In the upcoming release, rc.local will be overwritten on image capture by the OS/ module.

a post_load script would probably be a good way to go until we can make the dependency on two networks optional.


On 8/17/10 10:55 AM, Milen P Paskov wrote:

Hey Josh,

Regarding the first question I was able to modify the image so I can ssh in as root.

Regarding the fooling I was think more about making minor changes to the script /etc/rc.local (suggested in the guide to created Base Image), located on the image, as well as implement my own version of post_load(). What I do not know is what needs to be done after the image has started up before handing it to the end user. If some of the action required different approach then the one already defined in VCL i can rewrite them for my module.

Best Regards,
Milen Paskov
WSTI Intern

Inactive hide details for Josh Thompson ---08/17/2010 09:24:24 AM--------BEGIN PGP SIGNED MESSAGE----- Hash: SHA1Josh Thompson ---08/17/2010 09:24:24 AM--------BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Josh Thompson <>


08/17/2010 09:24 AM

Re: Setting up Base Image


Hash: SHA1

On Monday August 16, 2010, Milen P Paskov wrote:
> Hello Community,
> I have made some progress with the provisioning module that will
> communicate with IBM Cloud, now I need to set up the image on the cloud
> properly so that VCL can access them.
> I am been following this documentation:
> I have come across two problems.
> 1. Currently the images are set so that you can not ssh directly as root
> user, but it is possible to use "sudo bash" once logged on. Is there a way
> to modify the image so I can directly ssh as root as required by vcl?

man sshd_config - look for PermitRootLogin

> 2. Once the IBM Cloud provisions the image it has only access to one
> network (I am given one IP, through which I can connect) a public one. Is
> it possible to fool VCL to use the public network to log in and make the
> necessary  changes to the image before giving to the end users?

One of the backend guys will have to answer this part, but keep in mind that
when you "fool" part of a system, you are often going against underlying
assumptions upon which the system was built. This can result in a long trail
of fooling one part, then another part, then another one, etc.


> Any help would be greatly appreciated.
> Best Regards,
> Milen Paskov
> WSTI Intern
- -- - -------------------------------
Josh Thompson
Systems Programmer
Advanced Computing | VCL Developer
North Carolina State University

my GPG/PGP key can be found at
Version: GnuPG v2.0.14 (GNU/Linux)



Aaron Peeler
Program Manager
Virtual Computing Lab
NC State University

Reply via email to