Brief Instructions:

1. Create a key

To create a key, simply input key name and public key into fields and submit. If you don't have a key already, use command ssh-keygen -f /path/to/your_key to generate one. Most vm instances need a key to login.

2. Create a VPC

To create a vpc, input a vpc name and choose the appropriate public access line.

3. Create a subnet

To create a subnet, choose a VPC and input network cidr with other params

4. Launch an instance

To launch an instance, specify the fields with star including hostname, count, image, flavor and primary interface. It is also important to select a proper key to login the instance after it gets created.

5. Create a floating IP

To create a floating ip, select the instance name with address in the drop down menu, choose floating ip type to be public to get an public floating ip. Private floating ip can be an internal access endpoint when needed. Leaving it blank means to create both.

6. Create Node Alarm Rule

To create a node alarm rule, specify the rule name, rule type, and configuration parameters. The rule type can be CPU usage, memory usage, or disk usage. For each type, you need to set the threshold value and the action to take when the threshold is exceeded. The action can be sending an email notification or executing a custom script.

7. Use your instance and modify security group as needed

ssh -i /path/to/your_private_key username@instance_public_floating_ip
username is centos for centos image, core for coreos image and ubuntu for ubuntu image by default. To expose a service you setup in the instance publicly, click security group id in the security group panel and create a new rule. For example, to open port 443, specify 0.0.0.0/0 for remote ip, ingress for direction, tcp for protocol, both portmin and portmax to be 443.