BIP Cloud Manager Overview

Click here to login and access your BIP account.

Login to BIP

Note: For security purposes BIP has implemented 2-factor authentication. Follow the instructions on the screen to download and install the 2-factor authentication app when prompted during login.

Once you've logged in successfully, you will see your BIP account dashboard.

Your BIP Account Dashboard

Your BIP dashboard gives you a quick overview of your account. Main Features include:

  • SERVICES - the total number of application servers and storage appliances
  • DOMAINS - the total number of domain names
  • TICKETS - the total number of open support tickets
  • INVOICES - the total number of unpaid invoices

Click on "SERVICES" to see the status of all your BIP application servers and storage appliances.

Click on "Active" to access the control panel for the application server or storage appliance you would like to manage.

Note: That each application server and storage appliance has a different control panel.


My BIP Products Services


Next steps:

The client area interface looks like the screen below.

As you can see, the control panel contains assorted options that will prove highly useful in VM management.

The module allows customers to easily 'start', 'reboot', 'stop' and 'shutdown' their servers through pressing specific buttons.

Clients can also access the 'noVNC' , 'SPICE' and 'Xterm.js' consoles. Among 'Additional Tools' , you will find options to 'reinstall' a server, create a 'backup' or set up 'backup jobs'.

Clients are also able to access resource usage 'graphs', view the VM 'history', manage the 'network' interface device, and set up the 'firewall' rules. Additionally, clients may take 'snapshots' , and manage 'disks'.

On the main product page in the client area, under the 'Information' headline, your clients can find such details as the current usage of CPU, memory, disk (LXC only) and SWAP (LXC only).

Customers can also view 'DNS' (LXC only) as well ass assigned 'IP addresses'.

Note: The bellow example image was taken from the KVM-based VM, but it will looks very similar in the case of LXC.

manage products services

By clicking the 'Edit' button next to the 'Information' headline, your clients can additionally change the VM hostname and ISO image, choose boot devices, as well as insert their SSH public key.

BIP VM Information

BIP VM Edit Server

Client Area - VM Management

noVNC Console

noVNC console allows clients to connect to their server in the easiest possible way.



SPICE Console

SPICE console enables you to connect to the virtual machine using SPICE.

Client Area - Additional Tools


The "Reinstall" feature can be used to reinstall a new OS on the VM directly by the clients.

Either select a new OS from the provided KVM templates to automatically replace the system, or choose the ISO image for manual system installation.

Note: The ISO images can only be used for the KVM virtualization type, while VM templates can be used either for KVM or LXC. Additionally, both KVM and LXC users can define the new OS password before a new installation.

Note: The ISO images can only be used for the KVM virtualization type, while VM templates can be used either for KVM or LXC. Additionally, both KVM and LXC users can define the new OS password before a new installation.



To create a single backup, press the 'Backups' button, and click on 'New Backup' as shown on the following screen.

Now, choose the compression type ( 'None' , 'LZO' or 'GZIP' ) and the backup mode ( 'Snapshot' , 'Suspend' or 'Stop' ) from dropdown menus.

Afterward, press 'Confirm'.

To restore a VM from the backup, press 'Restore' , and then click the 'Confirm' button in a popup window.

Backup Jobs

By pressing 'Backup Jobs' in the client area, you will be moved to the backup jobs management page.

You can easily edit or delete, as well as preview the details of existing backup jobs there.

To add a new backup job, press 'New Job' as shown on the following screen.

Now, define the backup start time, choose the days when to run it, and select 'Compression Type' and 'Backup Mode' from dropdown menus.

Also, select if you want to receive the notification when the backup is ready.

Finally, press the 'Confirm' button.


Through pressing the 'Graphs' button, clients will be moved to the page with the generated graphs showing the CPU and memory usage, network traffic, and disk I/O.

They can also switch the timeline of graphs by choosing a new one from a dropdown menu indicated on the following screen. Clients can pick between 'Hour', 'Day', 'Week', 'Moth' and 'Year'.


Task History

To access the history of a machine, simply press the 'Task History' button. Afterward, the customer can see all the actions performed on the VM, as well as their status.

If an error has occurred during the execution of a task, the client can view the API response error by clicking on the 'Information' icon.


Clients are allowed to add and remove only private network interface devices. Upon clicking the 'Information' button, the new popup will open with more network details.

Keep in mind that ' Network device' options have to be set to 'Private'.

Also, after the network creation, the button to add another one or delete a newly created private network may not be longer available.


Use a snapshot to remember the current contents of the virtual machine memory. You may use them later to restore the VM's settings.

Press the 'Take Snapshot' button and fill out the form to take a snapshot.

Name it (use the alphabetical characters and no spaces), choose whether to include RAM, and add a description.

It is also possible to set up 'Snapshot Jobs' where snapshots can be created according to your preferences (daily or hourly). Click on 'New Job' in order to add a new snapshot job.

As you complete the form, remember to fill in the 'Name' field without spaces or special characters- only capital letters and numbers are allowed here.

Firewall Coming Soon!

Set up firewall rules and enable a security group for their servers from the client area.

As you can see, you can easily modify and remove the previously added rules and security groups.

To add a new firewall rule (the red arrow) or a predefined security group (the blue arrow), use the buttons marked on the following screen.

You can add a firewall rule in two ways. Both of them require choosing a direction, action, interface, source, and a destination.

The first way (orange) is to choose macro from the 'Macro' dropdown field.

The second way (blue) requires you to choose a protocol and fill in both the source and destination ports.

Additionally, you can enable a rule, and add a comment to it.

Press 'Add' to create a rule.

Choose a security group and an interface which the group will be used on.

Additionally, you can enable a security group, and add a comment to it.

Click 'Add' to use the security group.

Firewall Options

Here you can view the current firewall settings. To decide on its options, press the 'Edit' button, and adjust them to your needs.

Disks (KVM only)

View available disks and add new ones.


Define the additional disk size, choose its bus (the available options may be 'IDE', 'SATA', 'VIRTIO' or 'SCSI' ), as well as define a disk format - you can choose from 'Raw disk image (raw)', 'QEMU image format (qcow2)', or 'VM image format (VMDK)' .


Contact us if you have any questions – we’re here to help!
Let our team of BIP cloud storage experts help you get started. Contact us right now.

If you are a Business Pro customer such as a MSP or have a paid subscription with BIPmd we will be happy to install the software for you. Click here to look through our APP Store.

  • BIP MD, Control Panel, Cloud, Manager, Server
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

How To Choose A BIP Data Center

Deploying your BIP server to a geographically advantageous data center can make a big...

Getting Started with BIP

  Welcome To BIP!   Thank you for choosing BIP as your cloud hosting provider! This guide...

Generate SSH Keys on Windows with PuTTYgen

Secure Shell (SSH) is a cryptographic network protocol used for a secure connection between a...

Using SSH on Windows

OpenSSH As of late 2018, OpenSSH is included with some versions of Windows. Cygwin Cygwin is...

Which app do I need for Two-Factor Authentication?

  Our Two-Factor Authentication uses a system called 'Time Based Tokens'. There are many...