RackConnect support for Cloud Networks is available as of January 16, 2013.
Attaching/detaching a Cloud Network on a running RackConnected Cloud Server causes the network stack to be reset, which will break the cloud server's RackConnect connectivity. Therefore, we do not recommend attaching or detaching Cloud Networks to running RackConnect servers. If you do need to attach or detach a network, please contact your Support team prior to making the change.
Below is an example of how the Network Policy should be configured to allow connectivity across your Cloud Network IP addresses. In this example, the Cloud Network is equal to 192.168.x.x/24.
Note: This Network Policy will need to be created, even if you already have a "Cloud Server(s) to Cloud Server(s)" Network Policy allowing all traffic.
Cloud Networks itself normally supports any network range, but if you plan to use the Cloud Network with RackConnected cloud servers, we suggest you limit the network ranges you use to the following Private Address Spaces:
* IMPORTANT *
When creating Cloud Networks, please follow the following guidelines to avoid connectivity issues:
In other words, can you have a single network, let's say 192.168.x.x/24, for your dedicated servers and also for your cloud servers, so that they can communicate like they are all on the same network? Currently, the answer is no. Your cloud servers connect to RackConnect via a ServiceNet NIC, and a separate Cloud Networks NIC is used for Cloud Networks connectivity. The ServiceNet Network and the Cloud Network are two distinct networks that do not have direct connectivity between them. The diagram below should help you to visualize how RackConnect and Cloud Networks work on the same cloud server. In the diagram Cloud Private Network is equivalent to the Cloud ServiceNet Network.
© 2011-2013 Rackspace US, Inc.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License