I've testing this using AMI id  ami-f8b35e91.   AMI  is produced by
RightScale, but does not have to be used by rightscale services.

Notes about instructions:
* change sipxecs with your hostname
* change sipxecs.example.com with your FQDN

-2) launch instance (see tips below on security group)

-1.) configure holes in security group, depending on what you want to
expose: 22, 5060, 8443, 80,...

0.) add sipxecs repo file

1.) to resolve
 syslog-ng and rsyslog conflict

 rpm -e --nodeps syslog-ng
 yum install -y rsyslog

2.) setting hostname
/etc/hosts
127.0.0.1   localhost   localhost.localdomain
10.240.219.54 sipxecs.example.com sipxecs

run command
 $ hostname sipxecs.example.com

3.) install sipxecs

for sipxecs-setup
 configure sipxecs with local ip address, not public IP address

TIPS:
* Launch each instance in it's own security group, that way you can
control firewall individual basis and good way to keep track of
instances because EC2 won't let you name instances.
* If you launch in zone east-1a, the installation will go very fast
and bandwidth will be free because downloads are hosted in this zone
* For EBS-backed, you might want to try AMI-ID ami-1d10fd74.  I
searched for a while on a good ebs-backed CentOS images and this is
what i came up with.
* share your results, lets create a wiki page.
_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to