Zum Inhalt springen

Operating system images

Diese Seite ist noch nicht in deiner Sprache verfügbar. Englische Seite aufrufen

STACKIT provides the following images directly from the respective providers. The images are not customized by STACKIT.

  • CentOS
  • CentOS Stream
  • Debian
  • Ubuntu
  • Fedora
  • Rocky Linux
  • AlmaLinux

The above images are provided by STACKIT as base images, which provides an unmodified base installation for individual customizations. Based on these images, the customer has full control and customization options with regard to the operating system and all applications running on it.

The following table shows the general characteristics of the instances managed by the customer as (from STACKIT’s point of view) “unmanaged servers”:

ServiceDescriptionUnmanaged server
STACKIT PortalCentral point of contact for administration with automatic provisioning and self-management.yes
Local userCreation of local system users by customers possible.yes
Central user managementThe user administration is taken over by a central authorization management on the part of STACKIT.no
Fully operational imageThe customer receives a VM with administrative rights and a configurable (host) firewall.yes
Security-boosted operating systemAll servers are rugged on the STACKIT side.no
Security updatesInstallation of OS security updates by STACKIT in the defined maintenance window.no
Basic monitoringSTACKIT monitors the general functionality of the cloud infrastructure, system instances, disk read/write, S3 storage read/write and DNS.yes
Advanced monitoringIn addition to basic monitoring, STACKIT monitors the system instances operated by STACKIT.no
Backup and restoreThe customer can set up backups and restores individually. Recovery via the STACKIT Portal is possible, as are snapshots and upgrades.yes
Managed backupRegular backup of system instances.no

Logging in (authentication) to the operating system

Section titled “Logging in (authentication) to the operating system”

Authentication on the Linux operating system is initially possible via SSH key or username and password. To enable an initial login via SSH key, an SSH key must be stored. Authentication via username and password via SSH is disabled by default for security reasons, so the web console must be used for this purpose.

The Linux VMs provided are not licensed separately by STACKIT. The same applies to any images provided by the customer. In each case, the customer is responsible for correct licensing, as this is outside the scope of STACKIT.

In addition, we would like to point out that all applications that are used on STACKIT Servers must also be licensed by the customer, if this is necessary.

On the customer’s side, individual images can also be introduced into the cloud environment using Infrastrucure-API, see Infrastructure API (deprecated). In this context, correct licensing of this software is the responsibility of the customer.

When using customer-specific images, these can only be deleted if they are no longer used by any STACKIT Server or volume.