Getting Started Launch VMs
Neevcloud Launch Server
How to launch a server from the NeevCloud.
Click on the Create A Cloud Server button in the top right corner:

Choose an operating system
Linux compute nodes - The Linux compute Node's image is based on different versions of operating systems like CentOS, Ubuntu, Debian, Fedora, Alma Linux, Rocky, Cloud Linux, Windows Server, and OpenSUSE Leap.

Hardware Configuration
Specifications
Users can customize their system by selecting various CPU and RAM combinations.
General Purpose: To provide a balance of computation, memory, and network resources. These are appropriate for applications that utilize these resources in equal parts. Such as web servers and code repositories.
Memory Optimized:- Memory-optimized refers to systems designed to deliver rapid performance when handling large memory-intensive datasets
CPU Optimized:- Designed for compute-intensive applications that make use of high-performance CPUs. These instances are best suited for batch processing, media transcoding, and high-performance web servers.
GPU-Enabled:- Configured to utilize graphics processing units for enhanced computational performance, particularly in tasks requiring parallel processing and high-speed data handling.
Smart Servers:- A server designed to enhance performance and efficiency through intelligent resource management and optimization techniques.

Select the volumes
This allows the user to choose the type of volume:
encrypted
: For securing data at rest using encryption._DEFAULT_
: The default storage type (usually unencrypted standard volume).
If no type is selected, the default will be used automatically.
Size (GB): The input field is set to 20 GB, indicating the desired size of the volume. Users can adjust this as needed.
Delete Volume on Termination This option allows the user to specify whether the volume should be automatically deleted when the instance it is attached to is terminated.
OFF (as shown): The volume will persist after the instance is terminated.
ON: The volume will be deleted when the instance is deleted.

Network configuration
Public Network:- A public network is a type of network that is open and accessible to anyone, allowing users to connect freely. If you select a public network, you must configure it to allow public access to your server.
Private Network:- A private network is accessible only to specific individuals or organizations, ensuring that the general public cannot connect to it. If you choose a private network, you must first create a Private network.

Authentication
SSH_KEY:- An SSH KEY is a source access credential used in the Secure Shell(SSH) protocol, consisting of a pair of public and private keys that authenticate users and establish encrypted communication between a client and a server. It would be best if you created an SSH key to access your server.
Password:- A password is a secret string of characters used to verify a user's identity and grant access to a system or resource.

Please specify the name of the SSH key


Cloud Config
Cloud-init is an open-source package that automates the initialization and configuration of cloud-based virtual machines and servers.
This script is written in YAML format and is used with cloud-init, a tool that automates the initial configuration of a Linux VM at boot time.
This example illustrates how to install the NGINX web server by leveraging a cloud-init configuration during virtual machine bootstrapping
#cloud-config
package_update: true
packages:
- nginx
runcmd:
- systemctl enable nginx
- systemctl start nginx

Add Security Group
A security group in cloud computing is a virtual firewall that controls inbound and outbound traffic for cloud resources.
Add the Rules of the security group.


Specify the Name
Give the name of the Server and click on the Create server :
Give the name of the server > Create server

After creating the server, go to SERVE and select the created server.

Viewing Server Details
Upon selecting the server and navigating to "Overview," you can view detailed server information, including vCPU, RAM, boot volume, server status, and the type of key to use.

SSH
SSH(secure shell) is A secure, encrypted protocol for remote access to a computer or network, allowing users to specify login, transfer files, and execute commands over the internet.
Once the server has been properly created, follow these procedures to access it from the outside: Open the Command Prompt on your computer. After navigating to the Downloads folder, choose the downloaded key.
Permissions
ssh -i ssh_key user@ip-addresss



Log in with User.
Last updated