Kasm Workspaces OpenStack Autoscaling on OpenMetal

Поділитися
Вставка
  • Опубліковано 30 лип 2024
  • The New Kasm OpenStack Providers allow Administrators to leverage an OpenStack Private Cloud for Linux and Windows Kasm Workspaces. This video tutorial shows the process for configuring Kasm Zones and Autoscaling Pools to integrate with your OpenStack Deployment. Ensuring that credentials use least privilege to maintain security. Common issues and methods of troubleshooting are also outlined.
    This tutorial leverages an OpenStack private cloud from OpenMetal. More information can be found at: openmetal.io.
    More documentation on the OpenStack Provider can be found at: kasmweb.com/docs/latest/guide...
    00:00 Introduction
    00:16 OpenStack on OpenMetal
    00:31 OpenStack Deployment Background
    00:52 Kasm Deployment
    01:26 Kasm Zone Config
    01:52 Configuring Kasm Agent Pool
    02:15 Kasm Agent Autoscale Configuration
    03:28 Agent Autoscale Nginx Cert
    04:43 Agent Provider Configuration
    05:14 Openstack API Endpoints
    06:48 Openstack Authentication Methods
    07:10 Openstack Application Credentials
    08:29 Metadata, Image ID, and Flavor
    09:40 Openstack Volumes
    10:24 Kasm Startup Script
    11:52 Openstack Security Groups
    12:53 Openstack Network ID, Key, Availability Zone and Config Override
    13:45 Troubleshooting Agent Provisioning Issues
    17:48 Launching a Kasm Container Workspace
    18:26 Openstack Windows Image
    19:23 Windows Kasm Pool
    20:03 Windows Kasm Autoscale Config
    22:14 Windows Kasm Provider Config
    25:02 Windows Kasm Startup Script
    25:42 Windows Kasm Security Groups
    27:44 Windows Kasm Server Provisioning and Troubleshooting
    30:39 Creating Windows Kasm Workspace
    31:12 Logging in To Windows Kasm Workspace
    33:09 Outro
  • Наука та технологія

КОМЕНТАРІ • 2

  • @JasonTurner
    @JasonTurner 4 місяці тому

    Beautiful demo & tutorial! Very coherent and well-planned!

  • @cureheal
    @cureheal 4 місяці тому

    Very interesting :)