vApp creation

1) In Compute section, select vApps section and click NEW VAPP

2) In the window that appears, specify the following parameters:
Name - enter the name of the application or service you want to deploy.
Description - enter a description. This will help you in the future to understand what this vApp is used for.

3) Click ADD VIRTUAL MACHINE, to add a VM. In the window that appears, specify:
Name - VM name.
Computer name - the name of the computer inside the guest OS.
Description - enter a description. This will help you in the future to understand what this VM is used for.
Type - select New, to create an empty VM. Select From Template, to create a VM from a template.
Operating System - In this section, specify the OS family and version. Select the ISO to download if required.
Size - set the VM parameters: the number of CPUs, the amount of RAM, the capacity of the virtual disk. Click Customize to set the parameters manually.
Networking - connect a VM to a virtual network. Click ADD, to add a network adapter and select a network.
Click OK.
Click CREATE.

How can we help you?
Request Demo Access
client:

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

Thank you for your inquiry, we will get back to you shortly!