0% found this document useful (0 votes)
191 views202 pages

Compute Cloud Services - Elastic Cloud Server

foramtion

Uploaded by

Marco Marco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views202 pages

Compute Cloud Services - Elastic Cloud Server

foramtion

Uploaded by

Marco Marco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 202

Compute Cloud Services -

Elastic Cloud Server


Foreword

 This chapter provides an overview of HUAWEI CLOUD Elastic Cloud Server


(ECS), including its basic concepts and operations.

1 Huawei Confidential
Objectives

Upon completion of this course, you will be able to:


 Understand the concepts, functions, and application scenarios of ECS.
 Create and manage ECSs.
 Learn the answers to the most frequently asked questions.

2 Huawei Confidential
Contents

1. Overview

2. ECS Purchase

3. ECS Lifecycle Management

4. Application Scenarios and Success Stories

3 Huawei Confidential
What Is ECS?
 An Elastic Cloud Server (ECS) is a basic computing unit that consists of vCPUs, memory,
OS, and Elastic Volume Service (EVS) disks. After creating an ECS, you can use it just
like you use your local computer or physical server.
 HUAWEI CLOUD enables you to create, modify, and operate ECSs in a self-service
manner. You can create an ECS by specifying its vCPUs, memory, OS, and login
authentication. After the ECS is created, you can modify its specifications as required.
This ensures a reliable, secure, efficient computing environment.

Elastic Cloud Server

4 Huawei Confidential
Why ECS?
Function Description

Rich specifications Multiple ECS types, specifications, and images are available.

Yearly/monthly, pay-per-use, and spot price are available, allowing you to purchase and release
Flexible billing
resources at any time based on service fluctuation.

Reliable data Scalable, reliable high-throughput virtual block storage is based on distributed architecture.

The network is isolated from viruses and Trojan horses by using security group rules. Security services,
Security protection such as Anti-DDoS, Web Application Firewall (WAF), and Vulnerability Scan Service (VSS) are available
to further enhance ECS security.
Elastic computing resources are automatically adjusted based on service requirements and policies to
Flexible, easy-to-use
efficiently meet service requirements.

Highly efficient O&M Multi-choice management via the management console, remote access, and APIs with full rights.

Cloud Eye samples monitored metrics in real time. It generates alarms and sends notifications when it
In-cloud monitoring
detects abnormal metrics.
Elastic Load Balance (ELB) automatically distributes access traffic to multiple ECSs to balance their
Load balancing service load. It enables higher levels of fault tolerance in your applications and expands application
service capabilities.

5 Huawei Confidential
Architecture

6 Huawei Confidential
Access Methods
 HUAWEI CLOUD provides a web-based service management platform. You can access
ECSs through HTTPS-compliant application programming interfaces (APIs) or the
management console.

API Management Console

Use this method if you are required to After registering on HUAWEI CLOUD, log
integrate the ECSs into a third-party in to the management console and click
system for secondary development. Elastic Cloud Server under Compute on
the homepage.

7 Huawei Confidential
Advantages

Security Protection Competitive Edge


 Various security services  Professional
such as WAF and VSS Security hardware devices
available for multi- Protection
dimensional protection
 Always available
virtualization
 Security evaluation resources
 Intelligent process
management
Stability and Competitive
 Vulnerability scan Reliability Edge
Auto Scaling
Stability and Reliability
 Automatic adjustment of
 Differentiated EVS disks computing resources
Auto Scaling
 Reliable data  Flexible adjustment of
 Backup and restoration ECS configurations
of ECSs and EVS disks  Flexible billing modes

8 Huawei Confidential
Contents

1. Overview

2. ECS Purchase

3. ECS Lifecycle Management

4. Application Scenarios and Success Stories

9 Huawei Confidential
Purchasing an ECS

1 2 3 4
Configure Confirm the
Configure basic Configure
advanced configurations
settings. network.
settings. and buy the ECS.

• Billing Mode • Network • ECS Name • Confirm the


• Region • Security Group • Login Mode configurations.
• AZ • EIP • Cloud Backup and • Buy the ECS.
• CPU Architecture Recovery
• Specifications • ECS Group
• Image • Advanced Options
• Host Security
• System Disk

10 Huawei Confidential
Purchasing an ECS - Basic Configuration (1)
 Billing Mode: Pay-per-use, Yearly/Monthly, and Spot price

Pay-per-use Yearly/Monthly Spot price

 Designed for better flexibility  Billed on a yearly or monthly  Billed by the market price,
 Billed by the second. basis which varies in real time
 vCPUs, memory, and image no  Ideal for long-term usage depending on market demands
longer billed after the ECS is because it provides a larger  Billed by the second
stopped discount than pay-per-use  Applicable to only vCPU and
 EVS disks, EIPs, and bandwidth memory
still billed after the ECS is
stopped

11 Huawei Confidential
Purchasing an ECS - Basic Configuration (2)
Region
ECSs in different regions cannot communicate with each other over an intranet. Select a region closest to
your target users to ensure low network latency and quick access.
AZ
An AZ is a physical area where resources use an independent power supply and networks. AZs are physically
isolated from one another but interconnected through an internal network.
 To enhance application availability, create ECSs in different AZs. For low network latency, create ECSs in
the same AZ.
 Random AZ allocation is available on the console when you create an ECS. The system will use a hash
algorithm to select a default AZ based on your universally unique identifier (UUID).
 The available ECS types and flavors vary depending on AZs. Set AZ to Random to view all supported ECS
types and flavors in the AZ. The system will then automatically allocate an AZ according to your selected
ECS flavor.

12 Huawei Confidential
Purchasing an ECS - Basic Configuration (3)
 CPU Architecture

Kunpeng vs. x86

The Kunpeng-based CPU architecture uses The x86-based CPU architecture uses
Reduced Instruction Set Computing (RISC). Complex Instruction Set Computing (CISC).
RISC is a microprocessor that executes Each instruction can be used to execute
fewer types of computer instructions than low-level hardware operations. The
CISC but at a higher speed. number of instructions is large, and the
length of each instruction is different.
Executing these instructions is complex
and time-consuming.

13 Huawei Confidential
Purchasing an ECS - Basic Configuration (4)
 Specifications
HUAWEI CLOUD provides the following ECS types for different application scenarios.

Kunpeng x86
 Kunpeng general computing-plus  General computing  Large-memory  Ultra-high I/O
 Kunpeng memory-optimized  General  Disk-intensive  High-performance
 Kunpeng ultra-high I/O computing-plus  Ultra-high computing
 General performance  FPGA-accelerated
computing-basic computing  AI-accelerated
 Memory-optimized  GPU-accelerated

14 Huawei Confidential
Purchasing an ECS - Basic Configuration (5)
 Select ECS types based on application scenarios.

Type Application Scenario

KC1 ECSs are suitable for governments, enterprises, and the financial industry with strict requirements on security
Kunpeng general computing-
and privacy, for Internet applications with high requirements on network performance, for big data and HPC
plus
requiring a large number of vCPUs, and for website setups and e-Commerce requiring cost-effectiveness.
Memory-optimized ECSs are designed for memory-intensive applications that process a large amount of data,
Memory-optimized
such as precision advertising, e-commerce big data analysis, and IoV big data analysis.
Disk-intensive Disk-intensive ECSs are designed for distributed file system, network file system, and log/data processing.

Ultra-high I/O ECSs are designed for high-performance relational databases, NoSQL databases (such as
Ultra-high I/O
Cassandra and MongoDB), and ElasticSearch.

They are suitable for computing and storage systems for genetic engineering, games, animations, and
High-performance computing
biopharmaceuticals
GPU-accelerated ECSs provide outstanding floating-point computing capabilities. They are suitable for
GPU-accelerated
applications that require real-time, highly concurrent massive computing.
FPGA-accelerated ECSs are suitable for applications that require dense computing, high concurrency, and high
FPGA-accelerated
bandwidth, such as video processing, machine learning, genomics, and financial risk analysis.
AI1 ECSs are used for general technologies, such as machine vision, voice recognition, and natural language
AI-accelerated
processing to support smart retail, smart campus, robot cloud brain, and safe city scenarios.

15 Huawei Confidential
Purchasing an ECS - Basic Configuration (6)
ECS Flavor Naming Rules
 ECS flavors are named using the format "AB.C.D“, for example, m2.8xlarge.8.
 The format is defined as follows:
 A specifies the ECS type. For example, s indicates a general computing ECS, c a computing
ECS, and m a memory-optimized ECS.
 B specifies the type ID. For example, the 1 in s1 indicates a general computing first-generation
ECS, and the 2 in s2 indicates a general computing second-generation ECS.
 C specifies the flavor size, such as medium, large, or xlarge.
 D specifies the ratio of memory to vCPUs expressed in a digit. For example, value 4 indicates
that the ratio of memory to vCPUs is 4.

16 Huawei Confidential
Purchasing an ECS - Basic Configuration (7)
 Network Bandwidth
 ECS intranet bandwidth and PPS capabilities vary depending on ECS flavors.
 Assured intranet bandwidth: indicates the assured ECS bandwidth.
 Maximum intranet bandwidth: indicates the maximum ECS bandwidth.
 Maximum intranet PPS: indicates the maximum ECS capabilities in transmitting and receiving packets.

17 Huawei Confidential
Purchasing an ECS - Basic Configuration (8)
 Image

A public image is a standard, widely used image. It contains an OS and preinstalled


01 public applications and is available to all users. It is recommended you enable HUAWEI
Public Image CLOUD’s Host Security Service (HSS). HSS provides two-factor authentication, account
cracking prevention, and weak password detection to protect ECSs.

02 A private image is an image available only to the user who created it. It contains an
Private Image OS, preinstalled public applications, and the user's private applications. Using a private
image to create ECSs eliminates the need to configure multiple ECSs repeatedly.

03
Shared Image A shared image is a private image shared by another user.

04 A marketplace image is a third-party image that has an OS, application environment,


Marketplace Image and software preinstalled. This option is available only when Billing Mode is set to
Yearly/Monthly or Per-per-use.

18 Huawei Confidential
Purchasing an ECS - Basic Configuration (9)
 Disk Type
Disks are classified as EVS disks and DSS disks based on whether the storage resources used by the disks are
dedicated. DSS disks allow you to use dedicated storage resources.

System Disk Data Disk

If the image based on which an ECS You can create multiple data disks for
is created is not encrypted, the an ECS and configure sharing and
system disk of the ECS is not encryption for each data disk. When
encrypted. If the image is encrypted, creating an ECS, you can add up to 24
the system disk is automatically disks with custom sizes to the ECS.
encrypted.

19 Huawei Confidential
Purchasing an ECS – Network Configuration

Security Group
A security group controls ECS access within or between
Network security groups through access rules. You can define different
VPC provides a network, including subnets and access rules for a security group to protect the ECSs that are
security groups, for an ECS. If you do not create a added to the security group.
VPC, the system automatically creates a VPC for
you, including the security group and NIC.

1 2 3 4
(Optional) Extension NIC
You can add multiple extension NICs to EIP
an ECS and specify IP addresses for An Elastic IP Address (EIP) is a static public IP
them (including primary NIC). address bound to an ECS in a VPC. Using the EIP,
the ECS provides services externally.

20 Huawei Confidential
Purchasing an ECS – Advanced Configuration
Cloud Backup and Recovery
With CBR, you can backup data for
Login Mode EVS disks and ECSs, and use
 Key pair: you use a key pair for login backups to restore the EVS disks
authentication.. and ECSs.
 Password: you use a username and its
initial password for ECS authentication.
(Optional) ECS Group
An ECS group applies the anti-affinity
policy to the ECSs in it so that the
ECSs are automatically allocated to
different hosts.
ECS Name
It can be customized but must comply
with the naming rules. If multiple ECSs (Optional) Advanced Options

are purchased at a time, the system You can configure file injection, user

automatically sequences these ECSs. data injection, tag, and agency.

21 Huawei Confidential
Contents

1. Overview

2. ECS Purchase

3. ECS Lifecycle Management

4. Application Scenarios and Success Stories

22 Huawei Confidential
Managing ECSs
 Logging In to an ECS
 Reinstalling/Changing an ECS OS
 Modifying ECS Specifications
 Resetting the ECS Login Password
 Backup Up ECS Data/Creating an Image Using an ECS
 ....

23 Huawei Confidential
Logging In to a Windows ECS
 Select a login method and log in to the ECS.

24 Huawei Confidential
Logging In to a Linux ECS
 The method of logging in to an ECS varies depending on the login
authentication configured during ECS creation.

Through the management console (VNC)


with login username root.

The login username is root, and the ECS must


have an EIP bound.

The login username is root, and the ECS must


have an EIP bound.

To log in to a key-pair-authenticated ECS for


the first time, use a tool, such as PuTTY or
XShell, and the SSH key as user root. The ECS
must have an EIP bound.

25 Huawei Confidential
Reinstalling/Changing an ECS OS
 Scenarios
If the OS of an ECS fails to start, requires optimization, or cannot meet service requirements, reinstall or
change the OS.

 Procedure
Stop the ECS, click More in the Operation column, select Manage Image/Disk, and then Reinstall OS or
Change OS.

 Notes
 Only the original image of the ECS can be used to reinstall the OS.
 To use a new system image, change the OS. Changing the OS will change the

system disk of the ECS, and the original system disk will be deleted.

For more information, see Changing the OS.

26 Huawei Confidential
Modifying ECS Specifications
 Scenarios
If the specifications of an existing ECS cannot meet service requirements, modify the ECS specifications as
needed, for example, by upgrading the vCPUs and memory.

 Procedure
Switch to the list view on the Elastic Cloud Server page, locate the row containing the target ECS, click More
in the Operation column, and select Modify Specifications. Then, restart the ECS.

 Notes
 To modify the specifications of a yearly/monthly ECS, select the target specification, pay the difference in
price or claim the refund, and restart the ECS.
 There is no difference in price if you modify the specifications of a pay-per-use ECS.

27 Huawei Confidential
Resetting the ECS Login Password
 Scenarios
The ECS password is lost or has expired.

 Prerequisites
One-click password reset plugins have been installed on the ECS.

 Notes
ECSs created using a public image have one-click password reset plug-ins installed by default.

28 Huawei Confidential
Backing Up ECS Data
Procedure
 Log in to the management console.
 Click in the upper left corner and select the desired region and project.
 Choose Storage > Cloud Backup and Recovery > Cloud Disk Backup.
 Click Buy Server Backup Vault.
 After a server backup vault is created, associate ECSs with the vault for backup.
 Create a backup.

29 Huawei Confidential
Contents

1. ECS Overview

2. ECS Purchase

3. ECS Lifecycle Management

4. Application Scenarios and Success Stories

30 Huawei Confidential
Scenarios - Internet
Application Scenarios

Website R&D and testing, and small-scale databases

Recommended Type

General-computing ECSs

Recommendation Reasons

• Requirements: no special requirements on CPU performance,


memory, disk capacity, or bandwidth; strong security and
reliability; application deployment based on one or only a few
servers to minimize initial investment and maintenance costs
• Solution: general-computing ECSs, which provide a balance of
computing, memory, and network resources, are appropriate
for medium-workload applications, and meet the cloud
service needs of both enterprises and individuals

31 Huawei Confidential
Scenario - E-Commerce

Application Scenarios

Precision marketing, E-Commerce, and mobile apps

Recommended Type

Memory-optimized ECSs

Recommendation Reasons

• Requirements: large amount of memory, rapid


processing of large volumes of data, and fast
network access
• Solution: memory-optimized ECSs, which feature a
large amount of memory, ultra-high I/O EVS disks,
and appropriate bandwidths

32 Huawei Confidential
Scenario - Graphics Rendering
Applicable Scenarios

Graphics rendering and engineering drawing

Recommended ECS Type

GPU-accelerated ECSs

Recommendation Reasons

• Requirements: high-quality graphics and video; large


amount of memory, processing of large volumes of data,
and high I/O concurrency; fast network access and rapid
data processing; high GPU performance
• Solution: GPU-accelerated ECSs, which provide cost-
effective graphics acceleration, support DirectX and
OpenGL, and provide up to 1 GB of GPU memory and
4096 x 2160 resolution for processing graphics and videos

33 Huawei Confidential
Scenarios - Data Analysis

Application Scenarios

MapReduce and Hadoop

Recommended ECS

Disk-intensive ECSs

Recommendation Reasons

• Requirements: processing of large volumes of data;


high I/O performance and rapid data switching and
processing
• Solution: disk-intensive ECSs, which are suitable for
applications requiring high-performance sequential
read/write on ultra-large datasets in local storage

34 Huawei Confidential
Scenario – High-Performance Computing

Application Scenarios

Computing and storage systems for scientific computing, genetic


engineering, games, animations, and biopharmaceuticals

Recommended ECS

High-performance computing ECSs

Recommendation Reasons

Solution: high-performance computing ECSs, which meet the


computing, storage, and rendering needs of high-
performance infrastructure services and applications that
require a large number of parallel computing resources.

35 Huawei Confidential
Success Story (1)

VMALL Profile

VMALL migrated its services to HUAWEI CLOUD using


the one-stop retail solution, becoming the first all-cloud
e-commerce platform in China.

Customer Benefits

• Support for all VMALL's services, especially flash sales


• Integrated online and offline services with omni-channel
operations
• Enhanced business innovation with the mature platform
component services on HUAWEI CLOUD
• Accelerated new service rollouts by reducing development
time from months to weeks

36 Huawei Confidential
Success Story (2)

Company Profile

Company xxx partnered with HUAWEI CLOUD to build a


new marketing platform that integrates people, vehicles,
4S stores, and factories. They will further their cooperation
in Big Data, artificial intelligence (AI), precision marketing,
and other areas.

Customer Benefits

• Extensive network coverage and stable performance


• 23% less IT investment and 83% less O&M costs
• 6x faster service rollout with out-of-the-box cloud services

37 Huawei Confidential
Success Story (3)

Company Profile

Company xxx worked with HUAWEI CLOUD to integrate its


upstream and downstream into an open and win-win
ecosystem, providing end users with a one-stop solution for
customizing pan-home improvement products.

Customer Benefits

• Reliable services
• Friendly user experience with prompt responses to customer
suggestions, application-aware load balancing, flexible and
customized auto-scaling, and smooth capacity expansion.
• Strong after-sales support

38 Huawei Confidential
Quiz

1. What is used by an ECS to store data? ()


A. Auto Scaling

B. Elastic Volume Service

C. Cloud Container Engine

D. Cloud Eye

39 Huawei Confidential
Summary

 HUAWEI CLOUD ECS


 ECS concepts, functions, and application scenarios
 ECS purchase and management

40 Huawei Confidential
Recommendations

 Huawei iLearning
 https://e.huawei.com/en/talent
 HUAWEI CLOUD Help Center
 https://support.huaweicloud.com/intl/en-us/index.html

41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright© 2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Compute Cloud Services - Auto Scaling

44 Huawei Confidential
Foreword

 This chapter provides an overview of HUAWEI CLOUD Auto Scaling (AS),


including its basic functions, application scenarios, and usage.

45 Huawei Confidential
Objectives

Upon completion of this course, you will be able to:


 Understand AS concepts, functions, and application scenarios.
 Create and manage AS groups and bandwidth scaling policies.

46 Huawei Confidential
Contents

1. Overview

2. AS Parameters

3. Usage and Management

4. Related Services

47 Huawei Confidential
What Is AS?
 Auto Scaling (AS) automatically adjusts resources to keep up with changes in
demand based on pre-configured AS policies. This allows your applications to
maintain steady, predictable performance at optimal costs while also freeing
you from the cumbersome task of repeatedly, manually adjusting resources to
respond to changes.

Auto Scaling

48 Huawei Confidential
Architecture

10 Mbit/s 20 Mbit/s 10
Mbit/s

49 Huawei Confidential
Advantages

Automatic
Enhanced Cost
Resource
Management
Adjustment

Benefits

Improved
High Fault
Availability
Tolerance

50 Huawei Confidential
Automatic Resource Adjustment - Scaling ECSs on Demand
 AS adds instances and increases bandwidth for your application system when the access volume increases
and reduces extra resources from the system when the access volume drops, ensuring stable system running.
 Resources are adjusted in the following ways:

Dynamic resource Planned resource Manual resource


adjustment adjustment adjustment
Resources are adjusted if you
AS adjusts resources when a
AS adjusts resources when an manually change the expected
periodic or scheduled policy is
alarm policy is triggered. number of instances, or add
triggered.
instances to or remove instances
from an AS group.

Add AS to applications. AS automatically adjusts


the number of servers based on the actual
requirements, as shown in the following figure.

51 Huawei Confidential
Automatic Resource Adjustment - Scaling Bandwidth on
Demand
 AS adjusts bandwidth for an application system based on demand, thereby enhancing
cost management.
 You can select the following scaling policies to adjust the IP bandwidth based on site
requirements:

Alarm Policy Scheduled Policy Periodic Policy


You can set the alarm The system can automatically The system can periodically
triggering conditions such as increase, decrease, or adjust adjust the bandwidth based on
outbound traffic and bandwidth. the bandwidth to a fixed value the periodic policy, reducing the
When the system detects that at a fixed time according to workload of manually setting the
the triggering conditions are the scheduled policy. bandwidth.
met, the system automatically
adjusts the bandwidth.

52 Huawei Confidential
Automatic Resource Adjustment - Evenly Distributing
Instances by AZ
 Instances are evenly distributed in different AZs to reduce the impacts of power and network
faults on the stability of the system.

Evenly distributing instances Re-balancing instances

53 Huawei Confidential
Application Scenarios

Scenario Description

Service load changes are difficult to predict for heavy-traffic forum


Heavy-traffic forum websites. AS dynamically adjusts the number of ECSs based on
monitored ECS metrics, such as CPU Usage and Memory Usage.

E-commerce websites need more resources during large-scale


E-commerce promotions. AS automatically increase ECSs and bandwidth to
ensure that promotions go smoothly.

A live streaming website broadcasts popular programs from 14:00


Live streaming to 16:00 every day. AS increase ECSs and bandwidth during this
period to ensure a smooth viewer experience.

54 Huawei Confidential
Contents

1. Overview

2. AS Parameters

3. Usage and Management

4. Related Services

55 Huawei Confidential
Wizard-based Creation Process

1 2 3

Create an AS
Create an AS group. Create an AS policy.
configuration.

56 Huawei Confidential
AS configuration- Configuration Template
 How to select Configuration Template When Creating an AS Configuration?

Create a new specifications template

• If you have special requirements for the ECSs


used in your AS group, use a new
specifications template to create the AS
configuration. Then, you can specify the new
specifications.
Use the specifications of an existing ECS
• You can use an existing ECS to quickly create an AS
configuration. In this case, the parameter settings,
such as the vCPU, memory, image, disk, and ECS type
in the AS configuration are the same as those of the
selected ECS by default.

57 Huawei Confidential
AS group - Multi-AZ Expansion Policy
 How to select Multi-AZ Expansion Policy When Creating an AS Group?
— This parameter needs to be configured only when two or more AZs are selected.

Load-balanced Sequenced

• When a scaling actin is triggerd, the system • When expanding ECSs in an AS


preferentially distributes ECSs evenly among group, the system selects the
AZs associated with the AS group. If the system target AZ based on the order in
fails in the target AZ, it automatically selects which AZs are selected.
another AZ based on the sequenced policy.

58 Huawei Confidential
AS group - Expected Instances
 Expected Instances specifies the number of ECSs that are expected to run in an AS group.
 Minimum instances < Expected instances < Maximum instances
 You can set this parameter when creating an AS group. If this value is greater than 0, a scaling action is
performed to add the required number of ECSs after the AS group is created.
 You can change this value manually or by scaling policies (scheduled, periodic, or alarm) after the AS
group is created.

Manually adjust the expected Change the number of expected


number of instances instances by scaling policies

59 Huawei Confidential
AS group - Instance Removal Policy
 When instances are automatically removed from an AS group, the instances that are not in the currently used
AZs will be removed first.
 AS will check whether instances are evenly distributed in the currently used AZs.
 If the load between AZs is unbalanced, AS balances load between AZs when removing instances.
 If the load between AZs is balanced, AS removes instances according to the pre-configured instance removal
policy.

Oldest instance created


Oldest instance from oldest AS
configuration
AS supports the following instance
removal policies: Instance
Removal Policy
Newest instance created
Newest instance from oldest AS
configuration

60 Huawei Confidential
Health Check Method
 Health Check: A health check removes abnormal ECSs from an AS group. Then, AS adds new
ECSs to the AS group. There are two types of AS group health checks.
 ECS health check: checks ECS running status. If an ECS is stopped or deleted, it is considered
as abnormal.
 ELB health check: determines ECS running status using a load balancing listener.
 Health Check Interval: specifies the health check period for an AS group.

61 Huawei Confidential
Bandwidth Scaling Policies
 AS adjusts the EIP bandwidth based on bandwidth scaling policies.
 There are three types of bandwidth scaling policies:

Alarm: suitable for unpredictable demands.

Scheduled: suitable for fixed demands

Periodic: suitable for fixed demands.

If the service load is difficult to predict, you can use the alarm policy. The system will trigger scaling actions
based on real-time monitoring data (such as CPU usage) to dynamically adjust the number of instances in the
AS group. If the service load changes regularly, you can use a scheduled or periodic policy to adjust the
number of instances in the AS group.

62 Huawei Confidential
Cooldown Period

 Cooldown Period specifies for how long any alarm-triggered


scaling actions will be disallowed following the completion of
a previous scaling action. This cooldown period does not
apply to scheduled or periodic scaling actions.
 A cooldown prevents the AS group from triggering
unnecessary scaling actions.

63 Huawei Confidential
Contents

1. Overview

2. AS Parameters

3. Usage and Management

4. Related Services

64 Huawei Confidential
AS Management

AS Group

AS Configuration

Scaling Action

Bandwidth Scaling

AS Group and Instance Monitoring

Constraints

65 Huawei Confidential
AS Group
 An AS group consists of a collection of instances and AS policies that have
similar attributes and apply to the same application scenario. An AS group is
the basis for enabling or disabling AS policies and performing scaling actions.
 Creating an AS group
 Adding a load balancer to an AS group
 Adding/Replacing an AS configuration in an AS group
 Enabling an AS group
 Disabling an AS group
 Modifying an AS group
 Deleting an AS group

66 Huawei Confidential
AS Configuration
 An AS configuration defines the specifications of the ECSs to be added to an AS
group.
 Using an existing ECS to create an AS configuration
 Using a new specifications template to create an AS configuration
 Copying an AS configuration
 Deleting an AS configuration

67 Huawei Confidential
Scaling Action – Expanding Resources
 When service demands increase, a scaling action is triggered to have more
resources provisioned.
 There are three methods for resource expansion:
 Dynamically expanding resources
 Expanding resources as planned
 Manually expanding resources

68 Huawei Confidential
Dynamically Expanding Resources
 You can define scaling policies to have scaling actions triggered dynamically to keep up
with changes in demand.
 When a scaling policy is triggered, AS automatically changes the expected number of
instances for triggering a scaling action to scale up or down resources.

Configure alarm
ECM
M ECM
ECM
ECS ECS
rules. ECS A scaling action
is triggered.
ECS
ECS
Change the number ECM
ECS
of expected instances.

69 Huawei Confidential
Expanding Resources as Planned
 If the changes in demand happen with a foreseeable pattern, you can configure a
scheduled or periodic policy to scale resources periodically or at specified time.

9:00-18:00 00:00-7:00

ECM ECM ECM ECM


ECM ECM ECM ECS
ECS ECS ECS

Off-peak
Peak-hour

70 Huawei Confidential
Manually Expanding Resources
 Adjust resources by manually adding or removing instances to or from an AS group, or
by changing the number of expected instances.

ECM
ECS

Manually change the number


of expected instances.
ECM ECM
ECM ECS
ECS

ECM
ECS

71 Huawei Confidential
Scaling Action - Configuring an Instance Removal Policy
 AS supports the following instance removal policies:
 Oldest instances created from oldest AS configuration
 Newest instances created from the oldest AS configuration
 Oldest instances
 Newest instances

72 Huawei Confidential
Scaling Action - Viewing a Scaling Action
 On the AS group details page, click the Monitoring tab and view the scaling action logs.

73 Huawei Confidential
Scaling Action - Managing Lifecycle Hooks
 Lifecycle hooks enable you to flexibly control creation and removal of ECSs in AS groups and
manage the lifecycle of these ECSs.

Instance lifecycle statuses when no Instance lifecycle statuses when a


lifecycle hook is added to the AS group lifecycle hook is added to the AS group

74 Huawei Confidential
Scaling Action – Managing AS Policies
 An AS policy specifies a condition for triggering an AS action. The following
options are available for you to manage AS policies:
 Creating an AS policy
 Modifying an AS policy
 Deleting an AS policy
 Enabling an AS policy
 Disabling an AS policy
 Manually executing an AS policy

75 Huawei Confidential
Bandwidth Scaling
 AS allows you to adjust the purchased EIP bandwidth and shared bandwidth.
You can create a bandwidth scaling policy to automatically adjust the
bandwidth. The system supports three types of bandwidth scaling policies:
alarm, scheduled, and periodic.
 The basic information for creating a bandwidth scaling policy includes the policy
name, resource type, policy type, and trigger condition.

76 Huawei Confidential
Constraints
 AS has the following restrictions:
 Only applications that are stateless can run on scaled ECSs in an AS group.
 AS automatically releases ECSs. Therefore, the ECSs in AS groups cannot be used to save
application status information (such as sessions) and related data (such as database data and
logs). If the application status or related data must be saved, you can store the information on
separate servers.
 AS does not support capacity expansion or deduction of instance vCPUs and memory.

Category Description Default Value


AS group Maximum number of AS groups that you can create 10

AS configuration Maximum number of AS configurations that you can create 100

AS policy Maximum number of AS policies that can be added to an AS group 10


Instance Maximum number of instances that can be added to an AS group 300

Bandwidth scaling policy Maximum number of bandwidth scaling policies you can create 50

77 Huawei Confidential
Contents

1. Overview

2. Parameter Description

3. Usage and Management

4. Related Services

78 Huawei Confidential
Using AS with ELB
 Working with ELB, AS automatically increases or decreases resources based on changes in
demand while ensuring that the load of all ECSs is balanced in the AS group.
 After ELB is enabled in an AS group, AS automatically binds a load balancing listener to the newly
added ECSs. Then, ELB automatically distributes access traffic to all ECSs in the AS group through
the listener, improving system availability. If the ECSs in the AS group are running various types
of applications, you can bind multiple listeners to the AS group to listen to each of these
applications, improving service scalability.

79 Huawei Confidential
Related Services
 Elastic Cloud Server (ECS)
 Virtual Private Cloud (VPC)
 Elastic Load Balance (ELB)
 Simple Message Notification (SMN)
 Cloud Trace Service (CTS)
 Cloud Eye

80 Huawei Confidential
Quiz

1. Which of the following policies does AS support?


A. Alarm policies
B. Scheduling policies
C. Periodic policies
D. Monitoring policies

81 Huawei Confidential
Summary

 Concepts, functions, and application scenarios


 AS parameters
 Usage and management

82 Huawei Confidential
Thank you.

83 Huawei Confidential
Revision Record Do Not Print This Page

Course Code Product Product Version Course Version

Product Product Version V2.2

Author/ID Date Reviewer/ID New/Update

Chen Bin/wx917051 2020.07 Lu Qi/00379220 Update

84 Huawei Confidential
Compute Cloud Services –
Image Management Service

85 Huawei Confidential
Foreword

 This chapter describes the HUAWEI CLOUD Image Management Service


(IMS).
 IMS allows you to manage images easily. You can create ECSs or BMSs
using a private, public, or shared image. You can also create a private
image based on an existing ECS or an external image file.

86 Huawei Confidential
Objectives

After completing this course, you will:


 Understand the basic concepts, functions, and application scenarios of IMS.
 Know how to create a private image.
 Know how to manage private images.
 Understand the concepts related to Marketplace images.

87 Huawei Confidential
Contents

1. Overview

2. Creating a Private Image

3. Image Management

4. Related Services

88 Huawei Confidential
Concepts
 Image and Image Management Service (IMS)
 An image is an ECS or BMS template that contains an OS or service data and may also
contain proprietary software and application software, such as database software.
 IMS provides you with a convenient way to manage images. You can create ECSs or BMSs
using a private, public, or shared image. You can also create a private image based on an
existing ECS or an external image file.

89 Huawei Confidential
Image types
 Image types
 Images are either public, private, or shared.
 Public images are provided by the cloud
platform, private images are created by
users, and shared images are private
images that other users shared with you.
 The figure on the right illustrates the
relationships among different types of
images.

90 Huawei Confidential
Private Image Overview
 A private image can be a system disk, data disk, or full-ECS image.

System disk image: contains an OS and preinstalled application software required for
running services. You can use a system disk image to create ECSs and migrate your services
to them.

Data disk image: contains only service data. You can use a data disk image to create EVS
disks and migrate your service data to the disks.

Full-ECS image: contains an OS, pre-installed software, and service data.

91 Huawei Confidential
Advantages

92 Huawei Confidential
Functions
 With IMS, you can:
 Use public images that contain a common OS.
 Create a private image from an ECS or external image file.
 Manage public images.
 Manage private images.
 Create ECSs from an image.

93 Huawei Confidential
Application Scenarios

Migrating servers to the Deploying a specified


cloud or between clouds software environment

Application
Scenarios

Deploying a specified Backing up server running


software environment environments

94 Huawei Confidential
Contents

1. Overview

2. Creating a Private Image

3. Image Management

4. Related Services

95 Huawei Confidential
Creating a Private Image
 Creating a system disk image from a Windows ECS
 Creating a system disk image from a Linux ECS
 Creating a full-ECS image from an ECS Source: ECS

 Creating a full-ECS image from a CSBS backup


 Creating a data disk image from an ECS data disk
 Creating a Windows system disk image from an external image file
 Creating a Linux system disk image from an external image file Source: external
image file
 Creating a data disk image from an external image file

96 Huawei Confidential
Creating a System Disk Image from a Windows ECS

1 2 3

Set parameters for


Configure the Install Cloudbase-Init
creating a Windows
Windows ECS. on the ECS.
private image.

Submit the task.

97 Huawei Confidential
Configuring DHCP for the Windows ECS
 If the Windows ECS that will be used to create a private image is using a static IP
address, configure the ECS NIC to obtain an IP address using DHCP.

98 Huawei Confidential
Installing Cloudbase-Init
 To ensure that ECSs created from a private image are configurable, you are advised to
install Cloudbase-Init on the ECS before using it to create a private image.

99 Huawei Confidential
Installing Drivers (Windows)
 For an ECS to run normally, a Guest OS driver has been installed. For Xen-based ECSs,
the Guest OS driver is a PV driver. For KVM-based ECSs, it is UVP VMTools. To support
both Xen and KVM, the image must contain both the PV driver and UVP VMTools.

100 Huawei Confidential


Creating a System Disk Image
 On the Image Management Service page, click Create Image.
 In the Image Type and Source area, select System disk image for Type.
 By default, ECS is selected for Source. Select an ECS from the drop-down list.

101 Huawei Confidential


Creating a System Disk Image from a Linux ECS

1 2 3

Check and configure Check and deleting Install Cloud-Init on


NIC attributes. network rule files. the ECS.

Set the parameter for Check and detach


Submit the task. creating a system disk EVS data disks from
image. the ECS.
6 5 4

102 Huawei Confidential


Checking and Configuring NIC Attributes
 If the Linux ECS that will be used to create a private image is using a static IP
address, configure the ECS NIC to obtain an IP address using DHCP.
 When registering an external image file as a private image, configure DHCP on
the VM where the external image file is located. You are advised to configure
DHCP on the VM before exporting the image file.

103 Huawei Confidential


Checking and Deleting Network Rule Files
 When creating a private image based on a Linux ECS, you must first delete any
existing network rule files.
 Do not restart the ECS after deleting the network rule files, or the deleted rule
files will be recreated.
 When registering an external image file as a private image, delete any files in
the network rule directory of the VM where the external image file is located.
You are advised to delete the files from the VM before exporting the image file.

104 Huawei Confidential


Installing Cloud-Init
 To ensure that ECSs created from a private image are configurable, you are
advised to install Cloud-Init on the ECS that is used to create the image. If you
do not install it, the new ECSs cannot be configured and you can only log in to
them with the existing password for that image.
 Check whether Cloud-Init is installed.
 Install Cloud-Init.
 Configure the new ECSs.
 Check whether the configurations take effect.

105 Huawei Confidential


Checking and Detaching EVS Data Disks from an ECS
 You must detach any EVS data disks attached to an ECS before using the ECS to
create a private image. If you do not detach the data disks, any new ECSs
created using the private image may be unusable.

106 Huawei Confidential


Creating a Linux System Disk Image
 On the Image Management Service page, click Create Image.
 In the Image Type and Source area, select System disk image for Type.
 By default, ECS is selected for Source. Select an ECS from the drop-down list.

107 Huawei Confidential


Creating a Windows System Disk Image from an External
Image File
 If the external image has been initialized, perform the following operations:

Upload an external Register the file as an


image file. image.

 If the external image has not been initialized, perform the following operations:

Create a Windows
Upload an external Register the file as an
private image from a
image file. image.
configured ECS.

108 Huawei Confidential


Uploading and Registering an External Image File
 Before registering an external image file as a private image, upload the image
file to an OBS bucket.
 Use OBS Browser to upload the external image file.
 Only unencrypted external image files or those encrypted using SSE-KMS can be
uploaded to an OBS bucket.
 When uploading an image file, select an OBS bucket with standard storage.
 If the external image file has been initialized, register the image file as a norma
l private image. If it has not been initialized, register it as an uninitialized privat
e image.

109 Huawei Confidential


Creating a Linux System Disk Image from an External
Image File
 If the external image has been initialized, perform the following operations:

Upload an external Register the file as an


image file. image.

 If the external image has not been initialized, perform the following operations:

Create a Linux
Upload an external Register the file as an
private image from a
image file. image.
configured ECS.

110 Huawei Confidential


Creating a Data Disk Image from an ECS Data Disk
 When creating a data disk image from an ECS data disk, ensure that the ECS
has a system disk and one or more data disks.
 One data disk image can only be used for one data disk.
 A data disk image contains service data only. You can create a data disk image
from an ECS data disk.
 Then, you can use the data disk image to create EVS disks and migrate your
service data to the disks.

111 Huawei Confidential


Creating a Data Disk Image from an External Image File
 The OS type must be specified for the data disk image, and it can either
Windows or Linux.
 A data disk can provide 40 GB to 2048 GB of storage.
 When uploading an image file, select an OBS bucket with standard storage.
 One data disk image can only be used for one data disk.

112 Huawei Confidential


Creating a Full-ECS Image from an ECS or a CSBS Backup
 You can use an ECS with data disks to create a full-ECS image. The image
contains your service data and can be used to quickly create ECSs with service
data.
 You can use a CSBS backup to create a full-ECS image.
 When creating a full-ECS image using a CSBS backup, you need to apply for the
permission to access CSBS.
 If a full-ECS image is deleted, the associated CSBS backup will not also be deleted. To
delete the associated backup, go to the CSBS console.

113 Huawei Confidential


Contents

1. Overview

2. Creating a Private Image

3. Image Management

4. Related Services

114 Huawei Confidential


Modifying Image Information
 Only private images that are in the Normal state can be modified. You can
modify the image name, description, minimum and maximum memory, and NIC
multi-queue.

115 Huawei Confidential


Creating ECSs from an Image
 You can create ECSs from a public, private, shared, or Marketplace image.
 The differences between the ECSs created from a public image and a private image are as
follows:
 If you use a public image to create an ECS, the ECS contains only the OS and pre-installed public
applications. If any other applications are needed, you will need to install them yourself.
 If you use a private image to create an ECS, the ECS can include your own, specifically selected
applications, pre-installed.

 Creating ECSs from a Marketplace image


 On the ECS creation page, select Marketplace image for Image and click Select Image. Search for the
required Marketplace image, select the image, and click OK.

116 Huawei Confidential


Deleting an Image
 You can delete images that you no longer need.

117 Huawei Confidential


Sharing an Image
 You can share your private images with others.

118 Huawei Confidential


Encrypting an Image
 You can create an encrypted image to securely store data.

119 Huawei Confidential


Image Replication Within a Region
 You can create an unencrypted version of an encrypted image, or the other way
around.

120 Huawei Confidential


Replicating Images Across Regions
 You can replicate an image from one region to another and use the replicated
image to create identical ECSs. This allows you to more quickly migrate services
across regions.

121 Huawei Confidential


Tagging an Image
 You can use tags to classify images for easy management. You can add, modify,
or delete an image tag.

122 Huawei Confidential


Exporting an Image
 If you need to export private images to specified storage devices or use private
images on other platforms, you can use the image export function.
 You can export private images to OBS buckets in a specified format and then
download the images from the buckets to specified storage devices.
 Images exported in different formats may vary in size. You will be charged for
the OBS storage space occupied by exported images.

123 Huawei Confidential


Exporting Image Information
 You can export information about public images or your private images in the form of a
CSV file. This file contains detailed information about each image, such as the image
name, OS, image type, image creation time, and disk capacity.

124 Huawei Confidential


Contents

1. Overview

2. Creating a Private Image

3. Image Management

4. Related Services

125 Huawei Confidential


Related Services

126 Huawei Confidential


Quiz

1. Which of the following image types are supported by IMS?


A. Public image

B. Private image

C. Secret image

D. Shared image

127 Huawei Confidential


Summary

 HUAWEI CLOUD Image Management Service (IMS)


 Concepts and Functions of IMS
 Image Creation and Management

128 Huawei Confidential


Recommendations

 Huawei iLearning
 https://e.huawei.com/en/talent
 Huawei Knowledge Base
 https://support.huawei.com/enterprise/en/knowledge?lang=en
 IMS Help Center
 https://support.huaweicloud.com/intl/en-us/ims/index.html

129 Huawei Confidential


Thank you.

130 Huawei Confidential


Revision Record Do Not Print This Page

Course Code Product Product Version Course Version

IMS Product Version V2.2

Author/ID Date Reviewer/ID New/Update

Chen Bin/wx917051 2020.7 Lu Qi/00379220 New

131 Huawei Confidential


Compute Cloud Services - Bare Metal Server

132 Huawei Confidential


Foreword

 This chapter describes Bare Metal Server (BMS), a HUAWEI CLOUD service.

133 Huawei Confidential


Objectives

After completing this course, you will:


 Understand the basic concepts, features, advantages, and application scenarios of BMS.
 Know about the resources required by BMS.
 Know how to create a BMS.
 Understand the dependency between BMS and other cloud services.

134 Huawei Confidential


Contents

1. Overview

2. BMS Resources

3. BMS Creation

4. Related Services

135 Huawei Confidential


What Is BMS?
 Bare Metal Server (BMS) features both the scalability of VMs and high performance of
physical servers. It provides dedicated servers on the cloud, offering the computing
performance and data security required by core databases, critical applications, high-
performance computing (HPC), and Big Data. Tenants can apply for and use BMSs on
demand.

Enterprise's dedicated cloud server

136 Huawei Confidential


BMS, ECS, and Physical Server

BMS ECS Physical Server


Resource Exclusive Shared Exclusive
Critical applications
Application or services that General-purpose and
Traditional services
Scenarios require high specific services
performance
Provisioning Flexible Flexible Inflexible
Automatic Automatic
provisioning, provisioning,
automatic O&M, VPC automatic O&M, VPC
Advanced features Traditional features
interconnection, and interconnection, and
interconnection with interconnection with
shared storage shared storage

137 Huawei Confidential


BMS Configurations

Specifications

Storage Security Image

Network

138 Huawei Confidential


BMS Highlights

• Secure and reliable


running
• High performance
AnyStack on BMS

Customer
benefits
• High throughput
• Hybrid • Low latency
deployment
• Flexible
networking

139 Huawei Confidential


BMS Application Scenarios

Applicable
Scenario
Core databases High-performance High security Mobile apps
computing

• Enterprise's
development and • Finance and
• Supercomputing
testing securities
centers • Development,
environment • Governments and
Example • Biopharmacy testing, launch,
• Database enterprises
• Genetic and operations of
applications • Insurance
engineering mobile games
• Typical Oracle companies
database systems

140 Huawei Confidential


Contents

1. Overview

2. BMS Resources

3. BMS Creation

4. Related Services

141 Huawei Confidential


BMS Types
 HUAWEI CLOUD provides a wide range of BMS flavors. The physical resource
pool containing Huawei-developed high-performance physical servers work with
exclusive optimization algorithms to provide a reliable hardware environment.
You can choose BMS flavors that best suit your needs.
 General-purpose BMS  Memory-optimized BMS
 Disk-intensive BMS  I/O-optimized BMS
 High-performance computing BMS  Flagship BMS
 GPU-accelerated BMS  Kunpeng BMS

142 Huawei Confidential


BMS Lifecycle
 The following figure shows the states in a BMS lifecycle.

143 Huawei Confidential


BMS Image
 An image is a template of the BMS running environment. It contains an OS and
runtime environment, and pre-installed applications. An image file is a copy of
all data in the system disk.

BMS IMS

144 Huawei Confidential


Using BMS Images

 Batch deploying software  Backing up server running


environments environments
 Use a BMS with an OS,  Create an image from a
partitions, and software to BMS to back up the BMS.
create a private image, and If the software of the BMS
then use the image to create becomes faulty, you can
BMSs in a batch. The created use the image to restore
BMSs will have the same the BMS.
running environment as the
source BMS.

145 Huawei Confidential


EVS Disk Types
 EVS disks can be attached to a BMS. Therefore, BMSs are not subject to the
capacity limit of local disks faced by traditional physical servers. In addition,
shared EVS disks are supported. Multiple BMSs can access, read data from, and
write data to a shared disk simultaneously, allowing you to deploy a core
system in a cluster.
 BMSs support the following types of EVS disks for storing data:
 Common I/O
 High I/O
 Ultra-high I/O

146 Huawei Confidential


Network Types
 BMS provides four types of networks: VPC, high-speed network, user-defined
VLAN, and InfiniBand network. They are all isolated from each other.

147 Huawei Confidential


VPC
 A VPC is a logically isolated, configurable, and manageable virtual network
created for BMSs. It improves the security of resources in the cloud system and
simplifies network deployment.
 You can configure security groups, VPNs, subnets, and bandwidth in a VPC.
 With a VPC, you can easily manage and configure private networks and change
network configurations flexibly and securely.
 You can also customize access rules to control BMS access within a security
group and across security groups to enhance BMS security.

148 Huawei Confidential


High-Speed Network
 A high-speed network is a private network between BMSs. It provides high bandwidth
for connecting BMSs in the same AZ. If you want to deploy services requiring high
throughput and low latency, you can create high-speed networks. Currently, the BMS
service supports high-speed networks with a maximum bandwidth of 10 Gbit/s.
 High-speed networks and VPCs can share a physical network. A high-speed network has
only east-west traffic and supports communication at layer 2. It does not support layer
3 routing.

149 Huawei Confidential


Enhanced High-Speed Network
 An enhanced high-speed network is a high-quality, high-speed, and low-latency internal
network that allows BMSs to communicate with each other.

150 Huawei Confidential


User-defined VLAN
 You can use the 10GE NICs that are not used by the system to configure a user-
defined VLAN. The QinQ technology is used to isolate networks and provide
additional physical planes and bandwidths.
 You can allocate VLAN subnets to isolate traffic in various scenarios, including
scenarios involving SAP HANA and VMware. User-defined VLAN NICs are in
pairs. You can configure NIC bonding to achieve high availability. User-defined
VLANs in different AZs cannot communicate with each other.

151 Huawei Confidential


InfiniBand Network
 An InfiniBand network features low latency and high bandwidth, and is
applicable to various high performance computing (HPC) scenarios.
 An InfiniBand network supports two communication modes, RDMA and IPoIB.
 To create an InfiniBand network, you must select a flavor that supports the
InfiniBand network when you create a BMS. After an InfiniBand network is
provisioned, BMSs can communicate with each other in RDMA or IPoIB mode.
In the IPoIB communication mode, you need to configure IP addresses on the
InfiniBand network port. You can use static IP addresses or IP addresses
dynamically assigned by DHCP.

152 Huawei Confidential


Billing
 Billable items include BMS, EVS (optional), and EIP (optional).
 Pricing for a BMS is based on the specifications you choose, including CPU, memory, local
disks, and extended configurations.
 (Optional) EVS disks created during BMS creation are billed in the same manner as the BMS.
EVS disks created independently are billed either on a pay-per-use or yearly/monthly
subscription basis.
 (Optional) You can bind an EIP to a BMS and pay for the EIP by bandwidth or traffic.

 BMSs can only be billed on a yearly/monthly basis and cannot be billed on a


pay-per-use basis. You can specify the required duration as 1 year and get two
months free. If you intend to use BMSs for a long term, it is more cost-effective
to specify the required duration by year.
153 Huawei Confidential
Contents

1. Overview

2. BMS Resources

3. BMS Creation

4. Related Services

154 Huawei Confidential


Creating a BMS
 Creating a General-Purpose BMS
 Creating a BMS Supporting Quick Provisioning
 Creating a Dedicated BMS
 Creating a BMS from a Private Image

155 Huawei Confidential


Procedure for Creating a BMS

1 2 3

Configure basic Configure the Configure


information. network. advanced settings.

Confirm and
submit the
configurations.
4

156 Huawei Confidential


Configuring Basic Information
1. Log in to the management console.

2. Under Computing, click Bare Metal Server. The BMS console is displayed.

3. Click Buy BMS in the upper right corner of the page. The page for you to purchase a BMS is
displayed.

4. In the Current Configuration area on the right pane, confirm the billing mode. (Currently, only the
Yearly/Monthly billing mode is supported.) Then, set Region, AZ, Flavor, Image, and Disk.
 Yearly/Monthly: a prepaid billing mode. The BMS will be billed based on the required duration
you specify.
 Flavor configurations, such as the CPU, memory, and local disks, cannot be changed.
 Some flavors support quick BMS provisioning. If you select a flavor of this type, parameter System
Disk is displayed under Disk. The OS of this type of BMS is installed on an EVS disk.

157 Huawei Confidential


Configuring the Network
 Configure VPC, NIC, High-Speed NIC (optional), Enhanced High-Speed NIC (optional),
Security Group, and EIP.
 When you use the VPC service for the first time, the system automatically creates a VPC for you,
including the security group and NIC. The default subnet segment is 192.168.1.0/24 and the
subnet gateway is 192.168.1.1. Dynamic Host Configuration Protocol (DHCP) is enabled for the
subnet.
 You can create security groups and define access control rules to control BMS access within a
security group or between security groups. The rules you define for a security group apply to all
BMSs added to the security group.
 When creating a BMS, you can select only one security group. After a BMS is created, you can
associate it with multiple security groups.

158 Huawei Confidential


Configuring Advanced Settings
 Set BMS Name, Login Mode, and Advanced Settings.
 You can select Key pair or Password for Login Mode. If you use a Linux BMS, it is recommended
that you select Key pair. You can create a key pair and download the private key for remote login
authentication. To ensure BMS security, you can only download a private key once. Keep your
downloaded private keys safely. You can also import the public keys of your existing key pairs to
the Key Pair Service on HUAWEI CLOUD, and then use the corresponding private keys for remote
login authentication.

159 Huawei Confidential


Creating a BMS Supporting Quick Provisioning
When you create a BMS, set the following parameters:
 Flavor: Select physical.s4.medium, physical.s4.large, physical.s4.xlarge,
physical.s4.2xlarge, or physical.s4.3xlarge.
 Image: Select a public image that supports quick provisioning.
 Disk: Set the system disk type and size.
 Auto Backup: For data security purposes, you are advised to enable auto backup.

Select Enable auto backup and configure Backup Policy.

160 Huawei Confidential


Creating a Dedicated BMS
 Resources in a DeC are physically isolated from those in public resource pools. If your
services have high security compliance requirements, you can create BMSs in a DeC.
 You can create a dedicated BMS in either of the following ways:
 Create the BMS on the DeC console.
 Create the BMS on the Cloud Server Console.

 Before creating a BMS in a DeC, you must apply for a dedicated BMS resource pool.

161 Huawei Confidential


Creating a BMS from a Private Image
 If you want to create a BMS that has the same OS and applications as an existing BMS,
you can create a private image using the existing BMS and then use the image to
create a BMS.
 When you create a BMS, set the following parameters:
 Region: Select the region where the private image is located.
 Image: Select Private image or Shared image and select the required image from the drop-
down list.
 Disk: If the selected flavor supports quick provisioning, it is recommended that you to increase
System Disk by 2 GB or higher.

162 Huawei Confidential


Contents

1. Overview

2. BMS Resources

3. BMS Creation

4. Related Services

163 Huawei Confidential


Service Dependency

164 Huawei Confidential


Quiz

1. Bare Metal Server (BMS) is a computing service that features both the scalability
of VMs and high performance of physical servers. ( )
A. Yes

B. No

2. Which of the following are the network types of BMS? ( )


A. VPC

B. InfiniBand network

C. User-defined VLAN

D. High-speed network

165 Huawei Confidential


Summary

 HUAWEI CLOUD computing service Bare Metal Server (BMS)


 Concepts, features, advantages, and application scenarios of BMS
 Resources related to BMS
 Creating a BMS
 Dependency between BMS and other cloud services

166 Huawei Confidential


Recommendations

 Huawei iLearning
 https://e.huawei.com/en/talent
 BMS Help Center
 https://support.huaweicloud.com/intl/en-us/bms/index.html
 HUAWEI CLOUD
 https://intl.huaweicloud.com

167 Huawei Confidential


Thank you.

168 Huawei Confidential


Revision Record Do Not Print This Page

Course Code Product Product Version Course Version

BMS Product version V2.2

Author/ID Date Reviewer/ID New/Update

Chen Bin/wx917051 2020.7 Lu Qi/00379220 New

169 Huawei Confidential


Compute Cloud Services - Container

170 Huawei Confidential


Foreword

 Containers play an important role in cloud computing. On HUAWEI


CLOUD, there are many container-related services. This course will
introduce container basics, development, technical architecture, and routine
operations.

171 Huawei Confidential


Objectives

Upon completion of this course, you will be able to:


 Understand the concepts, development, architecture, and application scenarios of
container technologies.
 Understand the differences between containers and VMs.
 Be familiar with the operations related to containers.

172 Huawei Confidential


Contents

1. Container Technology Development

2. Container Technology Basics

3. Basic Operations on Containers

173 Huawei Confidential


Pain Points of Application Cloudification
 Cloud computing brings revolutionary changes to the ICT system and convenience to various
industries.

 However, cloud computing also brings new challenges: how to migrate services to the cloud?
 Solution 1: Re-deploy the applications in the cloud manually or using scripts.
 Solution 2: Pack the system images of the locally deployed applications upload them to the cloud through
P2V or V2V migration.

174 Huawei Confidential


Introduction to the Cloud Foundry Project
 Target
 Like other open source PaaS projects, Cloud Foundry helps users migrate large-
scale applications to the cloud. Cloud Foundry provides the application hosting
capability. Its core is a set of application packaging and distribution
mechanisms.
 Implementation
 Automatically uploading and running application packages: O&M personnel
deploy a Cloud Foundry project on a local physical machine or VM.
 Providing an isolated running environment for applications: Different
applications from different users may run on the same VM. Cloud Foundry calls
namespaces and cgroups to create isolated running environments (sandboxes)
for each application so that applications do not interfere with each other.

175 Huawei Confidential


What Is a Container?
 Container is a lightweight virtualization technology based on operating system (OS)
virtualization. This technology allows user space in an OS to be divided into multiple
independent units that run in the kernel without affecting each other. Such an
independent unit is called a container.

176 Huawei Confidential


Introduction to Docker
 In 2013, dotCloud made the Docker project open source.
 Docker project:
 Functions as a part of the Moby open source project developed on GitHub.
 Licensed under the open source Apache 2.0 license.
 Compiled using the Go language.
 Docker is an open source engine that can easily create lightweight, portable,
and self-sufficient containers for any application.

 Docker has two editions:


 Docker CE (community edition)
 Docker EE (enterprise edition)

177 Huawei Confidential


Docker Innovations
 Docker images:
 An application and its dependencies (including all files and directories of the complete OS) can be packaged
into an image.
 A container image contains all dependencies required for application running. Users only need to run the
image in an isolated sandbox without any modification or configuration.
 Images focus on packaging applications and their runtimes in a unified format. This ensures high consistency
between the local environment and the cloud environment.

178 Huawei Confidential


Differences Between Containers and VMs (1)

Container VM

Application A Application B Application C Application A Application B Application C

Binary Binary Binary Binary Binary Binary


file/library file/library file/library file/library file/library file/library

Guest host OS Guest host OS Guest host OS


Docker

Host OS Hypervisor

Infrastructure Infrastructure

179 Huawei Confidential


Differences Between Containers and VMs (2)

Item VM Container

Size

Startup speed

Integration efficiency

180 Huawei Confidential


What Is Kubernetes?

Container Container Container Container

181 Huawei Confidential


Kubernetes Architecture
 A basic Kubernetes cluster consists of one master node and multiple worker nodes.
Each node can be either a physical machine (PM) or a virtual machine (VM).

Node Node

Master

Node Node

182 Huawei Confidential


CNCF
 Cloud Native Computing Foundation (CNCF)
 Committed to the popularization and sustainable development of cloud native technologies

 Star CNCF projects


 Kubernetes
 Prometheus
 Fluentd
 CNI
 gPRC

183 Huawei Confidential


Contents

1. Container Technology Development

2. Container Technology Basics

3. Basic Operations on Containers

184 Huawei Confidential


OCI: Open Standards for Containers
 OCI: Open Container Initiative

Runtime spec

OCI standards
Image format spec

185 Huawei Confidential


Runtime
 A runtime works closely with the operating system kernel to provide a running
environment for containers.
 runC is a container runtime tool released by Docker in 2015 and complies with
the OCI standards.
 runC has evolved from Libcontainer.
 Other runtimes in the industry include Linux Containers (LXC) and CoreOS rkt.

186 Huawei Confidential


Introduction to Docker Engine

187 Huawei Confidential


Docker Concepts
 Docker image
 A Docker image is a read-only template. Images can be used to create Docker containers.
Docker provides a simple mechanism to create images or update existing images. Users can
even download an image created by other users.

 Docker container
 Docker uses containers to run applications. A container is a runnable instance created from an
image. It can be created, started, stopped, and deleted. Each container is isolated and secure.

 Docker repository
 A repository stores image files. An image registry contains multiple repositories, each
repository stores multiple images, and each image has a unique tag.

188 Huawei Confidential


Docker Architecture

Host Registry

Repository 1
Docker daemon
Image 1
Docker client
Container 1 Image 1 Image 3

Container 2a Image 2
Repository 2
Container 2b
Image 2

Image 4

189 Huawei Confidential


Checking the Docker Service Status
 Check the status of Docker Engine.

190 Huawei Confidential


Contents

1. Container Technology Development

2. Container Technology Basics

3. Basic Operations on Containers

191 Huawei Confidential


Running a Container (1)
Run the docker run command to run a container.
 The -d parameter can be used to run containers in the background. The -p parameter maps
port 8080 of the host machine to port 80 of the container.

[root@localhost ~]# docker run -d -p 8080:80 httpd


Unable to find image 'httpd:latest' locally
latest: Pulling from library/httpd
f5d23c7fed46: Pull complete
b083c5fd185b: Pull complete
bf5100a89e78: Pull complete
98f47fcaa52f: Pull complete
622a9dd8cfed: Pull complete
Digest: sha256:c18b9ace5dd1864674064dea03f7ff4e378e43b9ec57827853d0bd93953772df
Status: Downloaded newer image for httpd:latest
e3b8da676cc99af74e22bfd2dca833465095727e08253aece16bde650a524a1b

Container ID

192 Huawei Confidential


Running a Container (2)
 Run the docker images command to view the container image.
[root@localhost ~]# docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
httpd latest ee39f68eb241 2 weeks ago 154MB

 Run the docker ps command to query the container running status.


[root@localhost ~]# docker ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
e3b8da676cc9 httpd "httpd-foreground" 18 hours ago Up 18 hours 0.0.0.0:8080->80/tcp hungry_mcclintock

193 Huawei Confidential


Container Lifecycle Management (1)
 Run the docker stop command to stop a container.

[root@localhost ~]# docker stop e3b8da676cc9


e3b8da676cc9

 Run the docker ps -a command to query the container status. In this example, the
container status is Exited.
[root@localhost ~]# docker ps -a
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
e3b8da676cc9 httpd "httpd-foreground" 23 hours ago Exited (137) 15 seconds ago hungry_mcclintock

194 Huawei Confidential


Container Lifecycle Management (2)
 Run the docker start command to start a container.

[root@localhost ~]# docker start hungry_mcclintock


hungry_mcclintock

 Run the docker ps -a command to query the container. In this example, the status is Up.

[root@localhost ~]# docker ps -a


CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
e3b8da676cc9 httpd "httpd-foreground" 23 hours ago Up 14 seconds 0.0.0.0:8080->80/tcp hungry_mcclintock

195 Huawei Confidential


Methods of Accessing a Container
To access a container for debugging, use either of the following commands:
 docker attach
 Run the docker attach command to directly access the command terminal of a started container
without starting new processes.

 Usage: docker attach [OPTIONS] CONTAINER


 docker exec
 Run the docker exec command to open a new terminal in a container.

 Usage: docker exec [OPTIONS] CONTAINER COMMAND [ARG...]

196 Huawei Confidential


Accessing a Container
Run the docker attach command to access a container.

[root@localhost ~]# docker run -d centos /bin/bash -c "while true; do sleep 1; echo
Huawei; done"
b589b73d4bc382b77b39d9e751b5bd83c6e3bee884a23c71f1c0a0cc5fb92142
 [root@localhost
~]# ~]# docker attach b589b73d4bc3
Huawei
Huawei
Huawei

197 Huawei Confidential


Quiz

1. Docker is an open source engine that can easily create lightweight, portable, and
self-sufficient containers for any application. ( )
A. Yes

B. No

2. Which of the following states can a Docker container be in? ( )


A. Created

B. Exited

C. Running

D. Paused

198 Huawei Confidential


Summary

 Concepts, development, architecture, and application scenarios of


containers
 Differences between containers and VMs
 Docker architecture and container lifecycle management
 Basic operations on containers

199 Huawei Confidential


Recommendations
 Huawei iLearning
 https://e.huawei.com/en/talent/#/
 Docker official website
 https://www.docker.com/
 Docker project
 https://github.com/docker

 Docker Community Forums


 https://forums.docker.com/

200 Huawei Confidential


Thank you.

201 Huawei Confidential


Revision Record Do Not Print This Page

Course Code Product Product Version Course Version


HUAWEI CLOUD
HUAWEI CLOUD products V2.2
products

Author/ID Date Reviewer/ID New/Update

Chen Bin/wx917051 2020.07 Lu Qi/00379220 New

202 Huawei Confidential

You might also like