Compute Classic Terminology

The following table lists and describes the key terms used in Compute Classic, arranged in alphabetical order.

For a visual overview of the dependencies and relationships between various objects, see Relationships Between Compute Classic Resources.

Term Definition More Information

Image List

An image list is a collection of Compute Classic machine images. Each machine image in an image list is identified by a unique entry number.

Maintaining Versions of Private Machine Images

Instance

An instance is a virtual machine in Compute Classic, created by using a specific machine image, with CPU and memory resources defined by a shape.

About Instances

Instance Snapshot

An instance snapshot captures the current state of the nonpersistent boot disk of an instance and creates a corresponding machine image. You can then register this machine image with your Compute Classic account and use it to create instances.

Cloning an Instance by Using Instance Snapshots

IP Network

An IP network allows you to define an IP subnet in your account. The address range of the IP network is determined by the IP address prefix that you specify while creating the IP network. These IP addresses aren’t part of the common pool of Oracle-provided IP addresses used by the shared network. When you add an instance to an IP network, the instance is assigned an IP address in that subnet. You can assign IP addresses to instances either statically or dynamically, depending on your business needs. So you have complete control over the IP addresses assigned to your instances.

About IP Networks

IP Network Exchange

An IP network exchange enables access between IP networks that have non-overlapping addresses, so that instances on these networks can exchange packets with each other without NAT.

About IP Networks

IP Reservation

An IP reservation is a public IP address that you can attach to a Compute Classic instance that requires access to or from the Internet

About Public IP Addresses

Launch plan

A launch plan is a JSON (JavaScript Object Notation)-formatted file that defines the properties of one or more instances in Compute Classic. You can use a launch plan to quickly start multiple instances in Compute Classic. The attributes in a launch plan include the instance label and name, the image and shape to be used for the instance, and so on.

Creating Instances Using Launch Plans

Machine Image

A machine image is a template of a virtual hard disk of a specific size with an installed operating system. You use machine images to create virtual machine instances in Compute Classic.

Managing Machine Images

Orchestration

An orchestration defines the attributes and interdependencies of a collection of compute, networking, and storage resources in Compute Classic. You can use orchestrations to automate the provisioning and lifecycle operations of an entire virtual compute topology.

About Orchestrations v1

About Orchestrations v2

Private Gateway

A private gateway object allows you to set up a private peering connection between subnets in your premises and IP networks in your Compute Classic account, using Oracle Cloud Infrastructure FastConnect Classic.

Connecting to Instances Using Oracle Cloud Infrastructure FastConnect Classic

Route

A route specifies the IP address of the destination as well as the vNICset that provides the next hop for routing packets.

About IP Networks

Security Application

A security application allows you to specify the protocol and port that you want to use to enable traffic between a source and a destination using security rules.

In the API and CLI, security applications are called secapplications.

About Security Applications

Security IP List

A security IP list is a list of IP subnets (in the CIDR format) or IP addresses that are external to instances in Compute Classic. You can use a security IP list as the source or the destination in security rules to control network access to or from Compute Classic instances.

In the API and CLI, security IP lists are called seciplists.

About Security IP Lists

Security List

A security list is a group of Compute Classic instances that you can specify as the source or destination in one or more security rules. The instances in a security list can communicate fully, on all ports, with other instances in the same security list using their private IP addresses.

When you add an instance to a security list, the inbound and outbound policies defined in the security list are applicable to that instance.

In the API and CLI, security lists are called seclists.

About Security Lists

Security Rule

A security rule is a firewall rule that you can define to control network access to Compute Classic instances over a specified security application.

You can use a security rule to control network access,

  • between instances in two security lists, or
  • from a set of external hosts (a security IP list) to instances in a security list.

In the API and CLI, security rules are called secrules.

About Security Rules

Shape

A shape is a resource profile that specifies the number of OCPUs and the amount of memory to be allocated to an instance in Compute Classic. The shape determines the type of disk drive that your instance uses. If you select a general purpose or high-memory shape, a hard-disk drive is used. If you select a high I/O shape, an NVM Express SSD disk is automatically attached to your instance. For general purpose and high-memory shapes, you can select the block storage disk size, but for high I/O shapes, the size of the disk is determined by the shape.

About Shapes

Site

A site is a set of physical servers and the associated storage and networking resources in an Oracle Cloud data center. Each site has a distinct REST API endpoint and its network is isolated from other sites in the data center. When you subscribe to Oracle Cloud Infrastructure Dedicated Compute Classic, you get a site that’s dedicated for your use. When you subscribe to Compute Classic, you share sites with other tenants. Multiple sites are assigned to your subscription, and you can see the capacity available on each site at any time. This helps you pick the site that you want to provision resources in.

About Compute Classic Sites

Storage Volume

A storage volume is a virtual disk that provides persistent block storage space for instances in Compute Classic.

About Storage Volumes

Storage Volume Snapshot

A storage volume snapshot is a backup of all the data currently stored on a storage volume. You can use this snapshot to make a copy of or restore a storage volume.

Backing Up and Restoring Storage Volumes Using Snapshots

Virtual NIC

A Virtual NIC, or vNIC, is a virtual network interface card that enables an instance to be associated with a network. Instances created using Oracle-provided Oracle Linux or Windows images with the release version 16.3.6 or later support eight vNICs, enabling each instance to be associated with up to eight networks.

About IP Networks

Virtual NIC Set

A Virtual NIC Set, or vNICset, is a collection of one or more vNICs. vNICsets are useful when you want to use multiple vNICs for the same action. For example, you use vNICsets to specify multiple vNICs as a source or a destination in a security rule. You can also use vNICsets in routes to specify multiple vNICs as the next hop destination for that route.

About IP Networks

VPN Endpoint

A VPN endpoint represents a VPN tunnel between your data center and your Compute Classic site.

Setting Up VPN Using VPNaaS

About Oracle Cloud Infrastructure Networking Classic – VPN for Dedicated Compute Classic

Relationships Between Compute Classic Resources

The following diagram shows the relationships between the resources that you can use to create and manage instances in Compute Classic.

Each block in the diagram represents a resource in Compute Classic.

The numbers at either end of each arrow and the text label on the arrow, together, indicate the relationship between the resources that the arrow connects. For example, the number 1 at either end of the arrow between IP reservations and instance indicates that you can associate an IP reservation with only one instance and an instance with only one IP reservation. Similarly, n at either end of the arrow connecting SSH public key and instance indicates that you can associate any number of keys with each instance and a single key with any number of instances.


Relationships between objects in Oracle Compute Cloud Service