Cloud computing concept CloudStack upgrades – best practices

Introduction Upgrading CloudStack can sometimes be a little daunting – but as the 5P’s proverb goes – Proper Planning Prevents Poor Performance. With planning, testing and the right strategy upgrades will have a high chance of success and have minimal impact on your CloudStack end users. The CloudStack upgrade process is documented in the release notes for […]

READ MORE

cs-Europe CloudStack European User Group roundup – November 2016

Our Winter meetup last Thursday, November 24 found us back in London at the BT Centre Showcase, and as usual Europe was well represented with CloudStack users joining us from all over. After lunch and catching up with friends old and new, Giles Sirett (ShapeBlue CEO and chairman of the user group) called the meetup […]

READ MORE

monkey Shapeblue Security Advisory For CVE-2016-6813: Apache CloudStack registerUserKeys authorization vulnerability

Overview Apache CloudStack provides a registerUserKeys API that allows a user to create or recreate a secret key and an API key to use for authentication when using the CloudStack API. A malicious user can request this API action in conjunction with the ID of another CloudStack user/account.  The newly created or re-generated API keys for […]

READ MORE

Cloud computing concept Networking KVM for CloudStack

Introduction KVM hypervisor networking for CloudStack can sometimes be a challenge, considering KVM doesn’t quite have the matured guest networking model found in the likes of VMware vSphere and Citrix XenServer. In this blog post we’re looking at the options for networking KVM hosts using bridges and VLANs, and dive a bit deeper into the configuration […]

READ MORE

Hand over sky and clouds

hand,sky,clouds,symbol,symbolic,graphic,
design,fingers,heaven,bright,light,artistic,art,freedom,
shape,free,abstraction,abstract,illustration,design,picture,touch,stop,one,hitchiking CloudStack Test Automation with Trillian and Jenkins

In the previous post, we introduced and described Trillian that can build various environments in which we could deploy a CloudStack zone and run Marvin based integration tests. In this post, we’ll describe how we are using Jenkins and Trillian to test CloudStack builds in various environments. Build Pipeline Our build pipeline can be seen in the attached […]

READ MORE

CCS347300 CloudStack Container Service –Available for download

Today we are delighted to announce General Availability of CloudStack Container Service (CCS): software that gives Cloud Service Providers a Container as a Service (CaaS) offering within their existing IaaS environments..  The software is immediately available for trial or commercial license. After the first release of the CloudStack Container Service in May, we have had […]

READ MORE

Hand over sky and clouds

hand,sky,clouds,symbol,symbolic,graphic,
design,fingers,heaven,bright,light,artistic,art,freedom,
shape,free,abstraction,abstract,illustration,design,picture,touch,stop,one,hitchiking Trillian: Flexible, On-Demand Cloud Environment Creation

Marvin: “I think you ought to know I’m feeling very depressed.” Trillian: “Well, we have something that may take your mind off it.” Marvin: “It won’t work, I have an exceptionally large mind.“ Trillian was born from the need for us to create environments which we could run CloudStack’s Marvin test framework against, but the […]

READ MORE

monkey Shapeblue Security Advisory For CVE-2016-3085: Apache CloudStack Authentication Bypass Vulnerability

Overview Apache CloudStack contains an authentication module providing “single sign-on” functionality via the SAML data format. Under certain conditions, a user could manage to access the user interface without providing proper credentials. As the SAML plugin is disabled by default, this issue only affects installations that have enabled and use SAML-based authentication. Mitigation: Users of […]

READ MORE

Cloud Security Granular Access Controls in CloudStack

An oft-cited limitation in Apache CloudStack is the lack of granular access controls.  Historically, when creating an account, there have been four built-in roles to choose from: Root Admin, Resource Admin, Domain Admin, and User.  Unfortunately, these built-in roles have been insufficient for the needs of many organizations, who have resorted to various workarounds.  Thankfully, this will change in […]

READ MORE