I would like to provide a word of caution. I set this up several weeks ago and it works exactly as advertised. However, I started noticing some instability, inability to connect on occasion, couldn't get to the web interface. I finally did some investigation today and discovered that, despite following all of the directions, my box had been infiltrated. My SSH logs had thousands of failed login attempts, which suggests that this version of SSH is an attractive target. One connection had several red marks on virustotal.com and came from China. Blocking all SSH traffic through the Vultr firewall seems to have stopped the compromise. Once everything is set up I would suggest blocking all SSH and using the web console through the Vultr dashboard, or selectively enabling SSH only when you need to use it.
To clarify, none of the login attempts I saw seemed to be successful, however there were still some active connections on port 22. The Chinese IP I saw was one of those. The connections didn't seem to have a user associated, which suggest a flaw in sshd on this version of CentOS. I might try rebuilding it on a different distro instead to see if the same thing happens again.