Skip to content

Creating a Security Group

This guide will walk you through the process of creating a new security group for your cloud instances.

Steps to Create a Security Group

  1. Navigate to the Security Groups section in the self-service portal
  2. Click the Create Security Group button
  3. Fill in the following details:
    • Name: Enter a descriptive name for your security group (e.g., "web-servers" or "database-access")
    • Description: Add a brief description explaining the purpose of this security group
  4. Click Create to create the security group

Common Use Cases

Web Server Security Group

A typical configuration for web servers might include:

  • Allow HTTP (TCP port 80) from anywhere (0.0.0.0/0)
  • Allow HTTPS (TCP port 443) from anywhere (0.0.0.0/0)
  • Allow SSH (TCP port 22) from specific IP ranges

Database Server Security Group

For database servers, you might configure:

  • Allow MySQL (TCP port 3306) from web server security group
  • Allow PostgreSQL (TCP port 5432) from web server security group
  • Allow SSH (TCP port 22) from specific IP ranges

Application Server Security Group

For application servers, consider:

  • Allow custom application ports from specific security groups
  • Allow monitoring ports from management networks
  • Allow SSH (TCP port 22) from specific IP ranges

Assigning Security Groups to Instances

You can assign security groups to instances in two ways:

  1. During Instance Creation:

    • Select the desired security groups from the dropdown menu when launching a new instance
    • Multiple security groups can be selected to combine their rules
  2. After Instance Creation:

    • Navigate to the instance details page
    • Click on the Security tab
    • Click Edit Security Groups
    • Select or deselect security groups as needed
    • Click Save to apply the changes

Next Steps

After creating a security group, you'll need to:

  1. Add appropriate inbound and outbound rules
  2. Assign the security group to your instances
  3. Test connectivity to ensure rules are working as expected

See Managing Security Group Rules for detailed information about configuring rules.