Provision a Bare Metal Instance
147
Featured. Choose Yes if you would like this template to be more prominent for users to select.
Only administrators may make templates featured.
11.3.16. Provision a Bare Metal Instance
Deploy one bare metal instance per host using these steps.
1. Log in to the CloudPlatform UI as an administrator or user.
2. In the left navigation bar, click Instances.
3. Click Add Instance.
4. Select a zone.
5. Click Template.
6. Click Next.
7. Select the template that you created earlier, in Section 11.3.15, “Create a Bare Metal Template”,
and click Next.
8. Select the compute offering you created earlier, in Section 11.3.7, “Create a Bare Metal Compute
Offering”, and click Next.
9. Click Launch, and the instance will be created.
10. Set up security groups with ingress and egress rules to control inbound and outbound network
traffic. Follow the steps in Using Security Groups in the Administrator's Guide. If you want to allow
inbound network traffic to the bare metal instances through public IPs, set up public IPs and port
forwarding rules. Follow the steps in How to Set Up Port Forwarding in the Administrator's Guide.
11.3.17. Test Bare Metal Installation
In the navigation bar of your browser, specify the IPMI address of the bare metal host, and launch the
virtual console. The bare metal host should be PXE booted to the specified installation.
11.3.18. Example CentOS 6.x Kickstart File
# centos 6.x based kickstart file. Disk layout assumes a 4GB sda
install
url --url=http://10.223.110.231/baremetal/centos62/
lang en_US.UTF-8
keyboard us
network --bootproto=dhcp --onboot=yes --hostname=baremetal-test --noipv6
#network --bootproto=dhcp --device=eth0 --onboot=no --noipv6
#network --bootproto=dhcp --device=eth1 --onboot=no --noipv6
#network --bootproto=dhcp --device=eth2 --onboot=yes --hostname=baremetal-test --noipv6
#network --bootproto=dhcp --device=eth3 --onboot=no --noipv6
#network --bootproto=dhcp --device=eth4 --onboot=no --noipv6
#network --bootproto=dhcp --device=eth5 --onboot=no --noipv6
firewall --enabled --port=22:tcp
services --disabled ip6tables
rootpw password
authconfig --enableshadow --enablemd5
autopart