Note: If you cannot find a topic, go to where all RightScale documentation will soon be located. Also, feel free to Chat with us!
Home > Clouds > HP > Overview


Feature and other overview level information for the HP:


Virtual machine instance in the cloud.


The name of the machine image that was used to build the instance.  A virtual image (or virtual appliance, in hypervisor terminology) represents a collection of software: generally an operating system and accompanying applications or utilities. Administrators use machine images installed in virtual environments (such as a public or private cloud) to define and run virtual machines on a hypervisor.

Instance Types

Every cloud infrastructure provides compute resources and the ability to provision these resources. The most important characteristics of compute resources are CPU, memory and local storage. They tend to factor most heavily into the decision making process of which compute resource you should use to meet your specific requirements. Each cloud provider has varying resources and levels of granularity that they provide. RightScale uses Instance Types to help normalize the offerings.  (Note that your cloud provider may not refer to compute resources by the same name.)  Instance Types are coded into the RightScale Dashboard; you cannot just create, delete, and maintain your own Instance Types arbitrarily.

IP Addresses

Static, public IP Address which can be assigned to an instance. Attachable IP addresses typically come from a pool offered by the cloud infrastructure, hence assigning or reassigning to a different instance does not have severe lag times normally associated with DNS propagation.

Security Groups

The name of the instance's Security Group.  Security Groups serve as firewalls for instances that restrict ingress (incoming traffic) communication based on protocol type (TCP, UDP, ICMP), IP address, and ports.  Each instance that is launched must be assigned a Security Group.  Security Groups essentially control who can communicate with instances that have been assigned that Security Group.   By default, all ingress (incoming) network traffic to an instance is rejected unless the instance belongs to one or more Security Groups whose rules specifically allow that traffic.


Permanent storage device in the cloud.  The data on a Volume attached to an instance persists, even if the instance is terminated.  (That is, the data on the Volume is not transient.)

QUICK Start  Overview  FAQs Runbook Tutorials

You must to post a comment.
Last modified
21:49, 16 May 2013


This page has no custom tags.


This page has no classifications.



© 2006-2014 RightScale, Inc. All rights reserved.
RightScale is a registered trademark of RightScale, Inc. All other products and services may be trademarks or servicemarks of their respective owners.