for Linux (WSL2)
Install a virtual machine (VM), such as VirtualBox or VMWare
Using a public cloud service with a browser-based terminal as entry point (for example Google cloud). To enable the cloud-based client
Register with Google cloud and set up a simple VM
Share key pairs with this account
Use Google browser-based terminal options to SSH into Pan-Net VM from the Google VM