Sky Node Monitor

Description
Include Sky Monitor The {ANYNODE} is monitored by the {NEBULA} system. Below is a brief explanation of how to interpret the small chart icons in the List Card. From left to right, you will see three small chart icons, each representing:
  1. CPU Usage (in percent)
  2. RAM Usage (in percent)
  3. DISK Usage (in percent)
If any of the values exceed 75%, a small warning will pop up on the screen. When the value reaches 90%, a critical warning will be displayed.

Sky Node Dialog

Description
Include Sky Node Dialog The "Sky Node" dialog is utilized to incorporate a new Linux server where {NEBULA} will be deployed and subsequently registered in the inventory. Below are the definitions of its fields:
Name field Specifies the node name, which can be any desired name.
Tags field Specifies tags for the server, which can be utilized in search operations.
Type field Specifies the server type, which can be either "Bare-Metal" or "Virtual or Cloud". If your server supports "vt-x" or "amd-v" virtualization, select "Bare Metal"; otherwise, select "Virtual or Cloud".
Domain field Specifies the hostname or domain for the server, which is necessary to prevent certificate errors. However, you can leave this field blank if you are unsure of the hostname or do not have a domain prepared, as you can register a certificate after the {NEBULA} deployment.
Primary IP field Specifies the IP address of the server.
Motion IP field If your server has two network interface cards (NICs), you can specify a secondary IP address to be used for migration data movement. Otherwise, please leave this field blank. Motion IP is often used on Sky Nodes, where the primary IP is a public IP address, and the motion IP is a private IP address.
XVM Storage field Specifies the optional NFS mount address used to separate storage from compute, commonly employed to support traditional virtualization on shared storage. You can read more about separating storage in the following document: NFS for XVM Storage.
Password field Specifies the root password of the server. This is required to initiate the {NEBULA} deployment process. After {NEBULA} is successfully deployed, this field will be removed, as the {NEBULA} system will manage the server and disable the root user.
Show button Toggle the visibility of the password field.
Save button Save the configuration of the Sky Node.
Cancel button Abort and close the dialog.

Sky Nodes Actions Menu

Description
Sky Nodes Actions Menu On the right-hand side of the Sky Nodes list view, you will find the "Actions" menu that displays shortcut icons and the dropdown menu icon. Below, we have listed the actions for the Sky Nodes module.
Copy ID item Stores the Sky Node ID in the clipboard.
Copy IP item Stores the primary IP address in the clipboard.
Edit Node item Opens the configuration dialog for the Sky Node.
Open Terminal item Initiates a Terminal session for the Sky Node, logging in as the current {NEXUS} session user.
Enable Root Login item Enables the root user and allows root user login for special circumstances.
Disable Root Login item Disables the root user and prevents root user login.
Deploy {NEBULA} item Opens the {NEBULA} dialog used to deploy the {NEBULA} system.
Sky Node Images item Opens the Sky Node Images dialog, which allows for viewing, removing, and uploading container and virtual machine images, as well as ISO files.
Sky Node Certificates item Opens the Sky Node Certificates dialog, which enables adding, renewing, and removing {SITENAME} Authority certificates and/or Let's Encrypt Authority certificates for domains and/or hostnames.
Restart Services item Opens a confirmation dialog that, if confirmed, will restart the Workspaces, Gate, API, and CN/VM {NEBULA} services. However, running instances are not affected.
Reboot Node item Opens a confirmation dialog that, if confirmed, will reboot the Sky Node.
Decomission Node item If {NEBULA} has already been deployed, a confirmation dialog will open. Upon confirmation, all data will be deleted, and the Sky Node’s operating system will be reset, with the option to remove the node from the inventory. After decommissioning, the node can be reused by redeploying {NEBULA}.

If {NEBULA} was not deployed, the confirmation dialog will simply remove the node from the inventory upon confirmation.

Terminal Window

Description
Sky Node Terminal Window The Terminal Window initiates a terminal session, allowing interaction with the Sky Node. It is a component of the {NEBULA} Workspaces service. For further details on Workspaces features, refer to the documentation: Workspaces.

{NEBULA} Deploy Dialog

Description
{NEBULA} Deploy Dialog The {NEBULA} Deploy dialog initiates the deployment process of the {NEBULA} system on the server and installs the {SITENAME} platform. Please carefully read the notice on the dialog. You must agree to the EULA to proceed.
Deploy button Start the {NEBULA} deployment process
Cancel button Abort and close the dialog.

Sky Node Images Dialog

Description
Detach Block Storage Dialog The Sky Node Images dialog presents a list of container, virtual machine, and ISO file images available on the {ANYNODE}. Below, we have outlined the features of the image storage service.
Store tabs Selects the type of images to display.
Remove button Deletes the image from the {NEBULA} system.
Upload button Opens the file dialog where you can upload and register your custom image into the {NEBULA} system.
Close button Abort and close the dialog.

Sky Node Certificates Dialog

Description
Sky Node Certificates Dialog The Sky Node Certificates dialog enables the registration of certificates for domains and hostnames. There are two options:
  1. {SITENAME} Certified
    Generates certificates with the {SITENAME} Authority and is mainly used for non-public domains or hostnames.
  2. Let's Encrypt Certified
    Generates certificates with the public Let's Encrypt Authority and is mainly used for public domains.
Domain field Specifies the domain or hostname for which the certificate will be generated. The selector next to it defines the type of certificate.
Create button Creates the certificate for the given domain or hostname and stores it in the certificates store.
Renew button Triggers the certificate renewal.
Remove button Removes the certificate from the certificates store.

Close button Abort and close the dialog.


The skynodes Policy


The following is a list of policy grants that define and regulate access permissions for both users and the API. To manage these policies, please use the Roles dialog.

Grants

Description

API Command
full Grants full access ALL
certificates Permits access to the certificates list. certificates-list
console Permits the initiation of a Workspaces session for terminal access using the current {NEXUS} user identity.  
create-cert Permits the creation of a certificate. certificates-create
decomission Permits access to the "Decomission" dialog.  
delete Permits the deletion of the item. delete
deploy Permits access to the "Deploy" dialog.  
edit Permits access to the "Edit" dialog.  
images Permits access to the images list. images-list
install-step1 Permits the execution of installation step 1. deploy-step1
install-step2 Permits the execution of installation step 2. deploy-step2
install-step3 Permits the execution of installation step 3. deploy-step3
install-step4 Permits the execution of installation step 4. deploy-step4
install-step5 Permits the execution of installation step 5. deploy-step5
list Permits listing in the List View area or as JSON objects. list
new Permits access to the new "Provisioning" dialog.  
node-status Permits the retrieval of the staus. status
password-status Permits the enabling or disabling of the root user. root-user
proceed-decomission Permits the initiation of the decommission process. decomission
progress Permits the retrieval of deployment progress. progress
reboot Permits the reboot operation. reboot
remove-cert Permits the removal of certificates. certificates-delete
remove-image Permits the removal of images. images-delete
renew-cert Permits the renewal of certificates. certificates-renew
restart-services Permits the restart services operation. restart-services
save Permits execution of the provisioning process. create, update