- Lesson 1: Quick Server Creation
- Lesson 2: How to assign a Static IP Address to your cloud server
- Lesson 3: How to create and apply network policies to your cloud servers
- Lesson 4: How to manage your SSH keys for your cloud infrastructure and servers
- Lesson 5: How to use Private networking with your cloud servers
- Lesson 6: Setting up SSH key management for your cloud servers
- Lesson 7: How to add two factor authentication to your CloudSigma account
- Lesson 8: How to share cloud infrastructure securely with Access Control Policies
- Lesson 9: Using two factor authentication & OTP for your cloud servers
- Lesson 10: How to manage cloud account billing at CloudSigma
- Lesson 11: Achieving High Availability for your cloud servers
- Lesson 12: How to attach a drive to an existing cloud servers
- Lesson 13: How to clone drive images for your cloud servers
- Lesson 14: How to export your cloud servers & download drive images
- Lesson 15: How to snapshot a drive on your cloud server while it's running
- Lesson 16: How to upload cloud server images to the cloud
The cloud platform is designed to provide an environment with the same degrees of freedom that private in-house environments end-users might have are able to offer. All functionality is available via an API or the end-user WebApp.
Customers are able to provision processing, storage, networks and other fundamental computing resources in an unbundled way meaning CPU, RAM, storage and bandwidth can be purchased and combined independently to allow the best combination of cloud resources without the limitation of fixed server sizes. So any combination of CPU and RAM can be achieved along with multiple drives mounted to a server and multiple networking interfaces. Each resource is billed separately and transparently as either a subscription or as pay-as-you-go in 5-minute billing segments, enabling customers to track exactly how much their cloud servers are costing over time and be billed for it accurately.
Uniquely, any x86 based operating system and software can be used with complete administrator/root control including all variants of BSD, Linux and Windows. End-users can upload raw ISO image, attach CPU and RAM to it and boot it up. This allows full backwards compatibility from the platform.