Getting Started
Platform Overview
10 min
general korgrid delivers enterprise grade infrastructure that unifies compute, storage, and networking into a single ultraconverged platform built for performance and resilience, it simplifies operations through an all nvme architecture and integrated data services our documentation is your hub for learning, configuration, and best practices here you’ll find step by step guides, technical references, and other product information to help you deploy, manage, and scale our platform to fit your business use cases for additional in depth technical documentation regarding korgrid's underlying hypervisor technology, you can visit https //docs verge io/ distributed storage vsan the virtual storage area network (vsan) is a fundamental component that tightly integrates storage into the virtual data center (vdc) it provides a distributed, multi tiered storage foundation for all workloads nas the network attached storage (nas) feature provides file level storage/access within your vdc, allowing you to create volumes of files to store on your vsan and mount external file systems files easily upload and manage your individual isos, disk images, logos, and other files or leverage existing files shared to your vdc from korgrid backup and disaster recovery snapshots protect your data and operations with restore points for the entire system and individual tenants/vms/nas volumes site syncs replicate copies of your complete system off site, ready for quick recovery compute virtualization remote console obtain real time, in guest access to your workloads directly from the vergeos unified user interface live vm migrations resiliency that automatically handles vm migrations during maintenance, updates, and after hardware failures (sufficient resources required) manual vm migrations manually move workloads as needed for optimal resource utilization vm recipes automate and streamline your workload deployments with customizable templates golden images standardize vm deployments using a "master copy" of pre configured vm drives for compliance, security, and management optimization import existing workloads vmware vm imports import entire vmware workload environments non disruptively import from media images upload individual vm disk and configuration files (e g , vmdk/vhd/vhdx, ovf/ova, qcow/qcow2, vmx, raw) to the vsan for importing workloads nas volume imports perform individual or batch vm imports directly from source storage multi tenancy tenants allow you to segregate system resources into secure enclaves for different customers, business groups, and projects tenant recipes accelerate and standardize tenant deployment for efficiency, compliance, and self serve systems tenant level reporting for billing track resource usage per tenant to facilitate billing, auditing, and/or planning purposes tenant snapshots restore any tenant from your complete system cloud snapshot; while each tenant can also have the ability to control their own individual snapshot and retention schedule software defined networking virtual networks create up to thousands of virtual networks and optionally use embedded ip management for dhcp, dns, firewall, routing, nat/pat micro segmentation segment and isolate workloads at the vdc (tenant) level, by groups or at the individual workload (vm) level fine tuned network control (rules) use network rules for very precise control of traffic at each virtual network (routes, translations (nat/pat), and security policies) granular traffic monitoring measure and analyze network traffic per network rule for performance optimization vpn establish secure tunnel remote access and site to site connections using wireguard and ipsec integrated network diagnostics utilize convenient and comprehensive network troubleshooting tools for each network, directly from the dashboard port mirroring option duplicate all of a network's traffic to a vm for in depth monitoring or analysis with your tool of choice user management granular user permissions configure precise access control for all your objects with role based permissions multifactor authentication (mfa) ensure only authorized users access your systems and data by requiring an added layer of authentication oidc identity management centralize user identity administration third party identity integration employ your existing oauth2 management systems (such as okta, gitlab, azure ad/entra, or google cloud identity) for management logins monitoring & alerting comprehensive dashboard system gain operational oversight of your entire system from the intuitive, overview to detail dashboard navigation model subscriptions create customized, automated alerts and reports to be delivered to appropriate personnel and/or external monitoring systems third party log support automatically forward log data, in your preferred format, to external log management solutions, such as graylog automation recipes create customizable templates for accelerated workload and vdc deployments while enforcing important policies task engine establish automatic operations to trigger based on schedule and/or events for streamlined operations api first design optimize operations with programmatic automation of core functions through comprehensive restful apis