1. Concepts

You are here:
< All Topics


G8 is an abbreviation for Generate or Cloud Generate.
A G8 is a stand alone independant cloud capacity unit that is physically present in a certain location.

Public / Private G8s

The G8 is designed in such a way that the owner of the G8 can expose the cloud capacity of a certain G8 to be either:

  • Fully public
    Multiple customers deploy virtual resources, of course without being able to interfere with each other.
  • Fully private
    The G8 is solely used by one company. Still access to the G8 can be used by multiple company departments that also cannot interfere with each other.
  • The mix of public and private at the same time, eg to offer excess cloud capacity to other companies.


Since each G8 has an API server, you can communicate with G8s via API endpoints and use API calls to create automation scripts to configure your infrustructure.

Identity And Access Management

User access to G8s is regulated by identity management solution. The same account can be used to access multiple G8s. Access rights are defined by the membership of the account in the G8 specific groups. User priveleges can be granted on different levels:

  • Account level
  • Cloudspace level
  • VM level

Should you need to gain access to a G8 resource or upgrade your user privileges, contact your G8 administrator.

Learn more about Access Management


An Account represents a single tenant on the G8 multi-tenant cloud platform.


A Cloudspace is a logical grouping of the cloud resources that share the same internal virtual network subnet and break out towards the external network via the external interface of the Cloudspace virtual firewall.
Each Cloudspace is associated with only one account. Per account you can create one or more cloud spaces.

Learn more about Cloudspaces

Virtual Firewall (VFW)

A Virtual Firewall is a network firewall of the Cloudspace private network. Type of the VFW can be chosen prior to the Cloudspace creation.

VFW types:

  • Virtual Gateway
    All routing features are API driven but with limited set of features.
  • MikroTik RouterOS
    RouterOS is a VM where it provides rich IP routing capabilities (configured via web interface) plus, API driven port forward feature.
    *Bring your own
    Configure a custom firewall of your choice.

Port Forward

A Port Forward is a mapping of an external port of the VFW to an internal IP address and port of a VM on the private virtual network managed by this VFW.
Via Port Forwards the VMs can be accessed from the outside world by TCP or UDP.

Virtual machine

A Virtual Machine (VM) is a virtual server in GIG Edge Cloud used for running applications.
A VM is created inside a Cloudspace, however, can be moved between Cloudspaces. A VM is deleted if its Cloudspace is deleted.

Learn more about Virtual Mahcines

Disk Storage

GIG Edge Cloud supports two types of disks:

  • Boot disk
    A disk where the OS of the VM is running
  • Data disk

The VM by default has a boot disk that has the OS. This is served by a resource pool that is optimised for storage re-use.
We recommend to attach additional (one or more) data disks to a VM as they are served by another resource pool that is optimised for higher performance, higher IOPs and throughput.
Max IOPs rate can be optimised per disk level.


An Image on a G8 is an OS image used to create VMs. Several commonly used Images are accessible on each G8. Custom Images can be uploaded on Meneja

How to publish images on Meneja


A Snapshot is a logical copy of the state of a VM including the data disks at a particular point in time. Snapshots are used to roll back VMs to a good state.

Network interfaces

By default, a new created VM has an interface that is connected to the isolated virtual network of a cloudspace.
An additional external network interface can be attached to any VM to have external IP. This happens through attaching a new NIC to your VM and reserving an external IP for you. You can then ssh into your VM and add that reserved IP to your new NIC.

Cloud units and billing

Learn more about Cloud units

Next 2. Identity And Access Management
Table of Contents