Operating system images
Diese Seite ist noch nicht in deiner Sprache verfügbar. Englische Seite aufrufen
STACKIT provides the following images directly from the respective providers. The images are not customized by STACKIT.
- CentOS
- CentOS Stream
- Debian
- Ubuntu
- Fedora
- Rocky Linux
- AlmaLinux
The above images are provided by STACKIT as base images, which provides an unmodified base installation for individual customizations. Based on these images, the customer has full control and customization options with regard to the operating system and all applications running on it.
The following table shows the general characteristics of the instances managed by the customer as (from STACKIT’s point of view) “unmanaged servers”:
| Service | Description | Unmanaged server |
|---|---|---|
| STACKIT Portal | Central point of contact for administration with automatic provisioning and self-management. | yes |
| Local user | Creation of local system users by customers possible. | yes |
| Central user management | The user administration is taken over by a central authorization management on the part of STACKIT. | no |
| Fully operational image | The customer receives a VM with administrative rights and a configurable (host) firewall. | yes |
| Security-boosted operating system | All servers are rugged on the STACKIT side. | no |
| Security updates | Installation of OS security updates by STACKIT in the defined maintenance window. | no |
| Basic monitoring | STACKIT monitors the general functionality of the cloud infrastructure, system instances, disk read/write, S3 storage read/write and DNS. | yes |
| Advanced monitoring | In addition to basic monitoring, STACKIT monitors the system instances operated by STACKIT. | no |
| Backup and restore | The customer can set up backups and restores individually. Recovery via the STACKIT Portal is possible, as are snapshots and upgrades. | yes |
| Managed backup | Regular backup of system instances. | no |
Logging in (authentication) to the operating system
Section titled “Logging in (authentication) to the operating system”Authentication on the Linux operating system is initially possible via SSH key or username and password. To enable an initial login via SSH key, an SSH key must be stored. Authentication via username and password via SSH is disabled by default for security reasons, so the web console must be used for this purpose.
(Paid) licenses for operating systems
Section titled “(Paid) licenses for operating systems”The Linux VMs provided are not licensed separately by STACKIT. The same applies to any images provided by the customer. In each case, the customer is responsible for correct licensing, as this is outside the scope of STACKIT.
In addition, we would like to point out that all applications that are used on STACKIT Servers must also be licensed by the customer, if this is necessary.
Custom images
Section titled “Custom images”On the customer’s side, individual images can also be introduced into the cloud environment using Infrastrucure-API, see Infrastructure API (deprecated). In this context, correct licensing of this software is the responsibility of the customer.
When using customer-specific images, these can only be deleted if they are no longer used by any STACKIT Server or volume.