VEXXHOST Logo

Networking

Experience the power of fully distributed networking, complete with virtual routers and the ability to construct a comprehensive network topology. Leverage market-leading network offloading features such as SR-IOV, DPDK, and ASAP2. All of these, powered by OVN, to ensure seamless and efficient operations.

Public Cloud

Cloud

Multi-tenant cloud hosted out of our global datacenters, billed per minute.

Private Cloud

Hosted

Single-tenant dedicated cloud hosted out of our global datacenters, billed per month.

On-Premise

Open source cloud platform hosted in your datacenter, with support or remote ops.

Optimized Networking

Superior Networking for Smooth Operations

Our Networking Service offers virtual routers, full network topology building, and support for network offloading features, powered by OVN for fully distributed networking.

Layer 2 Networks
All Editions

Build fully independent virtual Layer 2 networks, providing an isolated environment for your network traffic that can be attached to VMs & Kubernetes.

Virtual Routers
All Editions

Create and manage virtual routers, simplifying network management and enhancing your network's efficiency and flexibility.

Full Network Topology
All Editions

Build a full network topology, offering a comprehensive view of your network structure and enhancing network management.

ACLs via Security Groups & Logging
All Editions

Enhance network security with Security Groups for fine-grained access control and connection logging for monitoring and auditing network traffic.

Network Offloading Support
Hosted
On-Premise

Support for all market network offloading features (SR-IOV, DPDPK, ASAP2), enhancing your cloud's performance.

Distributed Networking
Hosted
On-Premise

Leverage the power of OVN for fully distributed networking, ensuring efficient and scalable network operations.

Enables Single-Tenant Networks

Benefit from peace of mind with segmentation.


  • Security

    Cloud networks are single-tenant and fully isolated, meaning that it is the equivalent of having a physical switch connected to your servers, only with no one else connected to it.

  • Segmentation

    The connections can be split up across systems, enabling each virtual machine within a given hypervisor to be private to the same network.

Single Tenant Network

IP Address Management

Take advantage of automatic IPAM for ensured consistency.


  • Ensure Consistency

    Users no longer need to manage their IP addresses manually, ensuring consistency between documentation and the system itself.

  • Secure Assigned IPs

    With dynamic IP requests, it is no longer possible to manipulate the IP through the blocking layer above the IP itself.

Ip Address Management

Spine/Leaf Physical Network Capabilities

Users can make use of Neutron for bare metal scaling.


  • Bare Metal Scaling

    Each rack is a network on its own and interconnects with each other under a vast scheduling network. It enables it to understand and appropriately give IP addresses.

Spine/Leaf Physical Network Capabilities

We ❤️ Open Source

🎊Atmosphere is an open source project built by us.

Atmosphere stands out as a fully certified and conformant open-source platform. With both OpenStack powered certification and certified Kubernetes, it has passed all conformance tests. This guarantees a robust, high-performance, and reliable solution for your cloud needs.

OpenStack PoweredCertified Kubernetes

Learn more about Atmosphere

Explore Atmosphere's test environment for seamless VMs, bare metal, and Kubernetes deployment. Unlock cost-saving advantages with our open-source solution.

  • All Editions
  • Seamlessly deploy and manage VMs, Kubernetes clusters, bare metal, and more.
  • Leverage Terraform, Ansible or APIs directly powered by OpenStack & Kubernetes
  • Experience cost savings with a purely open source solution across the entire stack.
  • Hosted
    On-Premise
  • Integrated monitoring, logging, and alerting streamline day 2 operations powered by a modern Prometheus stack.
  • Benefit from built-in Ceph-powered storage solution, including options like Pure Storage and more.
  • Securely powered by Keycloak with LDAP support for authentication and SAML/OpenID Connect integration.
Cloud

Ready to get started with Atmosphere Cloud?

Need help getting started? Our team of experts is here to help you.

More About Public Cloud


Introduction to Cloud Load Balancers

VEXXHOST’s Load Balancers ensures optimal application and content delivery by distributing workloads across multiple computing resources and instances.

LATEST BLOG POSTS & NEWS


  • Expanding OpenStack monitoring through Atmosphere (New Improvement)

    Expanding OpenStack monitoring through Atmosphere (New Improvement)

    Experience enhanced operational monitoring with Atmosphere's latest enhancement, which brings a new layer of security and convenience to your OpenStack environment by integrating OAuth2 proxy with AlertManager & Prometheus, secured by single sign-on via Keycloak.

  • Atmosphere v1.10.4

    Atmosphere v1.10.4

    Discover Atmosphere 1.10.4: Enhanced container orchestration, streamlined image building, and advanced security for a more reliable, efficient cloud experience.

  • Technical Deep Dive: Atmosphere's Secure Image Builds

    Technical Deep Dive: Atmosphere's Secure Image Builds

    Explore the intricate process of Atmosphere's secure image building in this technical deep dive. Understand the role of Docker Content Trust, Trivy, and Cosign in enhancing security across the stack, ensuring the reliability and integrity of images. Discover how Atmosphere addresses unpatched security issues, verifies image signatures, and maintains continuous security through daily scans.

  • Supply Chain Image Security with Docker Content Trust and Cosign

    Supply Chain Image Security with Docker Content Trust and Cosign

    Atmosphere is at the forefront of cloud computing, delivering secure and reliable services to its clients. The latest evolution involves integrating Docker Content Trust and Cosign into Atmosphere's processes. This strategic move sets a new benchmark in supply chain image security.