Setting Up Your Cluster
Import an AMI, create a VPC with a public subnet, and launch your first EC2 instance on Spinifex.
Overview
This guide assumes Spinifex is already installed and running. If not, follow one of the installation guides first:
Instructions
Prerequisites
Ensure the AWS profile is set:
export AWS_PROFILE=spinifex
1. Import an AMI
List available images and import one matching your architecture:
spx admin images list
NAME | DISTRO | VERSION | ARCH | BOOT
debian-12-arm64 | debian | 12 | arm64 | bios
debian-12-x86_64 | debian | 12 | x86_64 | bios
lb-alpine-3.21.6-x86_64 | alpine | 3.21.6 | x86_64 | bios
ubuntu-24.04-arm64 | ubuntu | 24.04 | arm64 | bios
ubuntu-24.04-x86_64 | ubuntu | 24.04 | x86_64 | bios
Import an image:
spx admin images import --name ubuntu-24.04-x86_64
Or import a local image file:
spx admin images import --file ~/images/ubuntu-24.04.img --distro ubuntu --version 24.04 --arch x86_64
Verify the import and note the AMI ID:
aws ec2 describe-images
2. Create an SSH Key
Option A: Import an existing key
aws ec2 import-key-pair \
--key-name "spinifex-key" \
--public-key-material fileb://~/.ssh/id_rsa.pub
Option B: Create a new key pair
aws ec2 create-key-pair --key-name spinifex-key \
| jq -r '.KeyMaterial | rtrimstr("\n")' > ~/.ssh/spinifex-key
chmod 600 ~/.ssh/spinifex-key
ssh-keygen -y -f ~/.ssh/spinifex-key > ~/.ssh/spinifex-key.pub
Verify:
aws ec2 describe-key-pairs
3. Create a VPC and Public Subnet
Create a VPC
VPC_ID=$(aws ec2 create-vpc --cidr-block 10.200.0.0/16 \
--query 'Vpc.VpcId' --output text)
echo "VPC: $VPC_ID"
Create an Internet Gateway
An Internet Gateway enables instances in public subnets to reach the internet and be reachable from the LAN/WAN.
IGW_ID=$(aws ec2 create-internet-gateway \
--query 'InternetGateway.InternetGatewayId' --output text)
aws ec2 attach-internet-gateway \
--internet-gateway-id $IGW_ID \
--vpc-id $VPC_ID
echo "IGW: $IGW_ID (attached to $VPC_ID)"
Create a Public Subnet
A public subnet auto-assigns a routable IP to each instance, making it directly reachable from your network.
SUBNET_ID=$(aws ec2 create-subnet \
--vpc-id $VPC_ID \
--cidr-block 10.200.1.0/24 \
--query 'Subnet.SubnetId' --output text)
# Enable auto-assign public IP
aws ec2 modify-subnet-attribute \
--subnet-id $SUBNET_ID \
--map-public-ip-on-launch
echo "Subnet: $SUBNET_ID (public)"
Verify
aws ec2 describe-vpcs --vpc-ids $VPC_ID
aws ec2 describe-subnets --subnet-ids $SUBNET_ID
4. Launch an Instance
Query available instance types for your hardware:
aws ec2 describe-instance-types
Launch an instance in the public subnet, note this will select an instance type with 2 VCPU and 1024MB of memory.
> Note: Replace AMI_NAME with the previously imported image above with the ami- prefix.
AMI_NAME="ami-ubuntu-24.04-x86_64"
AMI_ID=$(aws ec2 describe-images \
--filters "Name=name,Values=$AMI_NAME" \
--query 'Images | sort_by(@, &CreationDate) | [-1].ImageId' \
--output text)
INSTANCE_TYPE=$(aws ec2 describe-instance-types \
--query "sort_by(InstanceTypes[?VCpuInfo.DefaultVCpus==\`2\` && MemoryInfo.SizeInMiB>=\`1024\`], &MemoryInfo.SizeInMiB)[0].InstanceType" \
--output text)
INSTANCE_ID=$(aws ec2 run-instances \
--image-id $AMI_ID \
--instance-type $INSTANCE_TYPE \
--key-name spinifex-key \
--subnet-id $SUBNET_ID \
--count 1 \
--query 'Instances[0].InstanceId' --output text)
echo "Instance: $INSTANCE_ID"
Wait for the instance to reach running state:
aws ec2 describe-instances --instance-ids $INSTANCE_ID \
--query 'Reservations[0].Instances[0].[State.Name, PrivateIpAddress, PublicIpAddress]' \
--output text
Expected output:
running 10.200.1.4 192.168.1.155
The instance has both a private IP (VPC overlay) and a public IP (from your external pool, routable on your network).
5. Connect via SSH
SSH directly to the instance's public IP:
PUBLIC_IP=$(aws ec2 describe-instances --instance-ids $INSTANCE_ID \
--query 'Reservations[0].Instances[0].PublicIpAddress' --output text)
ssh -i ~/.ssh/spinifex-key ec2-user@$PUBLIC_IP
> Note: cloud-init takes 30-60 seconds to configure the instance. If SSH is refused, wait and retry.
Once connected, verify the instance has internet access:
curl -s http://ifconfig.me
This should return the instance's public IP or the gateway's SNAT address.
6. Managing Instances
Stop
aws ec2 stop-instances --instance-ids $INSTANCE_ID
Start
aws ec2 start-instances --instance-ids $INSTANCE_ID
Terminate
aws ec2 terminate-instances --instance-ids $INSTANCE_ID
Console Output
View the instance's serial console log (useful for debugging boot issues):
aws ec2 get-console-output --instance-id $INSTANCE_ID \
--query 'Output' --output text
Multi-Node: Check Instance Placement
On a multi-node cluster, instances are distributed across nodes:
spx get vms
7. Launching the Web UI
Spinifex ships with a built-in web console — an alternative to the AWS CLI, SDKs, and Terraform, analogous to the AWS Management Console. Every action in the UI is a standard AWS SigV4 API call, so the same IAM policies and audit behaviour apply.
Open the Console
The UI is served by each node on port 3000 over TLS. Replace YOUR_NODE_IP with the address of the node you installed Spinifex on (or localhost if you're on the node itself):
https://YOUR_NODE_IP:3000
Trust the Self-Signed Certificate (required)
On first load, your browser will show a TLS warning — Spinifex generates a self-signed certificate at install time. This is expected.
- Accept the warning to reach the login page (exact wording varies by browser — e.g. Chrome: *Advanced → Proceed to ...*, Firefox: *Advanced → Accept the Risk and Continue*).
- On the login page, click Download Certificate and save
spinifex-ca.pemto your machine. - Install the certificate as a trusted root on your workstation:
- macOS: open spinifex-ca.pem in Keychain Access → *System* keychain → set *Trust* to Always Trust. - Linux: sudo cp spinifex-ca.pem /usr/local/share/ca-certificates/spinifex-ca.crt && sudo update-ca-certificates - Windows: double-click the file → *Install Certificate* → *Local Machine* → *Trusted Root Certification Authorities*. - Browser-only (Firefox): *Settings → Privacy & Security → Certificates → View Certificates → Authorities → Import* and tick *Trust this CA to identify websites*.
- Restart your browser and reload
https://YOUR_NODE_IP:3000. The padlock should now show a valid certificate.
> Why this is required: the UI logs in by reading your AWS credentials through a trusted TLS channel. Browsers refuse to send credentials over an untrusted connection, so the certificate must be installed as trusted — temporary "Proceed anyway" exceptions won't work for login.
Log In with AWS Credentials
The console authenticates against the AWS credentials in ~/.aws/credentials on the node where Spinifex is installed:
[spinifex]
aws_access_key_id = AKIA...
aws_secret_access_key = ...
At the Spinifex login screen, paste the Access Key ID and Secret Access Key from the [spinifex] profile (or whichever profile maps to the IAM user or role you want to use). Additional users and policies can be managed through the UI or via aws iam commands — see IAM Users and Policies.
Once logged in, you have browser-based access to every Spinifex feature: launch and manage instances, attach EBS volumes, browse S3 buckets, configure VPCs and security groups, and manage IAM users and keys — all backed by the same AWS-compatible control plane the CLI uses.
Additional Options
Private Subnets (No Public IP)
Create a subnet without --map-public-ip-on-launch:
PRIVATE_SUBNET=$(aws ec2 create-subnet \
--vpc-id $VPC_ID \
--cidr-block 10.200.2.0/24 \
--query 'Subnet.SubnetId' --output text)
Instances in private subnets get a private IP only. They can still reach the internet via SNAT through the VPC router, but are not directly reachable from your network.
Multiple Accounts
Create isolated accounts with their own resources:
spx admin account create --name myteam
export AWS_PROFILE=spinifex-myteam
Troubleshooting
Instance Stuck in Pending
journalctl -u spinifex-daemon -f
aws ec2 describe-images
SSH Connection Refused
cloud-init needs 30-60 seconds after boot. Check instance state:
aws ec2 describe-instances --instance-ids $INSTANCE_ID
No Public IP Assigned
Verify the subnet has MapPublicIpOnLaunch enabled:
aws ec2 describe-subnets --subnet-ids $SUBNET_ID
If MapPublicIpOnLaunch is false:
aws ec2 modify-subnet-attribute --subnet-id $SUBNET_ID --map-public-ip-on-launch
Also verify an Internet Gateway is attached to the VPC:
aws ec2 describe-internet-gateways
Instance Has No Internet Access
Check the VPC router's NAT rules (from the host):
sudo ovn-nbctl lr-nat-list $(sudo ovn-nbctl lr-list | awk '{print $2}' | head -1)
Verify the default route exists:
sudo ovn-nbctl lr-route-list $(sudo ovn-nbctl lr-list | awk '{print $2}' | head -1)