Cloud Server with Jitsi Meet
Jitsi Meet is a fully encrypted, open source video conferencing solution.
You can create a cloud server with a ready-made Jitsi Meet application.In Russia, the application runs on a cloud server with a customized SelectOS 1.1 operating system .In other countries — Ubuntu 22.04.
Create a cloud server with Jitsi Meet
To configure Jitsi Meet when creating a server, you need to specify user data — custom operating system configuration parameters. You can specify two sets of variables:
- to access Jitsi Meet from the Internet;
- to access Jitsi Meet on a private subnet only.
For a server with access from the Internet, you will need to configure mandatory authorization and create users with the ability to create a conference.For a server in a private subnet, authorization can be disabled — access to Jitsi Meet will be available by domain name.
1.Create a public IP address
Create a public IP address so that the cloud server with Jitsi Meet can be accessed from the internet.
Use the Create a Public IP Address subsection of the Public IP Addresses instruction.
2. Create a cloud server with Jitsi Meet
-
In the Dashboard, on the top menu, click Products and select Cloud Servers.
-
Click Create Server.
-
Fill in the blocks:
-
Check the price of the cloud server.
-
Click Create.
Name and location
-
Enter the server name. This will be set as the host name in the operating system.
-
Select the region and pool segment in which the server will be created.The list of available server configurations and resource costs depends on the pool segment.Once the server is created, you cannot change the pool segment.
Source
-
Open the Applications tab.
-
Select Cloud Jitsi Meet.
-
Optional: if you need another current or archived version of the application, select the desired version in the Version field.
Configuration
Select a configuration from 4 vCPU, RAM от 8 ГБ и размером загрузочного диска от 10 ГБ.Two types of configurations are available for the server:
- fixed configurations — Several ranges with different specifications in which the resource ratio is fixed;
- arbitrary configurations where any resource ratio can be specified.
The configurations use different processors depending on the line and pool segment.After the server is created, you can change the configuration.
Fixed configuration
Arbitrary configuration
-
Click Fixed.
-
Open the tab with the desired ruler.
-
Select a configuration.
-
If both local and network disks are available in the selected configuration, select the disk to be used as the boot disk:
- local disk — check the box Local SSD NVMe disk. A server with a local disk can only be created from images and applications;
- network drive — do not check the checkbox.
The amount of RAM allocated to the server may be less than the amount specified in the configuration — the operating system kernel reserves some RAM depending on the kernel version and distribution. You can check the allocated amount on the server with
sudo dmesg | grep Memory
.
-
Click Arbitrary.
-
Specify the number of vCPUs and the size of RAM.
-
If both local and network disks are available in the selected configuration, select the disk to be used as the boot disk:
- local disk — check the box Local SSD NVMe disk. A server with a local disk can only be created from images and applications;
- network drive — do not check the checkbox.
The amount of RAM allocated to the server may be less than the amount specified in the configuration — the operating system kernel reserves some RAM depending on the kernel version and distribution. You can check the allocated amount on the server with
sudo dmesg | grep Memory
.
Disks
-
If you did not check the Local SSD NVMe disk checkbox when setting up the configuration. the first specified network drive will be used as the server boot disk.To configure it:
1.1 Select the type of network boot disk.
1.2 Specify the size of the network boot disk in GB or TB. Observe the maximum size limits of network disks.
1.3 If you selected the Universal v2 disk type, specify the total number of read and write operations in IOPS. After creating a disk, you can change the number of IOPS — decrease or increase.The number of IOPS changes is unlimited.
-
Опционально: добавьте дополнительный network disk server :
2.1 Click Add.
2.2 Select the type of network drive.
2.3. Укажите размер сетевого диска в ГБ или ТБ. consider the maximum size limits of network drives.
2.4 If you selected the Universal v2 disk type, specify the total number of read and write operations in IOPS. After creating a disk, you can change the number of IOPS — decrease or increase. There is no limit to the number of IOPS changes.
After the server is created, you can connect new additional disks.
Network
The server can be added to a new private subnet or to an existing one.
Private — A subnet without access from the Internet or with a single static public IP address.The public IP address connects to a server that will be accessible from the Internet.
Existing private subnet
New private subnet
-
Click Private Subnet.
-
In the Public IP address for Internet access field, select the public IP address you created earlier or create a new one.
-
Expand the block with private subnet settings.
-
In the Subnet field, select an existing subnet.
-
In the Private IP field, specify the private IP address of the server. The public IP address will be automatically connected to the private address.
-
Click Private Subnet.
-
In the Public IP address for Internet access field, select the public IP address you created earlier or create a new one.
-
Expand the block with private subnet settings.
-
If you have existing networks in the project, in the Subnet field, select New Subnet.
-
Optional: change the CIDR of the subnet.
-
Optional: enable the DHCP toggle switch.
-
Optional: in the Gateway field, change the IP address of the default gateway.
-
In the Network field, select the existing network where the subnet will be created or New network. For a private subnet with a public IP address,
router-<network_name>
, where<network_name>
is the network name, will be automatically created. -
If you selected New Network, enter a name for the network.
Safety
Select security groups to filter traffic on server ports. Without security groups, traffic will not be allowed. If there is no block, port security is disabled on the server network . With traffic filtering disabled, all traffic will be allowed.
Access
-
Place an SSH key for the project on the server for secure connection:
1.1 If the SSH key for the project is not added to the cloud platform, click Add SSH Key, enter the key name, insert the public key in OpenSSH format, and click Add.
1.2. If an SSH key for the project is added to the cloud platform. select the existing key in the SSH key field.SSH key is available only in the pool in which it is hosted.
-
Optional: in the Password field for "root":
2.1 Copy the password of the
root
user — a user with unlimited rights to all actions on the system.2.2 Save the password in a safe place and do not transmit it in public.
Additional settings
-
If you plan to create multiple servers and want to improve the fault tolerance of your infrastructure, add the server to a placement group:
1.1 To create a new group, in the Placement Group field, click New.
1.2. Select New Group and enter a group name.
1.3 Select a policy for hosting on different hosts:
- preferably soft-anti-affinity. The system will try to place servers on different hosts. If there is no suitable host when creating a server, it will be created on the same host;
- anti-affinity is mandatory. Servers in a group must be located on different hosts. If there is no suitable host when creating a server, the server will not be created.
1.4 If a group has been created, select the placement group in the Placement Group field.
-
To add additional information or filter servers in the list, add server tags. Operating system and configuration tags are automatically added. To add a new tag, enter a tag in the Tags field.
-
To add a script that will be executed by the cloud-init agent when the operating system first starts up, in the Automation block in the User data field:
- open the Text tab and paste the script with text;
- or open the File tab and upload the file with the script.
Accessed from the Internet
Without internet access
#cloud-config
write_files:
- path: "/opt/gomplate/values/user-values.yml"
permissions: "0644"
content: |
jitsi_HTTP_PORT: "80"
jitsi_HTTPS_PORT: "443"
jitsi_TZ: "<time_zone>"
jitsi_PUBLIC_URL: "<jitsi_meet_public_url>"
jitsi_IP: "<public_ip_address>"
letsencrypt:
enable: true
letsencryptDomain: "<example.com>"
letsencryptEmail: "<root@example.com>"
auth:
enable: true
Specify:
<time_zone>
— time zone, e.g.UTC
;<jitsi_meet_public_url>
— Jitsi Meet public URL in the formatjitsi.example.com
;<public_ip_address>
— The public IP address that you specified in step 10. You can view it in the control panel in the top menu, click Products → Cloud Servers → Network → tab Public IP addresses;letsencrypt: enable: true
— parameter to automatically issue a TLS certificate from Let's Encrypt®;<example.com>
— domain to access the Jitsi Meet you added earlier;auth: enable: true
— parameter to enable mandatory authorization for conference creation.
#cloud-config
write_files:
- path: "/opt/gomplate/values/user-values.yml"
permissions: "0644"
content: |
jitsi_HTTP_PORT: "80"
jitsi_HTTPS_PORT: "443"
jitsi_TZ: "<time_zone>"
jitsi_PUBLIC_URL: "<jitsi_meet_private_url>"
jitsi_IP: "<private_ip_address>"
letsencrypt:
enable: false
Specify:
<time_zone>
— time zone, e.g.UTC
;<jitsi_meet_private_url>
— Jitsi Meet private URL in the format ofmeet.local
;<private_ip_address>
— the private IP address you specified in step 10. You can view it in the control panel in the top menu, click Products → Cloud Servers → Network → tab Private Networks;letsencrypt: enable: false
— parameter specifies that the TLS certificate from Let's Encrypt® will not be issued. It is possible to add a custom certificate.
Create a user with the ability to create a conference
If the cloud server with Jitsi Meet has access from the internet, create users who can create video conferences.
-
Log in as
root
user. -
Create a user with the ability to create a conference:
docker exec jitsi-prosody-1 prosodyctl --config /config/prosody.cfg.lua register <username> meet.jitsi <password>
Specify:
<username>
— login of the new user;<password>
— password for the new user.
Access Jitsi Meet
If the cloud server with Jitsi Meet does not have access from the internet, you can access Jitsi Meet by domain name. To do this:
- create an A-record on the local DNS server for the Jitsi Meet private URL in the format
https://meet
.local; - or add an A-record to the
hosts
file on the clients.
Add a custom certificate
A custom certificate can be added to a cloud server with Jitsi Meet.
-
If you are using a full certificate chain and private key in
.pem
format, rename them tocert.crt
andcert.key
. -
Log in as
root
user. -
Copy the
cert.crt
andcert.key
files to the/opt/jitsi/data/.jitsi-meet-cfg/web/keys
folder -
Perform a programmatic reboot the cloud server.