📄️ Configuring Instance Protection
Administrators can configure Instance Protection via the Default Services section using these steps:
📄️ Configuring Object Storage
Admins can configure the Object storage from the services section. To configure the Object Storage service, follow these steps:
📄️ Configuring IPv4 Addresses
Follow these steps to configure IPv4 Addresses :
📄️ Configuring Block Volumes
Follow these steps to configure Block Volumes:
📄️ Configuring Virtual Firewall Instances
Follow these steps to configure Virtual Firewall Instances:
📄️ Configuring Kubernetes Service
Follow the below steps to configure the Kubernetes Service:
📄️ Configuring Windows Instances
Follow these steps to configure Windows Instances :
📄️ Configuring Linux Instances
Follow these steps to configure Linux Instances:
📄️ Configuring App Overlays
Admins have the ability to set up the applications accessible to end-users during the deployment of a Linux instance. Presently, these specific applications are exclusively accessible for Linux Instances.