Getting Started Launch VMs

Neevcloud Launch server

How to Launch server from the NeevCloud.

Click on the Create A Cloud Server button in the top right corner:

Choose operating system

Linux compute nodes - The Linux compute Node's image is based on a different version of operating systems like Centos, Ubuntu, Debian, Fedora, Alma Linux, Rocky, Cloud Linux, Windows Server, and OpenSUSE Leap.

Hardware Configuration

Specifications

Users can customize their system by selecting various CPU and RAM combinations.

  • General Purpose: To provide a balance of computation, memory, and network resources. These are appropriate for applications that utilize these resources in equal parts. Such as web servers and code repositories.

  • Memory Optimized:- Memory-optimized refers to systems designed to deliver rapid performance when handling large memory-intensive datasets

  • CPU Optimized:- Designed for compute-intensive applications that make use of high-performance CPUs. These instances are best suited for batch processing, media transcoding, and high-performance web servers.

  • GPU-Enabled:- Configured to utilize graphics processing units for enhanced computational performance, particularly in tasks requiring parallel processing and high-speed data handling.

  • Smart Servers:- A server designed to enhance performance and efficiency through intelligent resource management and optimization techniques.

Select the volumes

In the volume section, we select Name, Type - Default, Disk Size

Network configuration

  • Public Network:- A public network is a type of network that is open and accessible to anyone, allowing users to connect freely. If you select a public network, you must configure it to allow public access to your server.

  • Private Network:- A private network is accessible only to specific individuals or organizations, ensuring that the general public cannot connect to it. If you choose a private network, you must first create a Private network.

Authentication

  • SSH_KEY:- An SSH KEY is a source access credential used in the Secure Shell(SSH) protocol, consisting of a pair of public and private keys that authenticate users and establish encrypted communication between a client and a server. it would be best if you had to create an SSH key to access your server.

Access to your server requires an SSH_KEY. It is mandatory

  • Password:- A password is a secret string of characters used to verify a user's identity and grant access to a system or resource.

To create a secure password with 10 characters, including symbols, Use a mix of uppercase and lowercase letters, Include numbers, and add special characters like !, $, #, etc. Avoid using easily guessable info like names or birthdates.

Please specify the name of the SSH key

Note The generated key is always downloaded in the Downloads folder.

Cloud Config

Cloud-init is an open-source package that automates the initialization and configuration of cloud-based virtual machines and servers.

Add Security Group

A security group in cloud computing is a virtual firewall that controls inbound and outbound traffic for cloud resources.

Add Rules of the security group.

Specify the Name

Give the name of the Server and click on the Create server :

Give the name of the server > Create server

After creating the server, go to SERVE and select the created server.

Viewing server Details

Upon selecting the server and navigating to "Overview," you can view detailed server information, including vCPU, RAM, boot volume, server status, and the type of key to use.

SSH

SSH(secure shell) A secure, encrypted protocol for remote access to a computer or network, allowing users to specify login, transfer files, and execute commands over the internet.

Once the server has been properly created, follow these procedures to access it from the outside: Open the Command Prompt on your computer. After navigating to the Downloads folder, choose the downloaded key.

Permissions

Note:- You must set the permission if your key is not functioning with SSH.

For Ubuntu/CentOS:

chmod 400 path/to/sshkey.pem

For macOS:

chmod 400 path/to/sshkey.pem
chmod 0644 path/to/sshkey.pem

For Windows:

Open Command Prompt, Navigate to the directory containing your pem file.

icacls key.pem /inheritance:r
icacls key.pem /grant:r "%username%:R"
ssh -i ssh_key user@ip-addresss

Login with User.

Last updated