From: ng0 <contact.ng0@cryptolab.net>
To: Chris Marusich <cmmarusich@gmail.com>
Cc: guix-devel@gnu.org
Subject: Re: Advice about GuixSD on Serveraptor?
Date: Sun, 26 Mar 2017 11:54:56 +0000 [thread overview]
Message-ID: <20170326115456.dpbo6ji42nae6l5e@abyayala> (raw)
In-Reply-To: <87mvc9raqq.fsf@gmail.com>
Chris Marusich transcribed 5.9K bytes:
> ng0 <contact.ng0@cryptolab.net> writes:
>
> > Chris Marusich transcribed 2.4K bytes:
> >> ng0 <contact.ng0@cryptolab.net> writes:
> >>
> >> > If IN-Berlin uses (or needs) nothing special for the consoleserver to
> >> > make use of the virtual servers within IN-Berlin infrastructure, I think
> >> > it would be best if we (as Guix) could provide an extended bare image
> >> > for servers which would include ssh-daemon on default port with password
> >> > login enabled, where the password is not empty. That's a workaround I
> >> > can imagine to be generic enough for all use cases.
> >> > For the one of IN-Berlin and maybe similar hosters who use ssh pubkeys,
> >> > it would be great to document for them how to recreate this image in
> >> > easy steps and insert the clients ssh pubkey for the root account (or an
> >> > named user) on the system.
> >> >
> >> > What do you think about this?
> >>
> >> Instead of providing a pre-built image of a specific system with
> >> pre-built credentials, wouldn't it be better to add a feature that, in
> >> the spirit of a command like 'guix disk-image', builds an entire system
> >> that can then be imported as-is into IN-Berlin?
> >>
> >> In general, such a feature would be useful. One can imagine leveraging
> >> a feature like this to import custom GuixSD systems into various hosting
> >> services - Amazon EC2, Rackspace, wherever. Instead of starting with a
> >> pre-built image that might be hard to reproduce or verify, and then
> >> mutating that system to suit your needs, you could just import the exact
> >> system that you want to deploy. Wouldn't that be better?
> >>
> >> --
> >> Chris
> >
> > Their system works in the way that you provide the key and they give you
> > access via ssh to the new server. My suggestion was a work-around.
>
> I think your proposed solution is a good one. It sounds like that's a
> good way to get a GuixSD server running on IN-Berlin at this time.
>
> > Beyond that, can you please explain what exactly you mean? I don't want
> > to read between the lines as there are multiple ways I could interpret
> > this message.
>
> Sure, let me see if I can clarify what I was thinking.
Thanks, I think once guix deploy has basic functionality it would be
good to get IN-Berlin involved at my end, so that we can understand
their workflow (working with raw images + consoleserver), and integrate
GuixSD in their currently Debian-only system.
> For example, the Amazon EC2 service provides web APIs that one can call
> to import an existing VM image into the service. One can then launch
> EC2 instances (virtual machines) from that image. I'm sure that some
> other services have similar APIs. With Guix, we can declaratively
> configure the entire operating system (including the pre-installation of
> SSH credentials to enable remote access) and build an image (or a VM) of
> that system. In theory, it should be possible to create a tool (e.g.,
> "guix deploy") which not only creates the precise system image you want
> from an operating system configuration file, but also imports it into a
> hosting service, like Amazon EC2, and provisions a virtual (or physical)
> machine from that image.
>
> The same principle could apply even for providers that don't currently
> support programmatic importation of system images (like IN-Berlin,
> maybe?). For example, if a company offers to accept a bootable disk
> image and provide you with a physical server that runs that image, you
> could also "import" a system into that service by building the image and
> then providing it (manually) to them. If instead of a disk image they
> require a bootable ISO-9669 file system image (i.e., a bootable CD-ROM
> image) or a special VM format like OVF, then that's just an
> implementation detail. In theory it's still possible to "import" an
> entire system by building an entire system in the format that they need,
> and then (manually) providing it to them.
>
> Based on your description, it sounds like IN-Berlin's process requires
> manual touch points, so I think it's a fine solution to provide
> IN-Berlin with your public SSH key (or a temporary password) along with
> instructions for how to build the GuixSD system you want, wait for them
> to provision the server, and then log in remotely to further customize
> the system. However, I think it would be really cool if you could just
> specify the final, customized system (SSH keys and all) in an operating
> system configuration file and then invoke a tool like "guix
> deploy-to-ec2 my-system-config.scm" to build the system described by
> my-system-config.scm, import it into EC2 (or some other service or
> provider), and run it on there. It would be really cool because your
> system wouldn't start in a possibly stale or difficult-to-reproduce base
> system, and you wouldn't need to perform additional customization after
> the system starts up. All customizations (to the extent that they are
> managed by Guix - things like the contents of user home directories and
> the state contained in databases running on the system are not managed
> by Guix) would be declared in the operating system configuration file.
>
> Currently, I don't think Guix has the features necessary to support this
> kind of programmatic importation of GuixSD systems into service
> providers like Amazon EC2. But the potential is there, and it's good to
> think big.
>
> --
> Chris
prev parent reply other threads:[~2017-03-26 10:55 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-09 18:36 GuixSD on commodity hosting platforms, hoster: IN-Berlin ng0
2017-02-09 20:38 ` Jan Nieuwenhuizen
2017-02-10 15:35 ` Ludovic Courtès
2017-02-10 22:48 ` ng0
2017-02-10 22:59 ` ng0
2017-02-11 10:37 ` Jan Nieuwenhuizen
2017-02-11 13:35 ` ng0
2017-02-13 21:47 ` Leo Famulari
2017-02-14 9:24 ` Ludovic Courtès
2017-02-14 10:10 ` ng0
2017-02-14 16:42 ` Leo Famulari
2017-02-16 15:34 ` Christopher Allan Webber
2017-03-13 0:32 ` Advice about GuixSD on Serveraptor? Leo Famulari
2017-03-21 18:06 ` Leo Famulari
2017-03-21 20:22 ` Christopher Allan Webber
2017-03-21 20:46 ` Leo Famulari
2017-03-21 20:53 ` Leo Famulari
2017-03-22 7:36 ` Thomas Danckaert
2017-03-22 17:17 ` Leo Famulari
2017-03-22 12:04 ` Ricardo Wurmus
2017-03-22 17:20 ` Leo Famulari
2017-03-22 17:23 ` Leo Famulari
2017-03-24 9:36 ` Ludovic Courtès
2017-03-24 15:26 ` Leo Famulari
2017-03-26 10:20 ` Ludovic Courtès
2017-03-21 21:06 ` ng0
2017-03-22 17:15 ` Leo Famulari
2017-03-22 19:20 ` ng0
2017-03-22 21:01 ` ng0
2017-03-24 4:35 ` Chris Marusich
2017-03-24 16:34 ` ng0
2017-03-25 9:01 ` Chris Marusich
2017-03-26 10:26 ` Ludovic Courtès
2017-03-26 11:54 ` ng0 [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://guix.gnu.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170326115456.dpbo6ji42nae6l5e@abyayala \
--to=contact.ng0@cryptolab.net \
--cc=cmmarusich@gmail.com \
--cc=guix-devel@gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).