unofficial mirror of guix-devel@gnu.org 
 help / color / mirror / code / Atom feed
From: ng0 <contact.ng0@cryptolab.net>
To: Chris Marusich <cmmarusich@gmail.com>
Cc: guix-devel@gnu.org
Subject: Re: Advice about GuixSD on Serveraptor?
Date: Sun, 26 Mar 2017 11:54:56 +0000	[thread overview]
Message-ID: <20170326115456.dpbo6ji42nae6l5e@abyayala> (raw)
In-Reply-To: <87mvc9raqq.fsf@gmail.com>

Chris Marusich transcribed 5.9K bytes:
> ng0 <contact.ng0@cryptolab.net> writes:
> 
> > Chris Marusich transcribed 2.4K bytes:
> >> ng0 <contact.ng0@cryptolab.net> writes:
> >> 
> >> > If IN-Berlin uses (or needs) nothing special for the consoleserver to
> >> > make use of the virtual servers within IN-Berlin infrastructure, I think
> >> > it would be best if we (as Guix) could provide an extended bare image
> >> > for servers which would include ssh-daemon on default port with password
> >> > login enabled, where the password is not empty. That's a workaround I
> >> > can imagine to be generic enough for all use cases.
> >> > For the one of IN-Berlin and maybe similar hosters who use ssh pubkeys,
> >> > it would be great to document for them how to recreate this image in
> >> > easy steps and insert the clients ssh pubkey for the root account (or an
> >> > named user) on the system.
> >> >
> >> > What do you think about this?
> >> 
> >> Instead of providing a pre-built image of a specific system with
> >> pre-built credentials, wouldn't it be better to add a feature that, in
> >> the spirit of a command like 'guix disk-image', builds an entire system
> >> that can then be imported as-is into IN-Berlin?
> >> 
> >> In general, such a feature would be useful.  One can imagine leveraging
> >> a feature like this to import custom GuixSD systems into various hosting
> >> services - Amazon EC2, Rackspace, wherever.  Instead of starting with a
> >> pre-built image that might be hard to reproduce or verify, and then
> >> mutating that system to suit your needs, you could just import the exact
> >> system that you want to deploy.  Wouldn't that be better?
> >> 
> >> -- 
> >> Chris
> >
> > Their system works in the way that you provide the key and they give you
> > access via ssh to the new server. My suggestion was a work-around.
> 
> I think your proposed solution is a good one.  It sounds like that's a
> good way to get a GuixSD server running on IN-Berlin at this time.
> 
> > Beyond that, can you please explain what exactly you mean? I don't want
> > to read between the lines as there are multiple ways I could interpret
> > this message.
> 
> Sure, let me see if I can clarify what I was thinking.

Thanks, I think once guix deploy has basic functionality it would be
good to get IN-Berlin involved at my end, so that we can understand
their workflow (working with raw images + consoleserver), and integrate
GuixSD in their currently Debian-only system.
 
> For example, the Amazon EC2 service provides web APIs that one can call
> to import an existing VM image into the service.  One can then launch
> EC2 instances (virtual machines) from that image.  I'm sure that some
> other services have similar APIs.  With Guix, we can declaratively
> configure the entire operating system (including the pre-installation of
> SSH credentials to enable remote access) and build an image (or a VM) of
> that system.  In theory, it should be possible to create a tool (e.g.,
> "guix deploy") which not only creates the precise system image you want
> from an operating system configuration file, but also imports it into a
> hosting service, like Amazon EC2, and provisions a virtual (or physical)
> machine from that image.
> 
> The same principle could apply even for providers that don't currently
> support programmatic importation of system images (like IN-Berlin,
> maybe?).  For example, if a company offers to accept a bootable disk
> image and provide you with a physical server that runs that image, you
> could also "import" a system into that service by building the image and
> then providing it (manually) to them.  If instead of a disk image they
> require a bootable ISO-9669 file system image (i.e., a bootable CD-ROM
> image) or a special VM format like OVF, then that's just an
> implementation detail.  In theory it's still possible to "import" an
> entire system by building an entire system in the format that they need,
> and then (manually) providing it to them.
> 
> Based on your description, it sounds like IN-Berlin's process requires
> manual touch points, so I think it's a fine solution to provide
> IN-Berlin with your public SSH key (or a temporary password) along with
> instructions for how to build the GuixSD system you want, wait for them
> to provision the server, and then log in remotely to further customize
> the system.  However, I think it would be really cool if you could just
> specify the final, customized system (SSH keys and all) in an operating
> system configuration file and then invoke a tool like "guix
> deploy-to-ec2 my-system-config.scm" to build the system described by
> my-system-config.scm, import it into EC2 (or some other service or
> provider), and run it on there.  It would be really cool because your
> system wouldn't start in a possibly stale or difficult-to-reproduce base
> system, and you wouldn't need to perform additional customization after
> the system starts up.  All customizations (to the extent that they are
> managed by Guix - things like the contents of user home directories and
> the state contained in databases running on the system are not managed
> by Guix) would be declared in the operating system configuration file.
> 
> Currently, I don't think Guix has the features necessary to support this
> kind of programmatic importation of GuixSD systems into service
> providers like Amazon EC2.  But the potential is there, and it's good to
> think big.
> 
> -- 
> Chris

      parent reply	other threads:[~2017-03-26 10:55 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-02-09 18:36 GuixSD on commodity hosting platforms, hoster: IN-Berlin ng0
2017-02-09 20:38 ` Jan Nieuwenhuizen
2017-02-10 15:35   ` Ludovic Courtès
2017-02-10 22:48   ` ng0
2017-02-10 22:59     ` ng0
2017-02-11 10:37     ` Jan Nieuwenhuizen
2017-02-11 13:35       ` ng0
2017-02-13 21:47 ` Leo Famulari
2017-02-14  9:24   ` Ludovic Courtès
2017-02-14 10:10     ` ng0
2017-02-14 16:42     ` Leo Famulari
2017-02-16 15:34   ` Christopher Allan Webber
2017-03-13  0:32   ` Advice about GuixSD on Serveraptor? Leo Famulari
2017-03-21 18:06     ` Leo Famulari
2017-03-21 20:22       ` Christopher Allan Webber
2017-03-21 20:46         ` Leo Famulari
2017-03-21 20:53           ` Leo Famulari
2017-03-22  7:36             ` Thomas Danckaert
2017-03-22 17:17               ` Leo Famulari
2017-03-22 12:04             ` Ricardo Wurmus
2017-03-22 17:20               ` Leo Famulari
2017-03-22 17:23                 ` Leo Famulari
2017-03-24  9:36                   ` Ludovic Courtès
2017-03-24 15:26                     ` Leo Famulari
2017-03-26 10:20                       ` Ludovic Courtès
2017-03-21 21:06           ` ng0
2017-03-22 17:15             ` Leo Famulari
2017-03-22 19:20               ` ng0
2017-03-22 21:01                 ` ng0
2017-03-24  4:35                   ` Chris Marusich
2017-03-24 16:34                     ` ng0
2017-03-25  9:01                       ` Chris Marusich
2017-03-26 10:26                         ` Ludovic Courtès
2017-03-26 11:54                         ` ng0 [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170326115456.dpbo6ji42nae6l5e@abyayala \
    --to=contact.ng0@cryptolab.net \
    --cc=cmmarusich@gmail.com \
    --cc=guix-devel@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).