Skip to content

Latest commit

 

History

History
63 lines (40 loc) · 6.17 KB

vsi_configuring.md

File metadata and controls

63 lines (40 loc) · 6.17 KB
copyright lastupdated
years
2017
2017-04-27

{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:screen: .screen} {:new_window: target="_blank"} {:pre: .pre} {:table: .aria-labeledby="caption"}

Configuring virtual servers

{: #configuring-virtual-servers}

When you have access to your virtual server, ensure that you configure it to meet the needs of your environment. {:shortdesc}

Log in

Log in to the Customer Portal External link icon{: new_window} with the credentials that you received in an email when your account was initially created.

Locate your virtual server

Find your virtual server in the Device List in the Customer Portal. From the Device List, you can manage devices, upgrade devices, or generate bandwidth usage charts. For more information, see Managing virtual servers.

Record IP addresses and credentials

Keep a log of IP addresses and credentials for the server in a safe location so that you can access them quickly without having to log in to the Customer Portal.

  • Individual device IP addresses can be viewed from the Device List.
  • Individual device root passwords can be viewed in the device’s Snapshot View. Click the arrow next to the device name to expand the view.
  • Multiple device IP adressess can be viewed by using the Download CSV action within the Device List. Select Download CSV from the Settings cog to download a full list of devices and details in spreadsheet format.

Update software credentials

All software that was loaded onto your device during the provisioning process was assigned temporary credentials by our systems. These credentials are viewed and managed on the Passwords tab of each device in the Customer Portal. Use these temporary credentials to access your software for the first time. As a best practice, change the password to your software after accessing it for the first time. Use a strong password that is comprised of a combination of letters, numbers and symbols.

Optionally, password updates can be stored on the Passwords tab for each device. However, understand that when storing passwords within the Portal, any person with access to the account and appropriate permissions can view passwords that are stored on the Passwords screen.

For more information about viewing and managing your software credentials, see Add, Delete and Update Software Users and Passwords External link icon{: new_window}.

Access your server on the private network

The private network is the precursor to interacting with your devices through remote desktop (RDP) via SSH and KVM over IP. The VPN Access tool allows for private network connection to either the closest SSL VPN endpoint or to the endpoint of your choice. VPN access is also required to interact with several services that are offered. For more information, see Getting started with the Softlayer VPN External link icon{: new_window}.

Set up monitoring

Monitoring is primarily used as a resource to check your server’s uptime, but it can also be useful for knowing when to scale. Both Standard Monitoring and Nimsoft Monitoring services are available to cover a variety of monitoring needs. Standard Monitoring, sometimes referred to as “Basic Monitoring,” is generally used in the ping-and-respond method through the use of either a slow or service ping that is initiated by using the Customer Portal. Nimsoft Monitoring is also referred to as “Advanced Monitoring” and is available in three tiers: Basic, Advanced, and Premium. This service is also accessible through the Customer Portal. To learn more about how you can keep tabs on your system through monitoring, see Monitoring External link icon{: new_window}.

Secure your system

Hardware firewalls are available to ensure that your device is secure at all times. Hardware firewalls are provisioned on demand with no downtime. If rules are established properly, a firewall can protect your server from unwanted activity. After you order a firewall, it must be enabled and rules must be set. For more information about how to get the most out of firewalls, see Firewall External link icon{: new_window}.

Schedule backups

Backups ensure that your data is safely stored outside of your device and protected in the event it is lost. The following backup services are available to store your data in a secure location in case you ever need to reload your information onto your device:

  • EVault Backup is our automated, agent-based backup system. This is a popular “set-and-forget” solution for managing your device. It is compatible with Microsoft software including Exchange and SQL through additional plug-ins. EVault users interact with this service through EVault’s WebCC Web-based application. For more information, see EVault External link icon{: new_window}.
  • R1Soft Continuous Data Protection (CDP) External link icon{: new_window} is backup software that can be installed on your server or self-managed virtual machine. It is recommended for customers looking for a single interface to manage all of your backups. You interact with R1Soft CDP through your proprietary management system, which allows agents to be installed on virtual machines and offers database plug-ins for additional functionality.

What's Next?

After your virtual server is configured, you can start managing it. For more information, see Managing your virtual server.