Managed Cloud Instance Request

Please use this form to request a Managed Server Instance in the CS Cloud Platform.

Please note that this is for a managed instance, meaning certain configurations such as authentication and authorization (via Grouper), networking, automated patching, AV (crowdstrike falcon), etc... is performed by our configuration management platform. If you want an unmanaged instance, please use our OpenStack Platform directly instead.

Please do not hesitate to contact Computer Science IT Services at cscihelp@colorado.edu if you have any questions.

Our response SLA on ServiceNow related to support for these instances is restricted to CEAS-affiliated users only.
Users outside this scope will only receive support on a best-effort basis.

This service offering does not support workloads with a data classification of Highly Confidential.

Indicates required field
Requestor Information
Primary Affiliation
 
 
Faculty Contact

A faculty contact will need to be attached to the instance. Please enter their contact information below.

Instance Configuration
GPU accelerated flavors (p4iv), Xeon Ice lake flavors (6), and high memory optimized flavors (r) require a research allocation and must be requested by the CS Faculty Sponsor.
Network Selection
 
Hosted on internal address space and requires the UCB VPN.
 
Instance will be given a public IP. Sensitive ports such as RDP and SSH will still require the UCB VPN.
Select if you would like this instance networked internally (accessible only from campus networks, and the VPN) or networked publicly (accessible from internet). Depending on your selection, your record name will be either: .int.colorado.edu or .colorado.edu. Non colorado.edu affiliate domains can be used if a public address is used; configure that in your registrar as a name.
Enter additional CNAMES desired, one per line.
Your address will be .colorado.edu (If you select external/public) or .int.colorado.edu (If you select internal). If you want additional CNAMES, (URL "aliases"), please add them here.
Red Hat Enterprise Linux or Amazon Linux is recommended for internet-facing systems and webservers due to the inclusion of SELinux. 
Red Hat Enterprise Linux or Amazon Linux is also recommended for Tesla GPU Accelerated flavors due to better AI Enterprise driver support from Nvidia.
Storage Configuration
 GiB
Boot Volumes are always on our NVMe tier. Please use 2nd datastore volume below for bulk data needs.
Datastore Volume Type
 
 
 
 GiB

Please note that the ceph-io2 storage type is expensive and a limited resource. Unless the performance is required (ie, database iops), please use the ceph-st1 storage type for bulk storage.

For extremely large data demands, we will ask that your faculty sponsor contribute to the cluster or use other solutions such as RC PetaLibrary. The maximum imposed limit per volume is 64TiB.

Backup Volumes
 
Volumes under 1TiB are eligible to stay on prem as a "hot backup"
 
Offsite backups are a monthly upload of your volumes to AWS S3 Glacier. This will incur costs and a Speedyype will be requested for bandwidth, storage, and retrieval (if ever needed). The maximum size is 40TiB.
 
Volume backups are recommended. Volumes will be backed up every 4 hours for 7 days, weekly for 4 weeks, monthly for 12 months, and then yearly on-site. Opt out if backups are not allowed by some policy. Generally, if you need the machine reverted to an earlier point in time contact us ASAP as backup granularity gets wider as time goes on.
Service Information
Is this for a research workload?
 
 
List any grants and publications that are tied to this research. In addition, list any students or postdocs the project supports.
Insufficient details may delay your request.
Please provide a project title, and a brief description of what you will install and run on your system. Please provide details on your system and application architecture you intend to install (e.g. software, web servers, api servers, db servers).
Insufficient details may delay your request.
Data Classification
 
 
 
We are required to report the data classification of this instance to IT Security. Please review the Data Classifications and Impact page and make a selection above. You are responsible for the accuracy of this selection. Please note that we cannot support workloads that are "highly confidential". If you select this option, this case will be transferred to OIT Cloud Team for hosting in The Preserve (Azure GovCloud).
For public facing systems, please indicate ports you would like open on the border firewall to allow it to be reachable from the internet. Please list port requirements and a business justification for each port request.
If this instance is intended to be permanent, do not enter a date; otherwise please enter your anticipated instance end date. Please note that GPU accelerated flavors are intended to be temporary solutions for immediate GPU needs as you wait for our own orders. Please look at RC's Alpine and Blanca supercomputing solutions for long term GPU needs, or request to purchase your own GPU's to be added to the CS Cloud cluster if you have edge-case workloads that do not work well with HPC. All data will be purged 1 year after the end date; and purged immediately if you opt out from backups.
Grouper Access Management
Select Default Access
 
 
 
 
 

Select desired groups or users that can SSH or RDP to manage your server instance.

Please note that certain service accounts, CSCI IT Systems Engineers, and members of IT Security will always have access for security incidents, maintenance, support requests, or troubleshooting incidents.

Add additional Active Directory DNs, one per line.
Enter a list of IdentiKeys, who will have full access to Grouper Groups associated with this instance.
Please note that individuals in this list will also have the ability to add themselves to the su group as well; which would allow sudo on Linux or Administrator access on Windows.
Access to SSH or RDP is managed by the OIT Enterprise Access Management Service (Grouper).
Duo MFA
Duo MFA Opt Out
 
 
Duo MFA will protect SSH on Linux, and RDP on Windows. Visit the OIT Multi-Factor Remote Access page for more information.
Information and Communication Technology Review

The University of Colorado Boulder has legal, moral and ethical obligations to ensure all Information and Communication Technology (ICT) is accessible to all university users. Please review the ICT Review Process website and contact ictcompliance@colorado.edu if you have questions.

 
undefined
 undefined:undefined