jumpGate部署

preface statement: manageing OpenStack & SoftLayer resource with Jumpgate

1,forward;

Imagine a world of interconnected Clouds capable discovering, coordinating and collaborating in harmony to seamlessly carry out complex workloads in a transparent manner -- the intercloud . While this may be the dream of tomorrow, today‘s reality is a form of the intercloud called hybrid Cloud . In a hybrid Cloud model organizations manage a number of on-premise resources, but also use off-premise provider services or resources for specific capabilities, in time of excess demand which cannot be fulfilled via on-premise resources, or for cost effectiveness reasons. Both of these Cloud computing models have a common conduit to their realization -- open standardized APIs, formats and protocols which enable interoperability between disparate Cloud deployments.

Enter OpenStack
-- a rapidly growing open source Cloud framework which removes
vendor lock-in by providing open, vendor agnostic APIs. OpenStack
consists of a number of distributed, scale-out ready services which
allow organizations to build Cloud solutions in a more cost effective
manner. Just as the name implies OpenStack is open source, open design
and open teaming / leadership. As shown in a  2013 Forrester study
, collectively OpenStack becoming the most popular private Cloud of choice (see diagram below).

SoftLayer is the premier Data Center and hosting provider in the industry today offering numerous pre-built managed services and solutions to fit many needs -- from web hosting to private hosted Clouds -- SoftLayer is the right choice. Not only does SoftLayer provide soft services, but they also offer fully dedicated bare metal hardware suitable for the most demanding workloads. SoftLayer also supports a comprehensive set of native APIs allowing developers and operators to take programmatic control over their resources. Wouldn‘t it be great if you could use OpenStack APIs with SoftLayer? As luck would you have it, you now can.

The folks over at the SoftLayer innovation team recently released a new open source project called Jumpgate
. With Jumpgate you can use a number of your favorite OpenStack
tools and APIs to bridge directly into SoftLayer. For example you can
use the OpenStack nova CLI and APIs to boot SoftLayer virtual compute
servers, or the OpenStack glance CLI to manage SoftLayer based images.
You can even use the OpenStack Horizon dashboard to graphically manage a
number of your SoftLayer resources including virtual servers and
images.

In this article we‘ll cover the following topics:

    • An overview of Jumpgate including its high level architecture.
    • Step-by-step instructions on how to install and configure
      Jumpgate including creating an upstart job to manage Jumpgate as a
      service.
    • Detailed instructions on how to install and use the OpenStack nova CLI with Jumpgate.
    • A guide to setting up the OpenStack Horizon web-based
      dashboard with multiple regions so that you can manage SoftLayer
      resources from a single pane of glass.

2,Introducing softLayer Jumpgate

Jumpgate is an open source project started by the folks over at SoftLayer innovation labs which aims to bridge the gap between OpenStack native APIs and other proprietary vendor APIs -- an API adapter proxy if you will. Jumpgate is implemented in the Python programming language as a WSGI application and thus runs as a web based service.  As a fully compliant python WSGI application, Jumpgate can be hosted via a Python server such as  gunicorn or fronted by your favorite web server with WSGI support such as Apache with mod WSGI or nginx with NgxWSGIModule .

From an architectural perspective Jumpgate is stateless (no
persistence) and lightweight making it easy to scale out suiting the
needs of many deployment scenarios. Under the covers Jumpgate is
pluggable, allowing you to easily snap-in or snap-out both request and
response middleware "hooks" and service drivers.

Jumpgate request and response hooks permit you to write and
plug-in Python code which can work with requests and responses as they
enter / leave the Jumpgate application. For example you could easily
implement a hook to support API rate limiting or fully featured request
auditing. Out of the box Jumpgate includes a number of pre-built hooks
including logging and authentication.

Jumpgate service drivers provide the functionality needed to
translate OpenStack native API requests into native APIs requests and
back again as OpenStack compliant responses. Think of these drivers as
adapters. These drivers are pluggable per OpenStack service endpoint
supported by Jumpgate -- image, compute, network, identity, etc.. 
Out of the box Jumpgate provides a set of SoftLayer drivers
which allow you use a number of OpenStack client side tools immediately
with SoftLayer Jumpgate. It‘s also possible to implement and snap-in
your own drivers to support bridging between OpenStack APIs and your
native API.

From and identity perspective, Jumpgate also includes a number of
other plug points providing maximum flexibility for your solution needs.
For example the Keystone compliant service catalog
served by Jumpgate is based on a template file which look much like the Keystone default catalog
. These endpoints can be modified to suit your needs and you can
also plug in other remote service endpoints you wish Jumpgate to expose
in the service catalog. Jumpgate also includes pluggable token and
authentication drivers allowing you to control how authentication
requests are fulfilled, as well as how tokens are structured, encoded
and decoded.

The diagram below depicts the high level architecture of Jumpgate.
On the left side of the diagram the generic form of Jumpgate is
illustrated whereas on the right the SoftLayer specific drivers which
realize the bridge are shown. You can also check out Nathan Beittenmiller‘s SoftLayer blog on Jumpgate
.

From a development perspective, Jumpgate is a young active project which is growing / enhanced daily. As such, not each and every OpenStack API is supported with the out of the box SoftLayer drivers today. Instead, the most common OpenStack APIs were selected and initially implemented with additional APIs being added incrementally until the bridge is sufficiently supported. For a more complete list of the APIs supported, see the "compatibility matrix" on the Jumpgate developers page . That being said, please do file issues if you run into any bugs or if you have feature requests. Moreover, we are always looking for contributions so if you are feeling Pythonic please help out by following the contributors guide .

Let‘s now move to the hands-on instructions and get Jumpgate running.

3,Installing & Setting up Jumpgate

For this guide we‘ll be setting up Jumpgate and related components on a SoftLayer Cloud Computing Instance (CCI) which is running the Ubunutu 12.04 Operating System. However, you could just as easily provision Jumpgate off-premise SoftLayer as the SoftLayer API (SLAPI) endpoint is public facing and reachable over the public network. Moreover a number of the exact commands shown here are Ubuntu specific (i.e. apt-get , initctl , etc.), but they can easily be translated into your distro of choice.

In the steps that follow I will provide snippets from my
terminal which include my shell prompt, followed by the exact command(s)
run. I will also show an abbreviated section of the command‘s output
using "
...
" to indicate additional output is removed for brevity. I tend run multiple commands on a single line using the bash
&&
operator. This operator can be used to chain multiple commands on a single line and indicates
bash
should execute the commands left-to-right, one-by-one only
running subsequent commands in the chain if the previous executes
successfully. If a command should fail, you can address the failure and
run the remaining commands one-by-one. Finally I‘m performing all steps
in this guide as a non-root user and thus use
sudo
to execute commands as root.

Before you begin

In order to prepare for the Jumpgate installation and setup,
take a moment to consider the topology you wish to realize with this
solution. In particular consider the following questions:

  • Will the components consuming Jumpgate be located on the same host as Jumpgate, or will they be remote?
  • If the components consuming Jumpgate are remote, which IP / interface will they be using to communicate with Jumpgate?
  • Which port will Jumpgate bind to on your host system? If you
    are planning to run OpenStack Keystone on the same system using
    Keystone‘s default ports, you will need to select a different open port
    for Jumpgate to bind on.

As a result of the questions above, you will need to determine
the IP address Jumpgate will bind and listen on. If your solution will
always have the Jumpgate consumers on the same host, you may choose to
bind Jumpgate to the loopback IP of your host (localhost, 127.0.0.1) and
thus not expose it externally. However if your Jumpgate consumers will
be remote, you may want to restrict their access to the private IP of
your host in which case Jumpgate would bind to the private IP / network.

The IP address you wish to bind Jumpgate on is referred to as the
JUMPGATE_IP
in the instructions below. Any place you see
JUMPGATE_IP
, substitute the IP Jumpgate will bind to.

Likewise the port you will bind Jumpgate to is referred to as
JUMPGATE_PORT
below. Substitute your selected Jumpgate bind port accordingly.

Install Prerequisites

The first thing we need to do is to install some prerequisites
(dependencies) needed by Jumpgate and it‘s python requirements. Note
that NTP
is not required by Jumpgate, but my preference is to keep server times in sync and thus I illustrate its setup here.

时间: 2024-09-17 18:40:33

jumpGate部署的相关文章

IBM发布JumpGate 连接OpenStack和公有云

IBM希望JumpGate能够成为OpenStack私有云和公共云之间的“时空门”.JumpGate是IBM开发的用来解决云管理生态系统碎片化问题的中间件工具,用来吸引更多的云服务商支持OpenStack应用(即使他们没有部署OpenStack) 通过连接OpenStack和“其他的云”,IBM希望JumpGate能够成为OpenStack私有云和公共云之间的“时空门”. JumpGate是IBM开发的用来解决云管理生态系统碎片化问题的中间件工具,用来吸引更多的云服务商支持OpenStack应用

微信小程序——豆瓣电影——(2):小程序运行部署

Demo 预览 演示视频(流量预警 2.64MB) GitHub Repo 地址 仓库地址:https://github.com/zce/weapp-demo 使用步骤 将仓库克隆到本地: bash $ git clone https://github.com/zce/weapp-demo.git weapp-douban --depth 1 $ cd weapp-douban 打开微信Web开放者工具(注意:必须是0.9.092300版本) 必须是0.9.092300版本,之前的版本不能保证正

Spring Boot 热部署

需要在pom.xml文件中加如下代码: 1 <dependencies> 2 <dependency> 3 <groupId>org.springframework.boot</groupId> 4 <artifactId>spring-boot-devtools</artifactId> 5 <optional>true</optional> 6 </dependency> 7 </depe

Centos7.2部署.Net Core2.0 WebApi

部署前准备 1.VisualStudio2017+.netcore2.0SDK 2.Centos7.2 3.SecureCRT,Xftp(根据自己喜好) 创建WebApi项目 修改Program.cs中的BuildWebHost方法为(不改也可,core默认使用Kestrel作为Server) public static IWebHost BuildWebHost(string[] args) => WebHost.CreateDefaultBuilder(args) .UseKestrel()

eclipse部署tomcat修改项目访问路径(虚拟路径)

原文参考: http://www.educity.cn/wenda/147993.html http://blog.163.com/java_zf/blog/static/19926038420129240314546/ tomcat部署web项目(eclipse自动部署项目到tomcat,访问URL中不包含部署名) 最近项目中需要把项目部署到tomcat中,并且访问路径中不包含不署名,且想实现Eclipse中的自动部署,扒了好久资料,最终实现了自己的需求,呵呵,如下: 1. 把项目contex

配置resin web方式部署项目

写在前面,推荐下载resin4.0.47版本.其它版本没有测试 最近打算做一个小项目,然后容器选用了resin.想通过web提交war文件的方式 进行部署,更新代码也方便. 试了resin最新的版本(目前最新版本为4.0.53),提交war文件到webapps下面都是.tmp文件.百度google一通还是没找到解决办法. 看了下公司用的resin版本,选择4.0.47.下载后发现没最新版本的上传问题. 通过web提交war文件方式步骤如下: 步骤一:修改resin.properties.推荐配置

weblogic部署war

[HTTP:101216]Servlet: "DispatcherServlet" failed to preload on startup in Web application: "Ldzc.war". org.springframework.beans.factory.CannotLoadBeanClassException: Cannot find class [com.neusoft.biz.Impl.BookBizImpl] for bean with n

kubernetes部署etcd集群

部署环境: CentOS Linux release 7.2 64位 10.10.0.103 etcd master 10.10.0.49   etcd follower master安装过程: # yum update # yum install -y etcd # [member] ETCD_NAME=etcd1 ETCD_DATA_DIR="/var/lib/etcd/default.etcd" #ETCD_WAL_DIR="" #ETCD_SNAPSHOT_

Windows 10 UWP 部署

原文  http://youthlin.com/20151105.html 我们知道VS连接手机可以直接部署到手机里,但平板貌似无法这样干,平板与电脑连接没有丝毫反应……那么想看VS里写的uwp应用在平板上的运行情况怎么办呢? 如果是本机电脑的话,也可以直接调试,要是平板———— 当然是部署啦,不过怎么部署呢,网上搜到的有命令行 winappdeploycmd.exe 命令的,有Win8.1时代部署方法的,我用winappdeploycmd.exe试了一下,一直无法找到设备,连手机也搜不到,于是