Launch Alma Linux

Launch Alma Linux

Click on the "Create A Cloud Server" button in the top right corner:

Choose operating system

Click on the Operating System and Select Your Alma Linux.

Hardware Configuration

Users can choose different CPU and RAM configurations to personalize their system. General Purpose and Memory Optimized, CPU Optimized, GPU Enabled, and Smart Servers are the options that are offered. Click these links for further information.

Select the volumes

In the volume section, we select Name, Type - Default, Disk Size

Network configuration

  • Public Network:- A public network is a type of network that is open and accessible to anyone, allowing users to connect freely. If you select a public network, you must configure it to allow public access to your server.

  • Private Network:- A private network is accessible only to specific individuals or organizations, ensuring that the general public cannot connect to it. If you choose a private network, you must first create a Private network.

Authentication

  • SSH_KEY:- An SSH KEY is a source access credential used in the Secure Shell(SSH) protocol, consisting of a pair of public and private keys that authenticate users and establish encrypted communication between a client and a server. it would be best if you had to create an SSH key to access your server.

Access to your server requires an SSH_KEY. It is mandatory

  • Password:- A password is a secret string of characters used to verify a user's identity and grant access to a system or resource.

To create a secure password with 10 characters, including symbols, Use a mix of uppercase and lowercase letters, Include numbers, and add special characters like !, $, #, etc. Avoid using easily guessable info like names or birthdates.

Please specify the name of the SSH key

Note: The generated key is always downloaded in the download folder.

Add Security Group

A security group in cloud computing is a virtual firewall that controls inbound and outbound traffic for cloud resources.

Add Rules of the security group.

Specify the Name

Give the name of the "server", and click on the "Create server" :

Give the name of the server > Create server

After creating the server, click on the VM.

Viewing server details

SSH

SSH(secure shell) A secure, encrypted protocol for remote access to a computer or network, allowing users to specify login, transfer files, and execute commands over the internet.

After successfully creating the server, here's how to access it externally by following these steps: Open the Command prompt on your system. Navigate to the Downloads folder, and select the downloaded key.

NOTE: if your SSH is not functioning, so you have to set the permission.

ssh -i ssh_key user@ip-addresss

Last updated