How to Start with Light Compute
-
Log into your DT Customer Portal account, and go to the "Services" Tab.
-
Click the "Place a New Order" button.
-
On the left-hand side, in "Categories", select the region of Light Compute. Then, locate the "Light Compute" product on the page and click "Order Now".
-
On the next screen, fill out the values with your needs and click "Continue". Do not forget to add the public key of your SSH key pair. In Light Compute, SSH keys are used for authentication to the server.
-
Finalize your purchase.
-
In the "Services" tab, locate your newly purchased Light Compute instance and click on it to see details.
-
In your product details, there are currently two options to log in which may or may not be avaliable to you based on your subscription to DT Cloud. If you are seeing one method to authenticate, you can use it. If you see two of them, you can choose any of them if you are familiar with DT Cloud products. If not, you can choose the right one with the domain "console.dt.net.tr".
-
Get the username and password of your DT Cloud Console account and log in.
-
On the left panel, locate and select "Virtual Machine" in the "LC" header.
-
The next screen will include information about your Light Compute instance.
-
Region and project information can be found on the screen and in the actions part, the instance can be rebooted and stopped or its logs can be downloaded. Also, the history of the instance, monitoring, and direct console access can be found on the screen.
Note To effectively use the console, most of the OSs need a predefined password and as default, users in Linux do not have passwords. So, it is considered to be a best practice to set a password for Linux users if you ever need to use a console. It is used when SSH or other means of reaching the instance becomes unavailable. This might be because of a configuration error, network error, software error, and many other things. The console is a backdoor to reach the instance only usable by you.
Note Do not allow SSH with a password. In the cloud, always use SSH keys to securely log in. Allowing password authentication in SSH is a huge security risk.
- On the screen, details can be found in different tabs. In the "Detail" tab, "Hostname" can be used to SSH to the LC instance. or you can use the public IP in the "Network Interfaces" tab.
Note Please do not forget to set security groups for increased security. Security groups are simple firewalls that can protect the instance from incoming attacks. Using security groups is considered a must in the cloud.
As you log in to the instance, our tutorial ends. Until now, the instance is created and usable so, our customers can freely use their instance to their will. While doing so, we advise our customers to use best practices in every step and reach DT Cloud if there are any other questions.