Networking
VPC
Virtual Private Cloud networking for Tasmanian Cloud
Coming Soon
VPC features are currently under development. This page outlines our planned offerings.
Overview
We're working on providing Virtual Private Cloud (VPC) capabilities that give you isolated, private network environments for your resources. This enables you to build secure, segmented infrastructure within our Tasmanian cloud.
Planned Features
VPC Configuration
You'll be able to create and manage:
| Feature | Description |
|---|---|
| Custom CIDR blocks | Define your own address space (RFC1918) |
| Subnets | Divide your VPC into smaller network segments |
| Routing tables | Control how traffic flows |
| Internet gateways | Controlled outbound internet access |
| NAT gateways | Allow outbound without inbound exposure |
Network Architecture
graph TB
subgraph "Your VPC: 10.0.0.0/16"
subgraph "Public Subnet: 10.0.1.0/24"
LB[Load Balancer]
end
subgraph "Private Subnet: 10.0.2.0/24"
APP1[App Server 1]
APP2[App Server 2]
end
subgraph "Database Subnet: 10.0.3.0/24"
DB1[Primary DB]
DB2[Replica DB]
end
IG[Internet Gateway]
NAT[NAT Gateway]
LB --> APP1
LB --> APP2
APP1 --> DB1
APP2 --> DB1
APP1 --> NAT
APP2 --> NAT
NAT --> IG
end
Peering
We're planning to support:
- VPC peering — Connect VPCs within your account
- Cross-account VPCs — Secure networking between accounts (future)
What We're Solving
- Isolation — Complete network separation between projects
- Segmentation — Apply security at network level
- Control — Custom routing and access rules
- Multi-tier architecture — Separate public, application, and database layers
Timeline
We're actively working on this feature. If you're interested in early access or have specific requirements, please contact hello@tasmanian.cloud.
Related Documentation
- Cloud Firewalls — Network security rules
- Reserved IPs — Static IP allocation
- Load Balancers — Traffic distribution