Overview
- What VPC provides (isolated L2 overlay networks per tenant using VXLAN)
- Key capabilities: private subnets, NAT gateways, multi-hypervisor spanning
Prerequisites
- Physical/hardware requirements:
- Secondary NIC on each hypervisor connected to a shared VLAN/switch
- All hypervisors in the group on the same L2 segment (same VLAN)
- This interface carries VXLAN-encapsulated traffic (UDP 4789, multicast 239.1.1.1)
Admin Configuration
Step 1: Navigate to Hypervisor Groups
- Admin Panel → Compute → Hypervisor Groups → Edit group
Step 2: Enable VPC
- Toggle "Enable VPC" on
- Configure VXLAN range (default 10000–16777214)
- Set L2 Interface name (the secondary NIC, e.g.,
eth1, ens192)
Step 3: Verify Link-Local IPs
- System auto-assigns 169.254.x.x link-local IPs to each hypervisor
- Visible in hypervisor table when VPC is enabled
- Used for inter-hypervisor VXLAN control plane
- Enable NAT Gateway toggle (optional)
- Set pricing: monthly credit value, bandwidth rate per GB (optional)
- Configure bandwidth accounting mode (uploads/downloads/both)
- Configure overage policy (no limit / charge overage / revoke access)
- Set IPv4 monthly credit value ( This is the IPv4 assigned to the NAT gateway )
User Guide
Creating a VPC
- Dashboard -> Networking → VPC → Create VPC
- Name, description, CIDR (10.0.0.0/16, 172.16.0.0/16, or 192.168.0.0/16)
- Select Location (must have VPC enabled)
Creating Subnets
- Inside VPC → Create Subnet
- Subnet CIDR within VPC range (e.g., 10.0.1.0/24)
- Gateway auto-assigned (first usable IP)
- IPs auto-generated for the range
Deploying Instances
- Create instance → select VPC and subnet
- Instance gets a VPC interface with private IP from subnet
- Cloud-init configures networking automatically
- Multiple instances in same subnet can communicate directly
NAT Gateway
- Enable NAT gateway on VPC for outbound internet
- System allocates a public IPv4 address
- All instances in attached subnets get outbound connectivity via SNAT
- Bandwidth metered per configuration