Skip to main content

Create Instance

The Create Instance function allows you to launch new virtual machines on the vCloud platform with customizable configurations based on your requirements.

Pre-Creation Planning

Before starting, prepare:

  1. Define Purpose: Web server, database, application requirements
  2. Estimate Resources: CPU, RAM, disk capacity needs
  3. Select OS: Linux, Windows, specific versions
  4. Network Planning: Static/dynamic IP, security group requirements
  5. Authentication Method: SSH key (Linux) or password

Access Creation Interface

Two ways to access the instance creation interface:

  1. From Instance Dashboard: Click Create new Instance
  2. From instance management page: Click Create Instance in top-right corner

Figure needed: Dashboard interface showing Create new Instance button and navigation options

Instance Creation Workflow

1. Instance Information

Figure needed: Instance naming interface with text input field and naming guidelines

Enter a descriptive name for your server. This name appears in the management list for easy identification.

Naming Best Practices:

  • Use concise but descriptive names
  • Add sequential numbers for multiple similar servers
  • Avoid special characters or spaces

Good Examples:

  • web-prod-01: Production web server #1
  • db-mysql-main: Main MySQL database server
  • app-test-env: Application testing environment

2. Operating System Selection

Figure needed: OS selection interface showing available distributions, versions, and marketplace templates

Choose the operating system and version that matches your requirements:

Available Options:

  • Distributions: Popular OS like CentOS, Ubuntu, Debian, Windows
  • Custom Images: Use pre-configured custom images (if available)
  • Marketplace: Pre-built application templates like WordPress, LAMP stack

Selection Guide:

Operating SystemRecommended VersionBest For
Ubuntu22.04 LTSWeb servers, development environments, general applications
CentOS7.x or Stream 9Enterprise servers, stability-critical applications
Debian11 (Bullseye)Web servers, stability-focused applications
Windows Server2022.NET applications, Windows services

Important Notes:

  • LTS (Long Term Support) versions recommended for production
  • Verify application requirements before OS selection
  • Marketplace templates save setup time but may include unnecessary components

3. Resource Configuration

Figure needed: Resource configuration interface showing Standard, Memory-Optimized, and Processor-Optimized options with specifications

Select configuration that matches your usage requirements:

Configuration TypeCharacteristicsBest ForExample Use Case
StandardBalanced CPU and RAMWeb applications, development environmentsv2g-standard-2-4 (2 vCPU, 4GB RAM) for WordPress sites
Memory-OptimizedHigher RAM ratioDatabases, data processing applicationsv2g-memory-2-8 (2 vCPU, 8GB RAM) for MongoDB or Redis
Processor-OptimizedHigher CPU ratioCompute-intensive tasks, game serversv2g-processor-4-4 (4 vCPU, 4GB RAM) for video processing

Configuration Recommendations:

  • Small website/blog: v2g-standard-1-2 (1 vCPU, 2GB RAM)
  • Medium business website: v2g-standard-2-4 (2 vCPU, 4GB RAM)
  • Small database server: v2g-memory-2-8 (2 vCPU, 8GB RAM)
  • E-commerce website: v2g-standard-4-8 (4 vCPU, 8GB RAM)
  • Complex application server: v2g-standard-8-16 (8 vCPU, 16GB RAM)
Cost Optimization Strategy
  • Start with smaller configuration and scale up as needed
  • Use monitoring to assess actual requirements
  • Consider multiple small instances vs. single large instance

4. Volume Configuration

Figure needed: Volume configuration interface showing size input field, volume name field, and disk type options

Configure storage for your instance:

Basic Settings:

  • Volume Size: Storage capacity in GB
  • Volume Name: Descriptive identifier for the disk

Recommended Sizes:

Use CaseRecommended SizeNotes
Basic OS20-40GBOperating system and basic software
Web server40-80GBSource code, logs, web assets
Database100GB+Depends on data requirements
File server500GB+Large file storage needs
Best Practices
  • Separate system and data volumes for databases
  • Use descriptive names like "web-data" or "mysql-data"
  • Plan for future growth when sizing volumes

5. Network Configuration

Figure needed: Network configuration interface showing Public Network and VPC Network options with IP assignment settings

Select network configuration:

Network Types:

  • Public Network: Direct internet access with public IP
  • VPC Network: Private virtual network for internal communication

Use Cases:

Network TypeBest ForSecurity Notes
PublicWebsites, internet-facing servicesRequires careful security group setup
VPCDatabases, internal services, multi-tier appsHigher security, no direct internet access
Security Considerations
  • Public networks are convenient but expose more attack surface
  • VPC networks provide additional security layers
  • Use Reserved IPs for servers requiring static addresses

6. Firewall Settings

Figure needed: Firewall configuration interface showing Default and Custom security group options with port rules

Configure security settings:

Options:

  1. Default Configuration: Basic security rules
  2. Custom Configuration: Create custom firewall rules

Common Default Ports:

  • SSH (22) for Linux
  • RDP (3389) for Windows
  • HTTP/HTTPS (80/443) for web servers

Recommended Port Configuration:

Server TypeRequired PortsSecurity Notes
Web Server80, 443, 22Restrict SSH to admin IPs only
Database3306/5432Allow only from application servers
ApplicationApplication-specificLimit access to necessary IPs
Security Best Practice

Apply "least privilege" principle - only open required ports and restrict source IPs

7. Authentication Method

Figure needed: Authentication method selection interface showing SSH Key and Password options

Choose login method:

Authentication Types:

  • SSH Key (Linux): High security using public/private key pairs
  • Password (Linux/Windows): Username and password login

Figure needed: SSH Key management interface showing Import and Auto-Generate options

SSH Key Management:

  • Import: Upload existing public key (OpenSSH format)
  • Auto-Generate: System creates new key pair

SSH Key Setup Process:

  1. Choose "Auto-Generate" or "Import" existing key
  2. Download private key file (.pem) - ONE TIME ONLY
  3. Store securely (typically in ~/.ssh/ directory)
  4. Set proper permissions: chmod 400 yourkey.pem
  5. Connect using: ssh -i yourkey.pem username@server-ip

Password Requirements (if using password authentication):

  • Minimum 12 characters
  • Mix of uppercase, lowercase, numbers, and special characters
Critical Security Warning
  • Private SSH key (.pem) downloads ONLY ONCE
  • System does NOT store private key copies
  • Lost keys require generating new keys and server updates

Review and Create

Review configuration before creating the instance:

Figure needed: Configuration review interface showing all selected settings in a summary format

Verify These Settings:

  • Server name and purpose
  • Operating system and version
  • CPU and RAM configuration
  • Volume size and storage needs
  • Network configuration and security groups
  • Authentication method setup

Click Create Instance to begin the creation process.

Creation Process

Expected Timeline:

  • Initial provisioning: 15-30 seconds
  • Complete boot: 1-2 minutes depending on OS

Figure needed: Instance dashboard showing newly created server with running status and connection details

Post-Creation Steps

Complete these essential steps after instance creation:

1. Connect to Server

Linux:

# Using SSH Key
ssh -i /path/to/private-key.pem username@server-ip

# Example
ssh -i ~/.ssh/myserver.pem ubuntu@203.0.113.10

Windows:

  • Use Remote Desktop Connection (mstsc.exe)
  • Enter server IP address
  • Provide username and password

2. Update Operating System

Linux (Ubuntu/Debian):

sudo apt update && sudo apt upgrade -y

Linux (CentOS/RHEL):

sudo yum update -y

3. Basic Security Setup

Linux:

# Configure firewall
sudo ufw allow ssh
sudo ufw allow http
sudo ufw allow https
sudo ufw enable

# Install fail2ban for SSH protection
sudo apt install fail2ban -y

4. Create Initial Backup

Create a snapshot after completing basic configuration for recovery purposes.

Essential Best Practices
  • Monitor Performance: Enable resource monitoring
  • Regular Updates: Keep OS and applications current
  • Automated Backups: Set up recurring backup schedules
  • Document Configuration: Record important setup steps
  • Test Connectivity: Verify applications work and are accessible