Open navigation

RESVRL User Guide

RESVRL is a cloud control panel for creating and operating virtual machines, networks, security groups, and managed Kubernetes clusters. This documentation focuses on what you can do in the product, what each feature is for, and what to prepare before you click Create.

RESVRL User Guide

RESVRL is a cloud control panel for creating and operating virtual machines, networks, security groups, and managed Kubernetes clusters. This documentation focuses on what you can do in the product, what each feature is for, and what to prepare before you click Create.

This guide is written around the actual web console workflow: where to click, what appears on the page, and what to confirm before you submit.

What you can manage in RESVRL

Virtual machines

  • Create instances in custom, plan, or pay-as-you-go modes.
  • Choose region, image, CPU, memory, storage, duration, network, and credentials.
  • Start, stop, reboot, renew, reset traffic, reset system image, and reset login credentials from the instance page.

Networking

  • Create Public Networks for public access.
  • Create NAT networks for private east-west traffic.
  • Attach one or more networks to a virtual machine.
  • Add extra network interfaces after the instance is already running.

Security groups

  • Create reusable traffic policies per host region.
  • Bind a security group to public-facing traffic.
  • Control inbound and outbound rules for SSH, web services, APIs, and internal services.

Kubernetes

  • Create managed Kubernetes clusters from the console.
  • Select worker count, worker size, cluster network, optional gateway, and security group.
  • View nodes, workloads, services, policies, storage, and access-control resources from the cluster console.

SSH keys

  • Manage reusable SSH public keys from the security area.
  • Generate a key pair in the browser or import an existing public key.
  • Copy public keys, delete unused keys, and reuse them during VM creation.

AI Chat

  • Open AI Chat from the member area and start a new conversation.
  • Use welcome-screen prompt cards for a quick start or type your own request.
  • Search conversation history, reopen previous chats, and delete chats you no longer need.

Billing and balance

  • Review spending trends and order history.
  • Recharge account balance and use it for new orders or renewals.

Feedback and notifications

  • Submit product feedback from the member area.
  • Track platform notifications related to orders and resource state changes.
  1. Read Supported Systems before choosing an image.
  2. Read VM List to understand the VM list page.
  3. Read Creating Virtual Machines before placing your first order.
  4. Read Virtual Networks and Security Groups before exposing services to the internet.
  5. Read VM Monitor after your instance is online.
  6. Read Snapshots to learn about snapshot management.
  7. Read Terminal to use the web-based terminal.
  8. Read Settings for instance management operations.
  9. Read Kubernetes if you plan to run containerized workloads.
  10. Read Create Cluster for detailed cluster creation steps.
  11. Read Operations for daily cluster operations.
  12. Read Cluster Overview to understand the cluster dashboard.
  13. Read Nodes for node management.
  14. Read Workloads for workload management.
  15. Read Networking for network configuration.
  16. Read Storage for storage management.
  17. Read Configuration for configuration and secrets.
  18. Read Access Control for access control.
  19. Read Cluster Settings for cluster settings.
  20. Read SSH Keys if you want to manage login keys centrally.
  21. Read AI Chat if you plan to use the built-in AI assistant.

Before you create resources

  • Confirm which region and host group your workload should run in.
  • Decide whether you need a public Public Network, a private NAT network, or both.
  • Prepare SSH public keys or a password policy for your initial login.
  • Estimate whether you need fixed-duration billing, a prebuilt plan, or pay-as-you-go flexibility.
  • For Kubernetes, prepare a private cluster network and, if external access is required, a gateway network and security group.
  • If you plan to generate SSH keys in the console, prepare a secure place to save the private key immediately because it is only shown once.

This document was updated on 2026-04-25 09:00