Update README.md

This commit is contained in:
Sebastian Haderecker 2019-04-19 01:39:58 +02:00 committed by GitHub
parent c7a795c6d4
commit f9c85f08e0
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -69,26 +69,38 @@ For that, go to the [Web Console](https://auth.otc.t-systems.com/authui/login) a
I strongly advise you, to create a separate project for the T-Pots in your tennant. I strongly advise you, to create a separate project for the T-Pots in your tennant.
In my case I named it `tpot`. In my case I named it `tpot`.
![Create new project](doc/otc_1_project.gif)
<a name="api-user"></a> <a name="api-user"></a>
## Create API user ## Create API user
The next step is to create a new user account, which is restricted to the project. The next step is to create a new user account, which is restricted to the project.
This ensures that the API access is limited to that project. This ensures that the API access is limited to that project.
![Create API user](doc/otc_2_user.gif)
<a name="key-pair"></a> <a name="key-pair"></a>
## Import Key Pair ## Import Key Pair
Now log in with the newly created user account and select your project. :warning: Now log in with the newly created user account and select your project.
![Login as API user](doc/otc_3_login.gif)
Import your SSH public key. Import your SSH public key.
![Import SSH Public Key](doc/otc_4_import_key.gif)
<a name="vpc-subnet-securitygroup"></a> <a name="vpc-subnet-securitygroup"></a>
## Create VPC, Subnet and Security Group ## Create VPC, Subnet and Security Group
- VPC and Subnet: - VPC (Virtual Private Cloud) and Subnet:
![Create VPC and Subnet](doc/otc_5_vpc_subnet.gif)
- Security Group: - Security Group:
The configured Security Group should allow all incoming TCP / UDP traffic. The configured Security Group should allow all incoming TCP / UDP traffic.
If you want to secure the management interfaces, you can limit the incoming "allow all" traffic to the port range of 1-64000 and allow access to ports > 64000 only from your trusted IPs. If you want to secure the management interfaces, you can limit the incoming "allow all" traffic to the port range of 1-64000 and allow access to ports > 64000 only from your trusted IPs.
![Create Security Group](doc/otc_6_sec_group.gif)
<a name="clone-git"></a> <a name="clone-git"></a>
# Clone Git Repository # Clone Git Repository
Clone the `tpotce` repository to your Ansible Master: Clone the `tpotce` repository to your Ansible Master: