Compute Cloud Services - Elastic Cloud Server
Compute Cloud Services - Elastic Cloud Server
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Overview
2. ECS Purchase
3 Huawei Confidential
What Is ECS?
An Elastic Cloud Server (ECS) is a basic computing unit that consists of vCPUs, memory,
OS, and Elastic Volume Service (EVS) disks. After creating an ECS, you can use it just
like you use your local computer or physical server.
HUAWEI CLOUD enables you to create, modify, and operate ECSs in a self-service
manner. You can create an ECS by specifying its vCPUs, memory, OS, and login
authentication. After the ECS is created, you can modify its specifications as required.
This ensures a reliable, secure, efficient computing environment.
4 Huawei Confidential
Why ECS?
Function Description
Rich specifications Multiple ECS types, specifications, and images are available.
Yearly/monthly, pay-per-use, and spot price are available, allowing you to purchase and release
Flexible billing
resources at any time based on service fluctuation.
Reliable data Scalable, reliable high-throughput virtual block storage is based on distributed architecture.
The network is isolated from viruses and Trojan horses by using security group rules. Security services,
Security protection such as Anti-DDoS, Web Application Firewall (WAF), and Vulnerability Scan Service (VSS) are available
to further enhance ECS security.
Elastic computing resources are automatically adjusted based on service requirements and policies to
Flexible, easy-to-use
efficiently meet service requirements.
Highly efficient O&M Multi-choice management via the management console, remote access, and APIs with full rights.
Cloud Eye samples monitored metrics in real time. It generates alarms and sends notifications when it
In-cloud monitoring
detects abnormal metrics.
Elastic Load Balance (ELB) automatically distributes access traffic to multiple ECSs to balance their
Load balancing service load. It enables higher levels of fault tolerance in your applications and expands application
service capabilities.
5 Huawei Confidential
Architecture
6 Huawei Confidential
Access Methods
HUAWEI CLOUD provides a web-based service management platform. You can access
ECSs through HTTPS-compliant application programming interfaces (APIs) or the
management console.
Use this method if you are required to After registering on HUAWEI CLOUD, log
integrate the ECSs into a third-party in to the management console and click
system for secondary development. Elastic Cloud Server under Compute on
the homepage.
7 Huawei Confidential
Advantages
8 Huawei Confidential
Contents
1. Overview
2. ECS Purchase
9 Huawei Confidential
Purchasing an ECS
1 2 3 4
Configure Confirm the
Configure basic Configure
advanced configurations
settings. network.
settings. and buy the ECS.
10 Huawei Confidential
Purchasing an ECS - Basic Configuration (1)
Billing Mode: Pay-per-use, Yearly/Monthly, and Spot price
Designed for better flexibility Billed on a yearly or monthly Billed by the market price,
Billed by the second. basis which varies in real time
vCPUs, memory, and image no Ideal for long-term usage depending on market demands
longer billed after the ECS is because it provides a larger Billed by the second
stopped discount than pay-per-use Applicable to only vCPU and
EVS disks, EIPs, and bandwidth memory
still billed after the ECS is
stopped
11 Huawei Confidential
Purchasing an ECS - Basic Configuration (2)
Region
ECSs in different regions cannot communicate with each other over an intranet. Select a region closest to
your target users to ensure low network latency and quick access.
AZ
An AZ is a physical area where resources use an independent power supply and networks. AZs are physically
isolated from one another but interconnected through an internal network.
To enhance application availability, create ECSs in different AZs. For low network latency, create ECSs in
the same AZ.
Random AZ allocation is available on the console when you create an ECS. The system will use a hash
algorithm to select a default AZ based on your universally unique identifier (UUID).
The available ECS types and flavors vary depending on AZs. Set AZ to Random to view all supported ECS
types and flavors in the AZ. The system will then automatically allocate an AZ according to your selected
ECS flavor.
12 Huawei Confidential
Purchasing an ECS - Basic Configuration (3)
CPU Architecture
The Kunpeng-based CPU architecture uses The x86-based CPU architecture uses
Reduced Instruction Set Computing (RISC). Complex Instruction Set Computing (CISC).
RISC is a microprocessor that executes Each instruction can be used to execute
fewer types of computer instructions than low-level hardware operations. The
CISC but at a higher speed. number of instructions is large, and the
length of each instruction is different.
Executing these instructions is complex
and time-consuming.
13 Huawei Confidential
Purchasing an ECS - Basic Configuration (4)
Specifications
HUAWEI CLOUD provides the following ECS types for different application scenarios.
Kunpeng x86
Kunpeng general computing-plus General computing Large-memory Ultra-high I/O
Kunpeng memory-optimized General Disk-intensive High-performance
Kunpeng ultra-high I/O computing-plus Ultra-high computing
General performance FPGA-accelerated
computing-basic computing AI-accelerated
Memory-optimized GPU-accelerated
14 Huawei Confidential
Purchasing an ECS - Basic Configuration (5)
Select ECS types based on application scenarios.
KC1 ECSs are suitable for governments, enterprises, and the financial industry with strict requirements on security
Kunpeng general computing-
and privacy, for Internet applications with high requirements on network performance, for big data and HPC
plus
requiring a large number of vCPUs, and for website setups and e-Commerce requiring cost-effectiveness.
Memory-optimized ECSs are designed for memory-intensive applications that process a large amount of data,
Memory-optimized
such as precision advertising, e-commerce big data analysis, and IoV big data analysis.
Disk-intensive Disk-intensive ECSs are designed for distributed file system, network file system, and log/data processing.
Ultra-high I/O ECSs are designed for high-performance relational databases, NoSQL databases (such as
Ultra-high I/O
Cassandra and MongoDB), and ElasticSearch.
They are suitable for computing and storage systems for genetic engineering, games, animations, and
High-performance computing
biopharmaceuticals
GPU-accelerated ECSs provide outstanding floating-point computing capabilities. They are suitable for
GPU-accelerated
applications that require real-time, highly concurrent massive computing.
FPGA-accelerated ECSs are suitable for applications that require dense computing, high concurrency, and high
FPGA-accelerated
bandwidth, such as video processing, machine learning, genomics, and financial risk analysis.
AI1 ECSs are used for general technologies, such as machine vision, voice recognition, and natural language
AI-accelerated
processing to support smart retail, smart campus, robot cloud brain, and safe city scenarios.
15 Huawei Confidential
Purchasing an ECS - Basic Configuration (6)
ECS Flavor Naming Rules
ECS flavors are named using the format "AB.C.D“, for example, m2.8xlarge.8.
The format is defined as follows:
A specifies the ECS type. For example, s indicates a general computing ECS, c a computing
ECS, and m a memory-optimized ECS.
B specifies the type ID. For example, the 1 in s1 indicates a general computing first-generation
ECS, and the 2 in s2 indicates a general computing second-generation ECS.
C specifies the flavor size, such as medium, large, or xlarge.
D specifies the ratio of memory to vCPUs expressed in a digit. For example, value 4 indicates
that the ratio of memory to vCPUs is 4.
16 Huawei Confidential
Purchasing an ECS - Basic Configuration (7)
Network Bandwidth
ECS intranet bandwidth and PPS capabilities vary depending on ECS flavors.
Assured intranet bandwidth: indicates the assured ECS bandwidth.
Maximum intranet bandwidth: indicates the maximum ECS bandwidth.
Maximum intranet PPS: indicates the maximum ECS capabilities in transmitting and receiving packets.
17 Huawei Confidential
Purchasing an ECS - Basic Configuration (8)
Image
02 A private image is an image available only to the user who created it. It contains an
Private Image OS, preinstalled public applications, and the user's private applications. Using a private
image to create ECSs eliminates the need to configure multiple ECSs repeatedly.
03
Shared Image A shared image is a private image shared by another user.
18 Huawei Confidential
Purchasing an ECS - Basic Configuration (9)
Disk Type
Disks are classified as EVS disks and DSS disks based on whether the storage resources used by the disks are
dedicated. DSS disks allow you to use dedicated storage resources.
If the image based on which an ECS You can create multiple data disks for
is created is not encrypted, the an ECS and configure sharing and
system disk of the ECS is not encryption for each data disk. When
encrypted. If the image is encrypted, creating an ECS, you can add up to 24
the system disk is automatically disks with custom sizes to the ECS.
encrypted.
19 Huawei Confidential
Purchasing an ECS – Network Configuration
Security Group
A security group controls ECS access within or between
Network security groups through access rules. You can define different
VPC provides a network, including subnets and access rules for a security group to protect the ECSs that are
security groups, for an ECS. If you do not create a added to the security group.
VPC, the system automatically creates a VPC for
you, including the security group and NIC.
1 2 3 4
(Optional) Extension NIC
You can add multiple extension NICs to EIP
an ECS and specify IP addresses for An Elastic IP Address (EIP) is a static public IP
them (including primary NIC). address bound to an ECS in a VPC. Using the EIP,
the ECS provides services externally.
20 Huawei Confidential
Purchasing an ECS – Advanced Configuration
Cloud Backup and Recovery
With CBR, you can backup data for
Login Mode EVS disks and ECSs, and use
Key pair: you use a key pair for login backups to restore the EVS disks
authentication.. and ECSs.
Password: you use a username and its
initial password for ECS authentication.
(Optional) ECS Group
An ECS group applies the anti-affinity
policy to the ECSs in it so that the
ECSs are automatically allocated to
different hosts.
ECS Name
It can be customized but must comply
with the naming rules. If multiple ECSs (Optional) Advanced Options
are purchased at a time, the system You can configure file injection, user
21 Huawei Confidential
Contents
1. Overview
2. ECS Purchase
22 Huawei Confidential
Managing ECSs
Logging In to an ECS
Reinstalling/Changing an ECS OS
Modifying ECS Specifications
Resetting the ECS Login Password
Backup Up ECS Data/Creating an Image Using an ECS
....
23 Huawei Confidential
Logging In to a Windows ECS
Select a login method and log in to the ECS.
24 Huawei Confidential
Logging In to a Linux ECS
The method of logging in to an ECS varies depending on the login
authentication configured during ECS creation.
25 Huawei Confidential
Reinstalling/Changing an ECS OS
Scenarios
If the OS of an ECS fails to start, requires optimization, or cannot meet service requirements, reinstall or
change the OS.
Procedure
Stop the ECS, click More in the Operation column, select Manage Image/Disk, and then Reinstall OS or
Change OS.
Notes
Only the original image of the ECS can be used to reinstall the OS.
To use a new system image, change the OS. Changing the OS will change the
system disk of the ECS, and the original system disk will be deleted.
26 Huawei Confidential
Modifying ECS Specifications
Scenarios
If the specifications of an existing ECS cannot meet service requirements, modify the ECS specifications as
needed, for example, by upgrading the vCPUs and memory.
Procedure
Switch to the list view on the Elastic Cloud Server page, locate the row containing the target ECS, click More
in the Operation column, and select Modify Specifications. Then, restart the ECS.
Notes
To modify the specifications of a yearly/monthly ECS, select the target specification, pay the difference in
price or claim the refund, and restart the ECS.
There is no difference in price if you modify the specifications of a pay-per-use ECS.
27 Huawei Confidential
Resetting the ECS Login Password
Scenarios
The ECS password is lost or has expired.
Prerequisites
One-click password reset plugins have been installed on the ECS.
Notes
ECSs created using a public image have one-click password reset plug-ins installed by default.
28 Huawei Confidential
Backing Up ECS Data
Procedure
Log in to the management console.
Click in the upper left corner and select the desired region and project.
Choose Storage > Cloud Backup and Recovery > Cloud Disk Backup.
Click Buy Server Backup Vault.
After a server backup vault is created, associate ECSs with the vault for backup.
Create a backup.
29 Huawei Confidential
Contents
1. ECS Overview
2. ECS Purchase
30 Huawei Confidential
Scenarios - Internet
Application Scenarios
Recommended Type
General-computing ECSs
Recommendation Reasons
31 Huawei Confidential
Scenario - E-Commerce
Application Scenarios
Recommended Type
Memory-optimized ECSs
Recommendation Reasons
32 Huawei Confidential
Scenario - Graphics Rendering
Applicable Scenarios
GPU-accelerated ECSs
Recommendation Reasons
33 Huawei Confidential
Scenarios - Data Analysis
Application Scenarios
Recommended ECS
Disk-intensive ECSs
Recommendation Reasons
34 Huawei Confidential
Scenario – High-Performance Computing
Application Scenarios
Recommended ECS
Recommendation Reasons
35 Huawei Confidential
Success Story (1)
VMALL Profile
Customer Benefits
36 Huawei Confidential
Success Story (2)
Company Profile
Customer Benefits
37 Huawei Confidential
Success Story (3)
Company Profile
Customer Benefits
• Reliable services
• Friendly user experience with prompt responses to customer
suggestions, application-aware load balancing, flexible and
customized auto-scaling, and smooth capacity expansion.
• Strong after-sales support
38 Huawei Confidential
Quiz
D. Cloud Eye
39 Huawei Confidential
Summary
40 Huawei Confidential
Recommendations
Huawei iLearning
https://e.huawei.com/en/talent
HUAWEI CLOUD Help Center
https://support.huaweicloud.com/intl/en-us/index.html
41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
44 Huawei Confidential
Foreword
45 Huawei Confidential
Objectives
46 Huawei Confidential
Contents
1. Overview
2. AS Parameters
4. Related Services
47 Huawei Confidential
What Is AS?
Auto Scaling (AS) automatically adjusts resources to keep up with changes in
demand based on pre-configured AS policies. This allows your applications to
maintain steady, predictable performance at optimal costs while also freeing
you from the cumbersome task of repeatedly, manually adjusting resources to
respond to changes.
Auto Scaling
48 Huawei Confidential
Architecture
10 Mbit/s 20 Mbit/s 10
Mbit/s
49 Huawei Confidential
Advantages
Automatic
Enhanced Cost
Resource
Management
Adjustment
Benefits
Improved
High Fault
Availability
Tolerance
50 Huawei Confidential
Automatic Resource Adjustment - Scaling ECSs on Demand
AS adds instances and increases bandwidth for your application system when the access volume increases
and reduces extra resources from the system when the access volume drops, ensuring stable system running.
Resources are adjusted in the following ways:
51 Huawei Confidential
Automatic Resource Adjustment - Scaling Bandwidth on
Demand
AS adjusts bandwidth for an application system based on demand, thereby enhancing
cost management.
You can select the following scaling policies to adjust the IP bandwidth based on site
requirements:
52 Huawei Confidential
Automatic Resource Adjustment - Evenly Distributing
Instances by AZ
Instances are evenly distributed in different AZs to reduce the impacts of power and network
faults on the stability of the system.
53 Huawei Confidential
Application Scenarios
Scenario Description
54 Huawei Confidential
Contents
1. Overview
2. AS Parameters
4. Related Services
55 Huawei Confidential
Wizard-based Creation Process
1 2 3
Create an AS
Create an AS group. Create an AS policy.
configuration.
56 Huawei Confidential
AS configuration- Configuration Template
How to select Configuration Template When Creating an AS Configuration?
57 Huawei Confidential
AS group - Multi-AZ Expansion Policy
How to select Multi-AZ Expansion Policy When Creating an AS Group?
— This parameter needs to be configured only when two or more AZs are selected.
Load-balanced Sequenced
58 Huawei Confidential
AS group - Expected Instances
Expected Instances specifies the number of ECSs that are expected to run in an AS group.
Minimum instances < Expected instances < Maximum instances
You can set this parameter when creating an AS group. If this value is greater than 0, a scaling action is
performed to add the required number of ECSs after the AS group is created.
You can change this value manually or by scaling policies (scheduled, periodic, or alarm) after the AS
group is created.
59 Huawei Confidential
AS group - Instance Removal Policy
When instances are automatically removed from an AS group, the instances that are not in the currently used
AZs will be removed first.
AS will check whether instances are evenly distributed in the currently used AZs.
If the load between AZs is unbalanced, AS balances load between AZs when removing instances.
If the load between AZs is balanced, AS removes instances according to the pre-configured instance removal
policy.
60 Huawei Confidential
Health Check Method
Health Check: A health check removes abnormal ECSs from an AS group. Then, AS adds new
ECSs to the AS group. There are two types of AS group health checks.
ECS health check: checks ECS running status. If an ECS is stopped or deleted, it is considered
as abnormal.
ELB health check: determines ECS running status using a load balancing listener.
Health Check Interval: specifies the health check period for an AS group.
61 Huawei Confidential
Bandwidth Scaling Policies
AS adjusts the EIP bandwidth based on bandwidth scaling policies.
There are three types of bandwidth scaling policies:
If the service load is difficult to predict, you can use the alarm policy. The system will trigger scaling actions
based on real-time monitoring data (such as CPU usage) to dynamically adjust the number of instances in the
AS group. If the service load changes regularly, you can use a scheduled or periodic policy to adjust the
number of instances in the AS group.
62 Huawei Confidential
Cooldown Period
63 Huawei Confidential
Contents
1. Overview
2. AS Parameters
4. Related Services
64 Huawei Confidential
AS Management
AS Group
AS Configuration
Scaling Action
Bandwidth Scaling
Constraints
65 Huawei Confidential
AS Group
An AS group consists of a collection of instances and AS policies that have
similar attributes and apply to the same application scenario. An AS group is
the basis for enabling or disabling AS policies and performing scaling actions.
Creating an AS group
Adding a load balancer to an AS group
Adding/Replacing an AS configuration in an AS group
Enabling an AS group
Disabling an AS group
Modifying an AS group
Deleting an AS group
66 Huawei Confidential
AS Configuration
An AS configuration defines the specifications of the ECSs to be added to an AS
group.
Using an existing ECS to create an AS configuration
Using a new specifications template to create an AS configuration
Copying an AS configuration
Deleting an AS configuration
67 Huawei Confidential
Scaling Action – Expanding Resources
When service demands increase, a scaling action is triggered to have more
resources provisioned.
There are three methods for resource expansion:
Dynamically expanding resources
Expanding resources as planned
Manually expanding resources
68 Huawei Confidential
Dynamically Expanding Resources
You can define scaling policies to have scaling actions triggered dynamically to keep up
with changes in demand.
When a scaling policy is triggered, AS automatically changes the expected number of
instances for triggering a scaling action to scale up or down resources.
Configure alarm
ECM
M ECM
ECM
ECS ECS
rules. ECS A scaling action
is triggered.
ECS
ECS
Change the number ECM
ECS
of expected instances.
69 Huawei Confidential
Expanding Resources as Planned
If the changes in demand happen with a foreseeable pattern, you can configure a
scheduled or periodic policy to scale resources periodically or at specified time.
9:00-18:00 00:00-7:00
Off-peak
Peak-hour
70 Huawei Confidential
Manually Expanding Resources
Adjust resources by manually adding or removing instances to or from an AS group, or
by changing the number of expected instances.
ECM
ECS
ECM
ECS
71 Huawei Confidential
Scaling Action - Configuring an Instance Removal Policy
AS supports the following instance removal policies:
Oldest instances created from oldest AS configuration
Newest instances created from the oldest AS configuration
Oldest instances
Newest instances
72 Huawei Confidential
Scaling Action - Viewing a Scaling Action
On the AS group details page, click the Monitoring tab and view the scaling action logs.
73 Huawei Confidential
Scaling Action - Managing Lifecycle Hooks
Lifecycle hooks enable you to flexibly control creation and removal of ECSs in AS groups and
manage the lifecycle of these ECSs.
74 Huawei Confidential
Scaling Action – Managing AS Policies
An AS policy specifies a condition for triggering an AS action. The following
options are available for you to manage AS policies:
Creating an AS policy
Modifying an AS policy
Deleting an AS policy
Enabling an AS policy
Disabling an AS policy
Manually executing an AS policy
75 Huawei Confidential
Bandwidth Scaling
AS allows you to adjust the purchased EIP bandwidth and shared bandwidth.
You can create a bandwidth scaling policy to automatically adjust the
bandwidth. The system supports three types of bandwidth scaling policies:
alarm, scheduled, and periodic.
The basic information for creating a bandwidth scaling policy includes the policy
name, resource type, policy type, and trigger condition.
76 Huawei Confidential
Constraints
AS has the following restrictions:
Only applications that are stateless can run on scaled ECSs in an AS group.
AS automatically releases ECSs. Therefore, the ECSs in AS groups cannot be used to save
application status information (such as sessions) and related data (such as database data and
logs). If the application status or related data must be saved, you can store the information on
separate servers.
AS does not support capacity expansion or deduction of instance vCPUs and memory.
Bandwidth scaling policy Maximum number of bandwidth scaling policies you can create 50
77 Huawei Confidential
Contents
1. Overview
2. Parameter Description
4. Related Services
78 Huawei Confidential
Using AS with ELB
Working with ELB, AS automatically increases or decreases resources based on changes in
demand while ensuring that the load of all ECSs is balanced in the AS group.
After ELB is enabled in an AS group, AS automatically binds a load balancing listener to the newly
added ECSs. Then, ELB automatically distributes access traffic to all ECSs in the AS group through
the listener, improving system availability. If the ECSs in the AS group are running various types
of applications, you can bind multiple listeners to the AS group to listen to each of these
applications, improving service scalability.
79 Huawei Confidential
Related Services
Elastic Cloud Server (ECS)
Virtual Private Cloud (VPC)
Elastic Load Balance (ELB)
Simple Message Notification (SMN)
Cloud Trace Service (CTS)
Cloud Eye
80 Huawei Confidential
Quiz
81 Huawei Confidential
Summary
82 Huawei Confidential
Thank you.
83 Huawei Confidential
Revision Record Do Not Print This Page
84 Huawei Confidential
Compute Cloud Services –
Image Management Service
85 Huawei Confidential
Foreword
86 Huawei Confidential
Objectives
87 Huawei Confidential
Contents
1. Overview
3. Image Management
4. Related Services
88 Huawei Confidential
Concepts
Image and Image Management Service (IMS)
An image is an ECS or BMS template that contains an OS or service data and may also
contain proprietary software and application software, such as database software.
IMS provides you with a convenient way to manage images. You can create ECSs or BMSs
using a private, public, or shared image. You can also create a private image based on an
existing ECS or an external image file.
89 Huawei Confidential
Image types
Image types
Images are either public, private, or shared.
Public images are provided by the cloud
platform, private images are created by
users, and shared images are private
images that other users shared with you.
The figure on the right illustrates the
relationships among different types of
images.
90 Huawei Confidential
Private Image Overview
A private image can be a system disk, data disk, or full-ECS image.
System disk image: contains an OS and preinstalled application software required for
running services. You can use a system disk image to create ECSs and migrate your services
to them.
Data disk image: contains only service data. You can use a data disk image to create EVS
disks and migrate your service data to the disks.
91 Huawei Confidential
Advantages
92 Huawei Confidential
Functions
With IMS, you can:
Use public images that contain a common OS.
Create a private image from an ECS or external image file.
Manage public images.
Manage private images.
Create ECSs from an image.
93 Huawei Confidential
Application Scenarios
Application
Scenarios
94 Huawei Confidential
Contents
1. Overview
3. Image Management
4. Related Services
95 Huawei Confidential
Creating a Private Image
Creating a system disk image from a Windows ECS
Creating a system disk image from a Linux ECS
Creating a full-ECS image from an ECS Source: ECS
96 Huawei Confidential
Creating a System Disk Image from a Windows ECS
1 2 3
97 Huawei Confidential
Configuring DHCP for the Windows ECS
If the Windows ECS that will be used to create a private image is using a static IP
address, configure the ECS NIC to obtain an IP address using DHCP.
98 Huawei Confidential
Installing Cloudbase-Init
To ensure that ECSs created from a private image are configurable, you are advised to
install Cloudbase-Init on the ECS before using it to create a private image.
99 Huawei Confidential
Installing Drivers (Windows)
For an ECS to run normally, a Guest OS driver has been installed. For Xen-based ECSs,
the Guest OS driver is a PV driver. For KVM-based ECSs, it is UVP VMTools. To support
both Xen and KVM, the image must contain both the PV driver and UVP VMTools.
1 2 3
If the external image has not been initialized, perform the following operations:
Create a Windows
Upload an external Register the file as an
private image from a
image file. image.
configured ECS.
If the external image has not been initialized, perform the following operations:
Create a Linux
Upload an external Register the file as an
private image from a
image file. image.
configured ECS.
1. Overview
3. Image Management
4. Related Services
1. Overview
3. Image Management
4. Related Services
B. Private image
C. Secret image
D. Shared image
Huawei iLearning
https://e.huawei.com/en/talent
Huawei Knowledge Base
https://support.huawei.com/enterprise/en/knowledge?lang=en
IMS Help Center
https://support.huaweicloud.com/intl/en-us/ims/index.html
This chapter describes Bare Metal Server (BMS), a HUAWEI CLOUD service.
1. Overview
2. BMS Resources
3. BMS Creation
4. Related Services
Specifications
Network
Customer
benefits
• High throughput
• Hybrid • Low latency
deployment
• Flexible
networking
Applicable
Scenario
Core databases High-performance High security Mobile apps
computing
• Enterprise's
development and • Finance and
• Supercomputing
testing securities
centers • Development,
environment • Governments and
Example • Biopharmacy testing, launch,
• Database enterprises
• Genetic and operations of
applications • Insurance
engineering mobile games
• Typical Oracle companies
database systems
1. Overview
2. BMS Resources
3. BMS Creation
4. Related Services
BMS IMS
1. Overview
2. BMS Resources
3. BMS Creation
4. Related Services
1 2 3
Confirm and
submit the
configurations.
4
2. Under Computing, click Bare Metal Server. The BMS console is displayed.
3. Click Buy BMS in the upper right corner of the page. The page for you to purchase a BMS is
displayed.
4. In the Current Configuration area on the right pane, confirm the billing mode. (Currently, only the
Yearly/Monthly billing mode is supported.) Then, set Region, AZ, Flavor, Image, and Disk.
Yearly/Monthly: a prepaid billing mode. The BMS will be billed based on the required duration
you specify.
Flavor configurations, such as the CPU, memory, and local disks, cannot be changed.
Some flavors support quick BMS provisioning. If you select a flavor of this type, parameter System
Disk is displayed under Disk. The OS of this type of BMS is installed on an EVS disk.
Before creating a BMS in a DeC, you must apply for a dedicated BMS resource pool.
1. Overview
2. BMS Resources
3. BMS Creation
4. Related Services
1. Bare Metal Server (BMS) is a computing service that features both the scalability
of VMs and high performance of physical servers. ( )
A. Yes
B. No
B. InfiniBand network
C. User-defined VLAN
D. High-speed network
Huawei iLearning
https://e.huawei.com/en/talent
BMS Help Center
https://support.huaweicloud.com/intl/en-us/bms/index.html
HUAWEI CLOUD
https://intl.huaweicloud.com
However, cloud computing also brings new challenges: how to migrate services to the cloud?
Solution 1: Re-deploy the applications in the cloud manually or using scripts.
Solution 2: Pack the system images of the locally deployed applications upload them to the cloud through
P2V or V2V migration.
Container VM
Host OS Hypervisor
Infrastructure Infrastructure
Item VM Container
Size
Startup speed
Integration efficiency
Node Node
Master
Node Node
Runtime spec
OCI standards
Image format spec
Docker container
Docker uses containers to run applications. A container is a runnable instance created from an
image. It can be created, started, stopped, and deleted. Each container is isolated and secure.
Docker repository
A repository stores image files. An image registry contains multiple repositories, each
repository stores multiple images, and each image has a unique tag.
Host Registry
Repository 1
Docker daemon
Image 1
Docker client
Container 1 Image 1 Image 3
Container 2a Image 2
Repository 2
Container 2b
Image 2
Image 4
Container ID
Run the docker ps -a command to query the container status. In this example, the
container status is Exited.
[root@localhost ~]# docker ps -a
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
e3b8da676cc9 httpd "httpd-foreground" 23 hours ago Exited (137) 15 seconds ago hungry_mcclintock
Run the docker ps -a command to query the container. In this example, the status is Up.
[root@localhost ~]# docker run -d centos /bin/bash -c "while true; do sleep 1; echo
Huawei; done"
b589b73d4bc382b77b39d9e751b5bd83c6e3bee884a23c71f1c0a0cc5fb92142
[root@localhost
~]# ~]# docker attach b589b73d4bc3
Huawei
Huawei
Huawei
1. Docker is an open source engine that can easily create lightweight, portable, and
self-sufficient containers for any application. ( )
A. Yes
B. No
B. Exited
C. Running
D. Paused