🆕 Apache CloudStack — Managed for Canada

Enterprise Cloud Infrastructure.
Managed for You.

Dedicated hardware or bring your own — Matrix IT manages the entire platform so your team can focus on building, not babysitting infrastructure.

3
Hypervisors Supported
99.95%
SLA Uptime
🇨🇦
Canadian Hosted
ZT
Zero Trust Native
ZONE / DATA CENTRE CloudStack Management Server KVM Linux Hypervisor VMware vSphere/ESXi XCP-ng XenServer VM VM VM VM VM Primary Storage (NVMe SSD) Secondary Storage — NFS / Object / Snapshots Team A VLAN Team B VLAN
Apache CloudStack Architecture
3+
Hypervisors
99.95%
SLA
<5 min
VM Spin-Up
100%
Canadian Data
Zero VPN
Zero Trust Native
Infrastructure Ownership

Choose Your Hardware Model

Matrix IT manages the same CloudStack platform regardless of who owns the metal underneath. Pick the model that fits your budget and risk profile.

🏠

Matrix IT Hosted

We procure, rack, and manage dedicated hardware for your workloads. Zero capital expenditure — pay monthly per node.

  • Dedicated physical nodes — not shared
  • Hardware refresh managed by Matrix IT
  • Procured to match your exact workload
  • Available within 2–4 weeks
Explore this model ›
🛠

Bring Your Own Hardware

Already have physical servers? We install CloudStack, configure Zero Trust, and hand you the self-service portal — on your metal.

  • You own hardware, Matrix IT manages software
  • KVM, VMware, XCP-ng all supported
  • Go-live in as little as one week
  • Easy exit — we remove, you keep hardware
Explore this model ›
🏢

Colocation

Your hardware (or ours) in a third-party Canadian data centre. Matrix IT manages remotely — no one needs to visit the DC day-to-day.

  • Canadian colo partners (Cologix, eStruxture, 151 Front)
  • Full remote management via IPMI/iDRAC
  • Zero Trust eliminates the need for DC VPN
  • Carrier diversity and BGP peering options
Explore this model ›
Matrix IT Hosted Bring Your Own Hardware Colocation ● CloudStack · Zero Trust · Network ● CloudStack · Zero Trust · Network ● CloudStack · Zero Trust · Network Hypervisor (Matrix IT installs) Hypervisor (Matrix IT installs) Hypervisor (Matrix IT installs) Physical Hardware (Matrix IT owns) Physical Hardware (Customer owns) Hardware in 3rd-party DC (any owner) Matrix IT manages Customer owns Flexible ownership
Management layer is identical across all three models

The On-Premise Problem

CTOs face the same three obstacles when running their own hardware. Tier1cloud solves all three.

💵

Hardware Refresh Costs

Servers have a 5–7 year lifecycle. Planning, procuring, and migrating every refresh cycle drains capital and IT bandwidth. With Tier1cloud, hardware costs become predictable monthly opex.

📌

Infrastructure Expertise Gap

Hypervisors, networking, storage pools, and security patching require specialised skills most development-focused teams don’t have. Matrix IT provides that expertise 24/7 as part of the service.

Downtime & Security Risk

Unmanaged on-premise infrastructure is a liability. Missed patches, failed drives, and open firewall ports are all preventable. Tier1cloud includes NOC monitoring, SLA-backed uptime, and Zero Trust by default.

Core Services

Three Pillars of Managed Infrastructure

Everything your team needs to move from on-premise to cloud — without hiring a platform team.

01 — Infrastructure

Infrastructure as a Service

Apache CloudStack on dedicated hardware. Self-service portal, REST API, Terraform provider. Deploy VMs in minutes — any hypervisor, any OS.

Explore IaaS ›
02 — Security

Zero Trust DevOps Access

No VPN, no open ports. AppGate SDP or any ZTNA solution gives each developer identity-bound access to exactly the VMs they need — nothing more.

Explore Zero Trust ›
03 — Hosting

Production Hosting Services

SLA-backed managed VMs. Matrix IT NOC monitors 24/7. Live migration, anti-affinity, automated snapshots, and off-cluster backups included.

Explore Hosting ›
Apache CloudStack

Open-Source IaaS Engine — No Vendor Lock-In

CloudStack 4.x is the proven open-source platform powering thousands of clouds worldwide. It supports every major hypervisor, includes a full REST API, and gives you a self-service portal out of the box — without AWS pricing surprises.

  • KVM, VMware vSphere, XCP-ng / XenServer hypervisor support
  • CloudMonkey CLI and Terraform provider for automation
  • Zones, Pods, Clusters for multi-DC topology
  • Virtual Routers with DHCP, NAT, firewall, and DNS
  • AWS EC2 / S3 compatible API layer
CloudStack Zone Architecture POD 1 Cluster A KVM x4 Cluster B VMware x4 Primary Storage NVMe Virtual Router POD 2 Cluster C XCP-ng x4 Cluster D KVM x4 Primary Storage NVMe Virtual Router CloudStack Management Server Secondary Storage — NFS / Object / ISO Templates Offsite archive via Wasabi S3 (StorageCloud360)
Zone / Pod / Cluster Hierarchy
Zero Trust DevOps

No VPN. No Open Ports. Identity-Bound Access.

AppGate SDP (or any ZTNA solution) gives each developer a per-user micro-tunnel to exactly the VMs they’re entitled to — nothing more. Team A cannot see Team B. No firewall rules to manage.

  • Per-user, per-VM entitlements — not network-wide rules
  • Works identically on hosted, BYOH, and colo hardware
  • AppGate SDP, Tailscale, Cloudflare ZTNA — bring your own
  • MFA with TOTP, hardware key, or SAML/SSO
  • Full audit trail: user, timestamp, destination, duration
Zero Trust DevOps Access Flow Dev A Laptop Dev B Laptop Dev C Laptop AppGate SDP Gateway Identity Verify MFA · Entitlement Team A VLAN 100 3 VMs Team B VLAN 200 5 VMs Team C VLAN 300 No Access 🔒 Default Deny Encrypted tunnel Blocked / no entitlement Each user sees only their entitled resources Works identically on Hosted · BYOH · Colo
Zero Trust — Identity-Bound VLAN Access
Self-Service Portal

Dev Teams Spin Up VMs in Under 5 Minutes

No ticket queues, no waiting on IT. Developers log into the CloudStack portal, pick a template, set CPU/RAM, and click deploy. Zero Trust credentials are provisioned automatically.

  • Pre-built templates: Ubuntu, RHEL, Windows Server, Docker, K8s
  • Team VLAN auto-assigned on VM creation
  • CTO sets per-team CPU / RAM / VM quotas
  • Individual sandboxes and shared team environments
  • Browser VNC console without needing ZTNA client
Self-Service VM Provisioning Flow 1. Login CloudStack Portal SSO / MFA 2. Pick Template Ubuntu 24.04 4 vCPU / 8GB 3. Click Deploy CloudStack API Hypervisor instantiates VM Live: 192.168.10.x VLAN assigned · IP allocated Snapshot policy applied ZT Entitlement Issued User → VM binding created AppGate client notified Dev Access SSH or VNC via ZT tunnel 0:00 ~3 min: VM live 5:00 No tickets · No waiting · No firewall rules CTO quotas enforced automatically · All activity logged
From login to live VM in under 5 minutes
Co-Managed Model

Matrix IT Owns the Platform. Your Team Owns the Workloads.

A clear division of responsibility. Matrix IT manages every layer below the guest OS: hypervisors, CloudStack, network fabric, storage, backups, and security patching. Your teams run applications and manage their VMs.

  • Matrix IT: hypervisor, CloudStack, VLANs, storage, NOC 24/7
  • Customer: guest OS, applications, data, team access policies
  • Shared: security policy, change management, capacity planning
  • Onboarding: Week 1 discovery, Week 2 design, Week 3 go-live
  • Same model regardless of hardware ownership
Co-Managed Responsibility Model CUSTOMER TEAM Applications · Guest OS · Data · VM lifecycle · Team policies SHARED Security policy · Change management · Capacity planning · Escalation MATRIX IT — Platform CloudStack · Virtual Routers · VLANs · Zero Trust · NOC Monitoring MATRIX IT — Hypervisor KVM / VMware / XCP-ng · Patching · Live Migration · Anti-Affinity HARDWARE Matrix IT Hosted · Customer BYOH · Colocation — same platform above
Clear division — click any layer to explore
Storage Architecture

From Fast NVMe Primary to Infinite Offsite Archive

Tiered storage is built into every Tier1cloud deployment. Primary NVMe for hot workloads, secondary NFS for templates and snapshots, and Wasabi S3 for offsite archiving — at $10 CAD/TB/month with no egress fees.

  • NVMe SSD primary pools with IOPS QoS per VM
  • Snapshots: hourly 24h, daily 7d, weekly 4w retention
  • Online volume resize without VM downtime
  • Wasabi S3 offsite archive — Canadian region, 11 nines durability
  • S3-compatible: rclone, AWS CLI, any S3 client
Storage Architecture VM 1 VM 2 VM 3 VM N Primary Storage — NVMe SSD Pool QoS per VM · Thin provisioning · Live resize Secondary Storage — NFS / Object VM templates · ISO images · Snapshot store Snapshots Hourly · Daily · Weekly Wasabi S3 🇨🇦 Offsite · $10/TB/mo · No egress 11 nines durability
Tiered Storage from NVMe to Offsite Archive
Real-World Use Cases

See It in Action

Three buyers. Three journeys. Same platform underneath.

Dev Teams

Staging Environment in 5 Minutes

Dev lead logs into portal, picks Ubuntu 22.04, deploys 4 vCPU / 8 GB VM. Zero Trust entitlement appears in their AppGate client automatically. Team isolated in their own VLAN. No tickets.

CTO Migration

Migrate 40 On-Prem Servers to Cloud

Discovery call with Matrix IT → hardware sizing → BYOH or rental decision → CloudStack installed → VMs migrated one at a time → Zero Trust replaces VPN → old hardware decommissioned.

BYOH

Customer Brings 10 Dell PowerEdge Servers

Matrix IT audits hardware, installs KVM + CloudStack, connects Zero Trust, configures VLANs per team. Customer gets full self-service portal on their own hardware within one week.

Comparison

Tier1cloud vs Public Cloud vs On-Premise

Dedicated infrastructure with managed services — the best of both worlds.

Feature Tier1cloud AWS / Azure Self-Managed On-Prem
Dedicated physical hardware Always dedicated Shared (most tiers) Yes
Canadian data sovereignty GuaranteedOptional (extra cost) Yes
Zero Trust built-in IncludedExtra product, extra cost DIY
Predictable monthly cost Flat per node Variable / egress feesCapex only
Bring your own hardware BYOH supported Not possible Yes
Colocation option Canadian DCs Not applicable Yes
Managed 24/7 by experts Matrix IT NOCSelf-service only Your burden
Self-service VM portal CloudStack UI Yes DIY
No egress fees None Expensive None
Hardware agnostic KVM / VMware / XCP-ng ProprietaryDepends
Technology Stack

Battle-Tested Open Standards

No proprietary lock-in. Every component is enterprise-grade and replaceable.

Apache CloudStack 4.x
💻 KVM Hypervisor
💻 VMware vSphere
💻 XCP-ng / XenServer
🔒 AppGate SDP
🔒 Zero Trust ZTNA
💾 NVMe SSD Pools
💾 Wasabi S3
Terraform Provider
🔘 CloudMonkey CLI
📊 REST API
🇨🇦 Canadian Hosted

Ready to Move Off On-Premise?

Book a free 30-minute infrastructure assessment with Matrix IT. We’ll map your workloads to a Tier1cloud deployment plan and show you what the monthly cost looks like.

Visit Matrix IT →
🌐 tier1cloud.ca
🤝 Managed by Matrix ITwww.matrixit.net
📞 613-232-0648 Ext.102
🇨🇦 All data hosted in Canada
Matrix IT Hosted › Hardware Specs

💾 Hardware Specs

Compute Nodes

AMD EPYC or Intel Xeon class CPUs. Minimum 2-socket configurations. Options: 32-core/256GB, 48-core/512GB, 64-core/1TB RAM. NVMe SSD local storage per node for primary pool.

Networking

10GbE minimum per node, 25GbE available. Bonded uplinks for redundancy. VLAN trunking on all ports. Dedicated management network for IPMI/iDRAC out-of-band.

Storage per Node

Standard: 2x 1.9TB NVMe SSD in RAID-1 for primary. High-performance tier: 4x 3.84TB NVMe in RAID-10. Separate HDD or SAS for secondary/NFS storage pool.

💻

Compute Specs

CPU generations, RAM configs, NVMe options

Details ›
🌐

Network Specs

10GbE/25GbE, bonded uplinks, VLAN trunking

Details ›
Matrix IT Hosted › Procurement

📋 Procurement Model

How It Works

Matrix IT conducts a workload sizing exercise to determine the right hardware. We issue a fixed monthly quote per compute node, no surprises. Hardware is procured, configured, and delivered to our facility or your colo.

No Long-Term Contracts

Hardware is provided month-to-month. No 3-year lock-ins. Scale up by adding nodes. Scale down by returning nodes (30-day notice).

📊

Sizing Exercise

How Matrix IT right-sizes for your workload

Details ›
🕐

Lead Time

Typical hardware procurement and racking timeline

Details ›
Matrix IT Hosted › Dedicated Hardware

🔓 Dedicated vs Shared

Dedicated Physical Nodes

Your VMs run only on hardware provisioned for your account. No noisy neighbours. Predictable IOPS, predictable memory — the physical resources are yours alone.

Multi-Customer Separation

Other Tier1cloud customers run on separate physical hardware in separate VLANs. Network traffic is isolated at the switch layer, not just in software.

🔓

Physical Isolation

Your VMs on your physical nodes only

Details ›
👥

Multi-Customer Separation

How other customers are isolated

Details ›
Matrix IT Hosted › Pricing

💵 Pricing Model

Monthly Per-Node

Pricing is fixed per physical node per month. Includes: CloudStack management, hypervisor, Zero Trust gateway, NOC monitoring, backup snapshots, and support. No egress fees. No per-GB storage charges beyond the included pool.

Capex Comparison

A typical 5-node cluster costs $25K–$40K to purchase. Monthly rental removes this capex hit. Matrix IT also handles the hardware refresh cycle — you never need to buy again.

💵

Price Structure

Monthly per node, per rack unit breakdown

Details ›
📈

BYOH vs Rent

When renting makes more financial sense

Details ›
BYOH › Hardware Requirements

📊 Minimum Hardware Requirements

Minimum Specs

Minimum per node: 8-core CPU (x86_64), 32GB RAM, 500GB SSD, 1GbE NIC (10GbE recommended). Minimum cluster: 3 nodes for HA. Management server can be a VM on the cluster or a separate physical machine.

Supported Vendors

Dell PowerEdge, HP ProLiant, Lenovo ThinkSystem, Supermicro, Cisco UCS, custom whitebox builds. Any x86_64 server capable of hardware virtualisation (VT-x/AMD-V) qualifies.

📊

Full Spec Sheet

CPU, RAM, storage, NIC requirements

Details ›
💻

Supported Vendors

Dell, HP, Supermicro, Lenovo, custom

Details ›
BYOH › Onboarding

🚀 BYOH Onboarding Process

📋

Hardware Audit

What we check before deploying CloudStack

Details ›
🛠

Installation Process

CloudStack + hypervisor + Zero Trust timeline

Details ›
BYOH › Hypervisor Compatibility

💻 Hypervisor Options

KVM (Recommended for BYOH)

Linux KVM with libvirt. Open-source, best performance, lowest overhead. Matrix IT installs and manages the hypervisor layer. No licensing cost.

VMware vSphere

If you have existing VMware infrastructure, Matrix IT can integrate CloudStack with your vCenter. Existing VMs remain running — CloudStack manages new deployments alongside them.

XCP-ng / XenServer

Open-source XenServer fork. Good choice if you have XenServer experience. Full CloudStack support, including live migration and storage motion.

💻

KVM Install

What we install, kernel version, libvirt setup

Details ›
💻

Existing VMware

How we integrate without disrupting current VMs

Details ›
BYOH › Ownership Model

📄 Ownership & Exit

You Always Own the Hardware

Matrix IT manages software only. If you ever leave, we cleanly remove CloudStack, Zero Trust software, and management access. You keep your servers and all data.

Hardware Refresh is Your Call

When you decide to refresh hardware, Matrix IT re-provisions the new hardware with CloudStack at no additional setup charge within the same contract.

📄

Exit Process

Removing CloudStack management if you leave

Details ›
🛠

Hardware Refresh

How aging hardware gets replaced on your schedule

Details ›
Colocation › Models

🏢 Colocation Models

Model A: Your Hardware in a 3rd-Party DC

You ship or transport hardware to a colo facility. Matrix IT manages remotely via IPMI/iDRAC. Full CloudStack + Zero Trust setup. No Matrix IT hardware involved.

Model B: Matrix IT Hardware in Your Chosen Colo

Matrix IT procures and owns hardware, ships it to the colo facility of your choice. You get dedicated hardware in a premium DC without building your own.

🏢

BYOH in DC

You ship hardware, we manage remotely

Details ›
🏠

Matrix IT Hardware in Colo

Best of both worlds

Details ›
Colocation › Facilities

🏠 Canadian Colo Facilities

Supported Partners

Cologix (Montreal, Toronto, Vancouver), eStruxture (Montreal, Calgary), 151 Front (Toronto), Rogers Datacentres (Toronto), Telus/eBay Centres. Matrix IT has experience with all major Canadian colo operators.

Power & Cooling Requirements

Typical per-rack draw: 5–15 kW. Redundant PDU (A/B circuits) recommended. Hot-aisle/cold-aisle containment preferred. 1U/2U form factors standard. Out-of-band console KVM switch required.

🇨🇦

Canadian DCs

Cologix, 151 Front, Rogers, eStruxture

Details ›

Power Requirements

Per-rack draw, redundant PDU options

Details ›
Colocation › Remote Management

🔌 Remote Management

IPMI / iDRAC / iLO

Matrix IT requires out-of-band management access to all colo hardware. IPMI on commodity hardware, iDRAC on Dell, iLO on HP. Provides remote console, power cycle, and hardware diagnostics without needing a site visit.

Zero Trust Eliminates DC VPN

Matrix IT engineers access colo hardware via Zero Trust tunnels. No site-to-site VPN. No jumpbox. Any engineer can access any authorised server from anywhere securely.

🔌

IPMI/iDRAC

Remote console, power cycle, diagnostics

Details ›
👊

Hands & Feet

When physical access is needed

Details ›
Colocation › Connectivity

🌐 Connectivity Options

Cross-Connects

Connect directly to your internet provider, MPLS network, or cloud on-ramp (AWS Direct Connect, Azure ExpressRoute) via colo cross-connect. Matrix IT can procure and manage cross-connects on your behalf.

BGP Peering

For customers with their own IP address space, BGP peering is available at major colo facilities. Carrier diversity provides redundant internet paths.

🌐

Cross-Connects

Connecting to your ISP or MPLS

Details ›
🔒

Zero Trust in Colo

No VPN even in colo environments

Details ›
IaaS › Compute

💻 Compute Resources

Service Offerings

Pre-built CPU/RAM tiers: Small (2 vCPU/4GB), Medium (4/8GB), Large (8/16GB), XL (16/32GB), Custom. CTO can restrict which tiers teams can use.

Resource Quotas

Per-account, per-team CPU and RAM caps set by the CTO. Teams can self-serve within their quota. Quota increase requests go through a simple approval workflow.

📊

Service Offerings

Pre-built CPU/RAM tiers available

Details ›
📌

Resource Quotas

Per-team caps, how to request more

Details ›
IaaS › Networking

🌐 Networking

VLAN Isolation

Each team gets a dedicated VLAN. CloudStack provisions VLANs dynamically. Virtual routers provide DHCP, DNS, and NAT. Teams cannot reach each other unless explicitly configured.

Firewall Rules

Default-deny on all ingress. Teams can add egress rules for outbound internet. Inbound ports must be explicitly opened. Security group model similar to AWS.

🌐

VLAN Isolation

Why each team gets its own network segment

Details ›
🔒

Firewall Rules

Default deny, egress control, security groups

Details ›
IaaS › Storage

💾 Storage

Volume Management

Create, attach, detach, and resize data volumes without VM downtime. Thin provisioning by default. Thick provisioning available for latency-sensitive workloads.

Snapshots

Hourly retention: 24 hours. Daily retention: 7 days. Weekly retention: 4 weeks. Monthly: 12 months. Snapshots stored on secondary storage. Off-cluster to Wasabi S3 on schedule.

💾

Snapshot Policies

Hourly/daily/weekly retention schedules

Details ›
📄

Volume Management

Attach, detach, resize live

Details ›
IaaS › API & Automation

⚙ API & Automation

REST API

Full REST API for all CloudStack operations. AWS EC2 and S3 compatible API layer available. Works with any HTTP client. JSON responses.

# Deploy a VM via CloudMonkey CLI
cloudmonkey deploy virtualmachine
  --serviceofferingid=<id>
  --templateid=<id>
  --zoneid=<id>
  --networkids=<vlan-id>
  --displayname="dev-server-01"
🔘

CloudMonkey CLI

Example commands to spin up a VM

Details ›

Terraform Provider

Full cloudstack_instance HCL example

Details ›
Zero Trust › AppGate SDP

🔒 AppGate SDP

Software-Defined Perimeter

AppGate SDP creates a per-user, per-session micro-tunnel to the specific resources the user is entitled to. No network-wide access. No broadcast domain. The network topology is invisible to the user — they see only their VMs.

Onboarding a New User

1. Matrix IT creates entitlement (user → VM/VLAN mapping). 2. User installs AppGate client. 3. User authenticates (SSO/SAML + MFA). 4. User sees only their entitled resources in the client. No network config required.

🔒

SDP vs VPN

Comparison table, why VPN fails at scale

Details ›
🚀

Onboarding a User

User gets entitlement, installs client, done

Details ›
Zero Trust › Identity-Bound Access

👤 Identity-Bound Access

Every Access Decision is Identity-Based

It’s not about what network you’re on. It’s about who you are. Each user has explicit entitlements. Revoking a user’s access is instant — no firewall rule changes required.

MFA Options

TOTP (Google Authenticator, Authy), hardware security key (YubiKey, FIDO2), SAML/SSO integration (Okta, Azure AD, Google Workspace). MFA is enforced on every session.

🔐

MFA Options

TOTP, hardware key, SSO/SAML

Details ›
🕐

Session Policies

Idle timeout, re-auth triggers

Details ›
Zero Trust › Team Isolation

👥 Team Isolation

VLAN Per Team

Each development team is assigned a dedicated VLAN. CloudStack provisions the VLAN automatically when the team is created. Team A’s VMs are on VLAN 100, Team B on VLAN 200, etc. VLANs are isolated at the virtual switch layer.

VMs Not Discoverable

Without an AppGate entitlement, a VM’s IP address is not discoverable. There are no open ports to scan. The server does not respond to ping from outside its VLAN. Zero Trust + VLAN isolation provides true micro-segmentation.

🌐

VLAN Isolation

Network diagram of team segments

Details ›
🔓

Guest Visibility

VMs not discoverable without entitlement

Details ›
Zero Trust › Audit Trail

📋 Audit Trail

Every Connection Logged

User, timestamp (UTC), source IP, destination VLAN/IP, port, protocol, session duration. Logs are immutable. Stored for 90 days by default (12 months available). Exportable to SIEM (Splunk, Elastic, etc.).

Compliance Reporting

Generate access reports per user, per VM, per time range. Useful for SOC 2, PIPEDA, internal audits. Reports exportable as CSV or PDF.

📋

Log Fields

User, timestamp, source IP, destination, duration

Details ›
📈

Compliance Reports

Exporting logs for audit trail

Details ›
Hosting › Managed VMs

Supported Operating Systems

Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, RHEL 8/9, Rocky Linux 8/9, Debian 11/12, Windows Server 2019/2022. Custom templates available on request.

Patching Schedule

Monthly patching windows coordinated with customers. Emergency CVE patches applied within 24 hours of critical disclosure. Zero-downtime patching via live migration.

💻

OS Support List

Ubuntu, RHEL, Windows, Debian

Details ›
📌

Patching Schedule

Monthly windows, emergency CVE patches

Details ›
Hosting › High Availability

Live Migration

When a physical host requires maintenance, VMs are live-migrated to another host in the same cluster. Zero downtime for the VM. Users connected via Zero Trust experience no interruption.

Anti-Affinity

Critical VMs can be placed on separate physical hosts to survive single-host failures. Configure anti-affinity groups in CloudStack to spread replicated workloads.

🔀

Live Migration

Zero downtime host maintenance

Details ›
📈

Anti-Affinity

Spreading VMs across physical hosts

Details ›
Hosting › Monitoring

NOC Monitoring 24/7

Matrix IT NOC monitors: hypervisor CPU/RAM/disk, CloudStack management server health, network interface errors, IPMI hardware alerts (temperature, fan, PSU), storage pool utilisation, and VM uptime ping checks.

Escalation Path

Alert → automated remediation attempt → NOC engineer review → on-call engineer page → customer notification. P1 (site down): 15-minute response. P2 (degraded): 1-hour response.

📊

Metrics Collected

CPU, RAM, disk I/O, network, uptime

Details ›
📞

Escalation Path

Alert to NOC to on-call to customer

Details ›
Hosting › Backup & Recovery

Snapshot Retention

Hourly snapshots retained for 24 hours. Daily snapshots retained for 7 days. Weekly snapshots retained for 4 weeks. Off-cluster snapshots sent to Wasabi S3 on daily schedule.

Restore Procedure

Customer submits restore request via Matrix IT portal or support ticket. Typical turnaround: 15–60 minutes depending on snapshot age and VM size. Full VM restore or single-volume restore available.

💾

Snapshot Policy

Hourly 24h, daily 7d, weekly 4w retention

Details ›
🔀

Restore Procedure

How to request, typical turnaround

Details ›
Co-Managed › Matrix IT Owns

Platform Layer

Matrix IT owns and maintains: hypervisor (KVM/VMware/XCP-ng), CloudStack management server, virtual routers, VLAN fabric, Zero Trust gateway, storage pools (primary NVMe and secondary NFS), and off-cluster backups.

NOC & Patching

24/7 monitoring, hypervisor security patching, CloudStack upgrades, hardware firmware updates, and incident response. All performed without customer involvement unless change management requires approval.

💾

Hardware Layer

What Matrix IT maintains at hardware layer

Details ›
📌

Patching Policy

CloudStack, hypervisor, security CVE patching

Details ›
Co-Managed › Customer Owns

Guest OS & Applications

Everything above the hypervisor is yours: guest OS installation, application deployment, data management, user accounts within VMs, application-level backups, and development workflows.

Your Data is Always Yours

All data remains your property. You can export or migrate VMs at any time. Matrix IT has no access to VM contents unless explicitly granted for support purposes.

💻

Guest OS Patching

What remains your responsibility

Details ›
📄

Data Ownership

Always yours, exportable at any time

Details ›
Co-Managed › Shared

Change Management

Infrastructure changes (new VLANs, firewall rule changes, storage pool expansion) go through a lightweight change request. Customer submits request, Matrix IT reviews impact and schedules change. No surprise changes.

Capacity Planning

Matrix IT provides monthly capacity reports. When storage or compute utilisation exceeds 70%, we proactively recommend expansion options before performance is impacted.

🤝

Change Management

How to request infrastructure changes

Details ›
📊

Capacity Planning

Proactive alerts, when to add compute

Details ›
Co-Managed › Onboarding

Week 1: Discovery

Discovery calls with CTO and IT leads. Workload inventory. Network diagram review. Security requirements. Team structure and VLAN design. Hardware model decision (hosted / BYOH / colo).

Week 2: Design & Build

Hardware procurement (if hosted) or hardware audit (if BYOH/colo). CloudStack zone/pod/cluster design. VLAN layout. Zero Trust entitlement map. Storage pool sizing.

Week 3: Go-Live

CloudStack + hypervisor + Zero Trust installed. VMs migrated (or new deployments). Customer team walkthrough. Portal access granted. NOC monitoring enabled. SLA starts.

🚀

Migration Checklist

On-prem to cloud for all hardware models

Details ›
📅

Week 1 Detail

Discovery calls, inventory audit, network design

Details ›
CloudStack › Zones & Pods

Zone = Data Centre

A Zone is a physical data centre or failure domain. Each Zone has its own network, storage, and compute. Multiple Zones can be linked for DR.

Pod = Row of Racks

Within a Zone, Pods represent a layer-2 broadcast domain (a rack row). Each Pod has its own IP address space and Pod-level storage.

Cluster = Hypervisor Group

Within a Pod, a Cluster is a group of hosts running the same hypervisor. Live migration is possible within a Cluster. Clusters can be KVM, VMware, or XCP-ng.

🏮

Zone Architecture

Zone/Pod/Cluster diagram

Details ›
📈

Failure Isolation

Failure isolation at zone, pod, cluster level

Details ›
CloudStack › Hypervisors

KVM — Default Recommendation

Linux KVM with libvirt. Best performance/cost ratio. Open-source, no licensing. Recommended for BYOH and hosted models.

VMware vSphere

For customers with existing VMware. CloudStack integrates with vCenter. Mixed clusters (KVM + VMware) not supported in the same cluster but can co-exist in different Clusters within the same Zone.

XCP-ng / XenServer

Open-source XenServer. Strong SR-IOV network support. Good choice for networking-intensive workloads.

💻

KVM Details

Kernel version, libvirt, performance

Details ›
💻

VMware Details

vSphere, vCenter integration, migration

Details ›
CloudStack › Networking

Advanced Networking

Each team gets a dedicated VLAN with a CloudStack Virtual Router providing DHCP, DNS, NAT, and stateful firewall. Egress internet via NAT. Inbound via static NAT / port-forward.

VPC Mode

Virtual Private Cloud within CloudStack. Multiple tiers (subnets) within one VPC. ACL rules between tiers. Site-to-site VPN to on-premise or other clouds. Best for multi-tier app architectures.

🌐

VPC Architecture

Multi-tier application networking

Details ›
📌

Virtual Router

NAT, DHCP, DNS, firewall all-in-one

Details ›
CloudStack › API

REST API

Every CloudStack operation is available via REST. JSON responses. API keys per user. Full documentation at cloudstack.apache.org/api.

# Terraform HCL example
resource "cloudstack_instance" "dev_server" {
  name             = "dev-server-01"
  service_offering = "Small-4vCPU-8GB"
  template         = "Ubuntu-2204"
  zone             = "zone-01"
  network_id       = cloudstack_network.team_a.id
}
🔘

API Example

Deploy a VM with a single REST call

Details ›

Terraform Provider

Full cloudstack_instance HCL example

Details ›
Self-Service › CloudStack UI

Web Portal Walk-Through

Login → Dashboard shows your VMs, their state, and IP addresses. Click “Add Instance” → select Zone → pick Template → choose Service Offering (CPU/RAM) → select Network → Deploy. VM appears in your dashboard within 3 minutes.

Browser VNC Console

Embedded VNC console in the portal. Access your VM’s console without installing an SSH client or Zero Trust client. Useful for initial OS setup or emergency recovery.

🚀

VM Launch Wizard

Step-by-step portal walkthrough

Details ›
📊

Dashboard

Viewing VMs, IPs, console access

Details ›
Self-Service › VM Templates

Standard Template Catalogue

Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, RHEL 8, RHEL 9, Rocky Linux 9, Debian 12, Windows Server 2019, Windows Server 2022, Docker CE pre-installed, Kubernetes node (kubeadm ready).

Custom Golden Images

Teams can register their own templates. Build your base image, snapshot it, register it as a template. Your team’s custom template appears only in your account’s template library.

📃

Full Catalogue

Ubuntu, RHEL, Windows, Docker, K8s

Details ›
📄

Custom Templates

Registering a team golden image

Details ›
Self-Service › ZT Access

Automatic Entitlement Flow

When a VM is created in the portal, an entitlement is automatically provisioned in AppGate for all users in the VM’s team. The entitlement grants SSH (port 22) and any other ports defined in the team’s access policy. No manual firewall rule changes.

Browser-Based Console

No Zero Trust client needed for browser VNC. The portal provides in-browser console access using a secure WebSocket connection through the CloudStack management server.

🔒

Entitlement Flow

VM created → identity mapped → access granted

Details ›
💻

Browser Console

VNC without needing ZT client

Details ›
Self-Service › Teams vs Individual

Team VMs

VMs deployed to a team VLAN are shared within the team. All team members with entitlements can SSH into any team VM. Good for shared dev/test environments, build servers, shared databases.

Individual Sandboxes

A developer can spin up personal VMs in their own sub-VLAN. Only they can access these VMs. Good for personal dev environments, destructive testing, learning exercises.

🌐

Team VLAN

All team VMs on same isolated network

Details ›
📊

Quota Management

CTO sets per-team VM/CPU/RAM limits

Details ›
Storage › Primary NVMe

NVMe SSD Pools

Primary storage is local NVMe SSD on each compute node, aggregated into a CloudStack storage pool. Thin provisioning with over-provisioning ratio of 2:1. QoS limits prevent any single VM from saturating the pool.

High-Performance Tier

For latency-sensitive workloads (databases, real-time systems): dedicated NVMe pool with thick provisioning and no QoS limits. Available as an add-on storage offering.

IOPS Tiers

Standard vs high-performance storage

Details ›
💾

Thin vs Thick

Trade-offs and recommendations

Details ›
Storage › Secondary Storage

NFS Object Storage

Secondary storage stores VM templates, ISO images, and snapshots. Implemented as NFS share from a dedicated storage server. Capacity scales independently from compute nodes.

Template Distribution

CloudStack automatically replicates templates to secondary storage in each Zone. When a new VM is deployed, the template is served from the Zone’s local secondary storage — fast and efficient.

📃

Template Storage

How CloudStack stores and distributes images

Details ›
💾

Snapshot Storage

Where snapshots live, retention policy

Details ›
Storage › Wasabi S3 Offsite

Wasabi S3 Canadian Archive

VM snapshots and backup exports are pushed to Wasabi S3 on a daily schedule. Wasabi’s Canadian region (ca-central-1) ensures data sovereignty. 11 nines (99.999999999%) durability. ~$10 CAD/TB/month with no egress fees.

Powered by StorageCloud360

Tier1cloud offsite archiving is powered by StorageCloud360 — Matrix IT’s managed Wasabi S3 service. storagecloud360.com

💵

Wasabi Pricing

~$10 CAD/TB/mo, no egress fees

Details ›

S3 Compatibility

rclone, AWS CLI, any S3 client

Details ›
Storage › Volume Management

Online Volume Resize

Expand a data volume without VM downtime. CloudStack extends the block device, guest OS extends the filesystem (Linux: resize2fs/xfs_growfs, Windows: Disk Management). No migration required.

Multi-Attach Shared Volumes

Read-write-many volumes available for clustered applications (GlusterFS, Ceph-based apps, OCFS2). Requires shared storage pool configuration. Available on request.

📈

Online Resize

Expand a volume without VM downtime

Details ›
🔀

Shared Volumes

Read-write-many for clustered apps

Details ›