Start Guide

User account

After a customer Company registration on the Cloud platform, a message containing administrator password is sent to the Company’s email. Administrator login has the following format: admin@<customer>, where customer is the ID of the Company, specified during the registration

Attention

For security reasons, we strongly recommend to use the administrator account for working in the IAM section only. For operating with other cloud services, we recommend you to use only additional accounts, created without administrator rights.

Authorization in CROC Cloud

Attention

Password usage recommendations:
  • The password used shall be longer than 7 characters and contain letters, digits and special characters.

  • The new password should differ significantly from at least 4 previously used passwords.

  • It is recommended to change the password at least once every 90 days.

  • Do not store the password in plain text.

When you first log into CROC Cloud, enter the username and password. After a successful login, CROC Cloud will ask you to change a password.

To protect your profile, set a strong password yourself or generate it by clicking Generate password. Follow the on-screen instructions, click Change Password. Use new password to operate with CROC Cloud.

Configuring account, notifications and API access

To modify your account settings, manage an access to API and manage notifications click the username in the top right corner of the screen and select Profile.

Changing your personal data and notification settings

You can change your personal data in the profile settings. Modify corresponding fields to change the name, email address, and phone number.

In this section, using switches, you can manage your email notification subscriptions.

Two-factor authentication

Use two-factor authentication to provide additional security for your account. You need to have an access to a tablet or smartphone with a two-factor authentication app installed.

Click Set up 2FA to enable two-factor authentication. Then open two-factor authentication app installed on your smartphone or tablet (e.g. Google Authenticator) and add your account by scanning QR code

Attention

The device with the app installed must use the time and time zone of the network.

From this moment, at each logging in to CROC Cloud you will have to enter one-time passwords generated by two-factor authentication app on your device.

To return to single-factor authentication, click Disable 2FA and confirm the action.

Receiving API access settings

To receive settings for API access in .sh format, click Get API access settings.

Changing API secret

To change API secret, click Change API key.

Attention

After the key is changed, you will have to reconfigure all external applications.

CROC Cloud web interface

Sign in, using the username and password of your account.

Depending on the user’s role in the CROC Cloud, you can see different sections and functions:

  1. Management console – basic operations with instances, volumes, and networks.

  2. Object storage – operations with cloud object storage.

  3. Monitoring — monitors your CROC Cloud resources in real time.

  4. Activity log - user activity logging and analysis.

  5. Kubernetes Clusters - the tool for containers management, provided as one of CROC Cloud services.

  6. IAM - users, projects, roles and notifications management.

  7. Billing - cost control and detailing.

Use drop-down lists under the navigation menu to easily switch between projects.

Instance launch

To launch an instance, navigate to Instances section and click Create. In the opening dialog box, select one of the prepared instance templates and click Next.

At the next step, specify key instance parameters:

Parameter

Documentation

Documentation

Instance name

Number of instances

Number of instances of this type to create (1 by default)

Instance type

Instance computing resources selection

Virtualization type

hvm | hvm-legacy

SSH-key

If public SSH keys are added to the project, you can select one of them

Subnet

Subnet in which the instance will be located

Private address

Instance private address

Placement group

The distribution of instances on different compute nodes helps to minimize the number of affected instances in the event of failure of one of physical compute nodes

Availability Zone

Selection of Avaiability Zone in which instance will be allocated

Security groups

Ability to assign to the instance security groups created in VPC (up to 5 groups). If you do not specify security group while starting the instance, then the default security group will be assigned to the instance

Switches

Ability to attach virtual switches to the instance (only L2 connectivity is provided)

Assign a public address

Associate public IP address to obtain access from the Internet after the instance launch. Public IP address should be allocated in advance in Addresses section

Terminate on instance shutdown

Specifies whether the instance should automatically be terminated after the shutdown

User data

Data describing operations that are automatically executed on instance creating

After all necessary parameters are set, click Next button.

A dialog window opens in which you can change or attach to the instance different types of additional devices: cdrom, disk.

After all necessary parameters are set, click Launch new instance button. Instance start may take some time. Upon instance launch process completion, the instance status will change to running. Each instance gets a unique ID in i-xxxxxx form. Anytime you can change some instance parameters, attach or detach volumes, reboot or stop the instance, change public address, etc.