Cookies are essential for us to deliver our services on Civo. By continuing to use this site, you agree to our cookie and our privacy policies.
Accept and close
Superfast and feature-rich Kubernetes clusters.
High performance virtual machines at a great price.
For maximum availability and performance.
An enterprise-ready hyperconverged infrastructure (HCI).
Kubernetes hosted infrastructure, designed for the edge.
Boost your startup with a powerful, yet simple infrastructure.
Get the benefits of a stable Kubernetes platform for a great price.
Free yourself from complex setups and get started fast with SaaS.
Build and test software with confidence and speed up development cycles.
Helping companies move to Kubernetes with ease.
Take a quickfire look at why developers are choosing Civo Kubernetes.
Find out how our customers are using Civo Kubernetes in the real world.
Knowledge, freshly condensed from the cloud.
A look into the challenges and opportunities of Kubernetes.
Find the answers you need with our range of guides.
Learn everything you need to know to get started with Kubernetes.
Free credit and support from the Civo team for your talks, demos and tutorials.
Join our regular live meetups for insights into Civo, Kubernetes and the wider cloud native scene.
Meet the figureheads of our great community.
Install your favourite Kubernetes applications in seconds.
With this guide, you can transfer the entire contents of an instance to a new one and migrate its public IP address in the process.
We get a lot of requests at Civo asking if we support containers such as "Docker" or "Kubernetes" and how do they integrate with our systems. The good news is I can confirm that we support containers on the Civo platform.
An introduction to SSH keys - setup guidelines on Mac/Linux and Windows, and how to assign to a Civo instance.
There isn't much running on most Civo instances by default, but SSH is always installed. Here are some ideas/best practices to help you secure your instances.
There are two main ways we'd recommend users to secure their Ubuntu instances by creating a firewall - using our platform or internally on the instance using UFW.