Configure additional options for your VM to enhance security, access, and initial setup
Configure additional options for your virtual machine to enhance security, access, and initial setup capabilities.
Control whether your VM has internet connectivity and public accessibility.
Internet Connectivity
Internal Network Only
Security Warning:
Enabling public IP makes your VM accessible from the internet. Ensure proper security measures:
Recommended: Enable Public IP
Recommended: Enable Public IP
Consider Security Requirements
Consider Private Networking
Configure firewall rules through the integrated interface to protect your virtual machine.
Access Security Rules
Security rules are configured during VM deployment or through the security management interface
Define Rule Types
Add rules for specific protocols:
Configure Access
Define allowed sources and destinations:
Apply Rules
Rules are applied automatically after VM becomes active:
SSH Access
Secure Remote Access
Web Services
HTTP/HTTPS Traffic
Custom Applications
Application-Specific Ports
Database Access
Database Connectivity
Minimize Access
Multiple Security Layers
Security rules may take up to 10 minutes to be fully applied after VM deployment. During this time, your VM may appear to have limited connectivity.
Optionally enable Jupyter Notebook server for interactive computing and data science workflows.
Enable Jupyter
Toggle the Jupyter Notebook option during VM configuration
Set Password
Configure a secure password for Jupyter access:
Access Jupyter
After VM deployment, access via browser:
Login
Use the configured password to access the Jupyter interface
Basic Security
Basic Security
Recommended Security
Real-time Validation
Jupyter Security:
Data Science Development
Interactive Data Analysis
Educational Environments
Learning and Teaching
Prototyping and Experimentation
Rapid Development
Add custom initialization scripts to configure your VM environment at first boot.
System Initialization
Custom Scripting
Script Constraints:
Install Additional Software
Install Additional Software
Configure System Settings
Create Users and Configure Access
Install and Configure Applications
Script Reliability
Error Handling and Logging
Resource Management
Efficient Resource Usage
Security Considerations
Secure Script Practices
Testing and Validation
Script Testing
Check Execution Logs
View cloud-init logs on the VM:
Verify Script Status
Check cloud-init status:
Manual Script Testing
Test script components manually:
Debug and Iterate
Plan Configuration
Configure During Deployment
Validate Configuration
Refine and Optimize
Create reusable configuration templates for common deployment scenarios:
Development VM Configuration
Development VM Configuration
Production Web Configuration
High-Security Configuration
Start with basic configurations and gradually add complexity. Test each configuration component separately before combining them in production deployments.
Configure additional options for your VM to enhance security, access, and initial setup
Configure additional options for your virtual machine to enhance security, access, and initial setup capabilities.
Control whether your VM has internet connectivity and public accessibility.
Internet Connectivity
Internal Network Only
Security Warning:
Enabling public IP makes your VM accessible from the internet. Ensure proper security measures:
Recommended: Enable Public IP
Recommended: Enable Public IP
Consider Security Requirements
Consider Private Networking
Configure firewall rules through the integrated interface to protect your virtual machine.
Access Security Rules
Security rules are configured during VM deployment or through the security management interface
Define Rule Types
Add rules for specific protocols:
Configure Access
Define allowed sources and destinations:
Apply Rules
Rules are applied automatically after VM becomes active:
SSH Access
Secure Remote Access
Web Services
HTTP/HTTPS Traffic
Custom Applications
Application-Specific Ports
Database Access
Database Connectivity
Minimize Access
Multiple Security Layers
Security rules may take up to 10 minutes to be fully applied after VM deployment. During this time, your VM may appear to have limited connectivity.
Optionally enable Jupyter Notebook server for interactive computing and data science workflows.
Enable Jupyter
Toggle the Jupyter Notebook option during VM configuration
Set Password
Configure a secure password for Jupyter access:
Access Jupyter
After VM deployment, access via browser:
Login
Use the configured password to access the Jupyter interface
Basic Security
Basic Security
Recommended Security
Real-time Validation
Jupyter Security:
Data Science Development
Interactive Data Analysis
Educational Environments
Learning and Teaching
Prototyping and Experimentation
Rapid Development
Add custom initialization scripts to configure your VM environment at first boot.
System Initialization
Custom Scripting
Script Constraints:
Install Additional Software
Install Additional Software
Configure System Settings
Create Users and Configure Access
Install and Configure Applications
Script Reliability
Error Handling and Logging
Resource Management
Efficient Resource Usage
Security Considerations
Secure Script Practices
Testing and Validation
Script Testing
Check Execution Logs
View cloud-init logs on the VM:
Verify Script Status
Check cloud-init status:
Manual Script Testing
Test script components manually:
Debug and Iterate
Plan Configuration
Configure During Deployment
Validate Configuration
Refine and Optimize
Create reusable configuration templates for common deployment scenarios:
Development VM Configuration
Development VM Configuration
Production Web Configuration
High-Security Configuration
Start with basic configurations and gradually add complexity. Test each configuration component separately before combining them in production deployments.