From time to time, Vultr offers free credits to non-duplicated accounts. Just take a look at https://my.vultr.com/promo/ and check whether your eligible or not. If you are eligible, you will get $3 free credit by verifying your twitter account, following @Vultr on Twitter and Tweet about Vultr.
Before the details, I am showing you the steps. First, add a firewall group. Second, add firewall rules to the firewall group. Third, link instances to this firewall group.
Add a firewall group
Navigate to Servers–>Firewall, click Add Firewall Group, then fill in the blank by entering a firewall description.
Vultr firewall service supports ICMP, TCP, UDP and GRE protocols. ICMP protocol is used for ping service, if you allow others to ping your vultr instances, please add a rule to accept ICMP packets. TCP and UDP protocols are two commonly used protocols. Here is a list of protocols and ports that you may want to accept packets from:
- HTTP: TCP 80
- HTTPS: TCP 443
- SSH: TCP 22
- FTP: TCP 21 20
- MySQL: TCP 3306
You can filter the packets by source, 0.0.0.0/0 accetps packets from anywhere. If you want to allow SSH connection from a specific IP and reject other sources, you choose Custom and fill in the blank next to source by entering an IP address and sub-net mask. For example, if you accept SSH access from 188.8.131.52, then fill the blank with 184.108.40.206/32.
There is a cross sign and trash bin on the right. Adding a rule by clicking cross sign, while removing a rule by clicking trash bin sign.
Link to instances
Congrats, you are almost done, only one step left. Choose the instance you want to link and click the cross sign on the right. Wait for less than 120 seconds, and the firewall has been actived for the instance.
If you want to unlink instances, by click the unlink sign on the right of each linked instances. It also takes less than 120 seconds to take effect.
Vultr announced $2.5 per month plan about a week ago, and I was wondering how the performance is for such a low price. Here is a basic performance test of this VPS hosting plan, including hardware basic information, I/O test, network speed test and unixbench test.
The performance test was run on the following environment:
- CPU: 1 core
- Memory: 512MB
- Storage: 20GB of SSD
- OS: CentOS 6.8
- Data center: Silicon Valley
Before showing test results, I would like to declare that the results may variable in different data center regions or on different server node. Even in the same server node, it may affected by other users, especially bad-neighbors and the test results variable from time to time.
I was using a shell script from bench.sh, this test will show you the basic information of the VPS environment, I/O results and network speed results. From the screenshot below, I found the network connection is a 1Gbps port at least, which was not disclosed on pricing page.
CPU and Memory information
From the above test, we only see a brief information about CPU and memory, we can use linux command to get the detailed information about CPU and memory.
Here is a screenshot of running the command cat /proc/cpuinfo.
Here is a screenshot of running the command of cat /proc/meminfo.
Unixbench is a popular server benchmarking tool. The results will depend not only on hardware, but on operating system, libraries, and even compiler. We don’t need to understand the complex algorithm inside the program, we just need to know whether the index scores is more than 1000. If it is, the performance is not bad. Vultr’s final index scores is 1337, and the performance is not bad.
According to the above test results, Vultr’s $2.5 plan is worth buying. The test results is better than I expected. Several hours later, I deployed another $5 plan instance, and the benchmark results are more or less the same even though the price is doubled.
I am very glad that Vultr added Firewall service to the feature list, this is the most wanted feature second to backup service, which has been announced. Compared to system built-in firewall, there are some advantages:
- Reduce resource usage of instance, because package filtering takes place at a higher level on the network.
- Vultr firewall is managed through the Vultr control panel, it’s much more straightforward than Linux built-in firewall service which is configured in command line interface.
- Vultr firewall group can be applied to multiple instances, really a time-saver.
Vultr firewall is flexible and easy to use. First, create a firewall group. Second, add desired rules to firewall group. Third, apply a firewall group to a server.
Before you apply firewall to instances, you should know the differences between Vultr Firewall and Vultr DDOS protection service. Vultr Firewall is designed to enhance the security while DDOS protection is designed to block large volumes of traffic based on proprietary detection algorithms. Vultr Firewall may a little helpful in certain circumstances, because it can be used to block certain IP protocols or source IPs by rules.
It’s time to stop system built-in firewall and enjoy the convenience of Vultr web-based firewall service.
Vultr just upgraded all plans and announced a $2.5 per month plan, which comes with 1 CPU core, 512MB of memory, 20GB of SSD storage and 500GB of data transfer. Will you agree with me that Vultr is fighting back Linode which upgraded their plans two weeks ago.
This is a price list of upgraded plans:
How to upgrade for existing customers?
Please navigate to settings–>change plan and select the right plan, please note that downgrade is not supported. Here is a screenshot of how to upgrade plan.