Documents Product Categories ZStack Cloud Enterprise-x86-perpetual

ZStack Cloud Enterprise-x86-perpetual

Sep 27, 2024
Backup Management > CDP Service > CDP Dashboard. Then, the CDP Dashboard page is displayed. 104 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles Figure 2-35: CDP Dashboard The cards are described as follows: • CDP Task: ▬ This card displays the number and status of CDP tasks in the Cloud. ▬ Task status includes running, stopped, and other (starting, running, unknown, and failed). ▬ You can click the number on the card to enter the CDP task page to view more information. • Recovery Task: ▬ This card displays the number and status of recovery tasks in the Cloud. ▬ Task status includes succeeded, failed, and other (waiting, paused, recovering, canceling, and canceled). ▬ You can click the number on the card to enter the recovery task page to view more information. • Total CPU Utilization of All Backup Servers: This card displays the CPU utilization of all backup servers in the Cloud. • Total Memory Utilization of All Backup Servers: This card displays the memory utilization of all backup servers in the Cloud. • Top 5 Backup Server Usage: ▬ This card displays the used capacity and total size of each backup server. ▬ The usage of each backup server is displayed in descending order. Issue: V5.1.8 105Technical Whitepaper / 2 Product Profiles ▬ You can click the backup server name on the card to enter the details page of the backup server. • Total Disk I/O of All Backup Servers: This page displays the disk I/O of all backup servers in the Cloud. • Unread Alarm Statistics in Recent Seven Days: ▬ This card displays unread alarm statistics in recent 7 days, including the emergency level, number of alarms, and alarm name. ▬ You can click the More icon in the upper right corner to enter the alarm message page. ▬ You can view and handle the alarm messages and copy the alarm details. ▬ Alarm messages that you already read are not displayed here again. 2.2.2.5.2.2 CDP Task You can create a CDP task to continuously back up your VM data to a specified backup server to achieve continuous data protection and recovery. • Before you can use the CDP service, add a local backup server to the Cloud first. • You can create CDP tasks to continuously back up your VM data to a specified backup server to achieve continuous data protection. • You can create CDP tasks in bulk for multiple VM instances. The Cloud support only one VM instance per CDP task. • You can perform entire VM backup without installing an agent for your VM instances. • The Cloud performs a full backup on the VM instances immediately after you create CDP tasks. • The Cloud provides second-level fine-grained continuous data protection for VM instances. • The Cloud recommends the desired capacity required by a CDP task based on an algorithm when you create a CDP task for the first time, helping you to plan the backup space reasonably . • The CDP service applies to VM instances in different primary storage scenarios, including local , NFS, SharedBlock, and Ceph primary storages. • You can manage the lifecycle of CDP tasks, such as creating, enabling, disabling, and deleting CDP tasks. • You can modify the protection policy of a CDP task, including the recovery point interval, regular backup frequency, recovery point retention policy, and the backup rate when the CDP task is disabled. • You can modify task running policy to adjust the desired size and RPO policy for the CDP task. 106 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles • You can view the creation progress of a CDP task. • The Cloud provides CDP task resource alarms and event alarms and allows you to create these alarms. 2.2.2.5.2.3 CDP Data The backup data generated from continuous data protection on VM instances is stored in local backup servers. You can manage CDP on the CDP Data page • You can back up CDP data on a local backup server. • The Cloud displays the CDP status in charts and tables and allows you to view the details by specifying a time span. • The Cloud displays hourly data changes so that you plan the backup capacity more reasonably . • The Cloud provides a recovery point calendar, which identifies the dates with recovery points with colors and helps you to locate recovery points quickly. • You can lock recovery points. After a recovery point is locked, data of the recovery point will not be automatically cleared or deleted. • The Cloud provides recovery point list and locked recovery point list and allows you to view the details by specifying a time span. • The Cloud supports fast recovery based on selected recovery points (including locked recovery points). • The Cloud supports instant recovery with a minimum RTO in seconds. • The Cloud supports entire restoration and file-level restoration. ▬ Entire restoration allows you to restore data to the original VM instance or to a newly- created VM instance. ■ Restore data to a newly-created VM instance: ■ Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. ■ The newly created VM instance will quickly start up for business recovery. ■ Restore to the original VM instance: ■ Allows you create new volumes or overwrite current volumes. ■ Create new volumes: This method allows you to retain and attach volumes before recovery to the VM instance to ensure data security. Issue: V5.1.8 107Technical Whitepaper / 2 Product Profiles ■ Overwrite current volumes: This method will overwrite the original data in the VM instance and keep the snapshots in the current volumes. ■ During data restoration, the original VM instance will quickly start up for business recovery. ▬ File-level restoration allows you to retrieve files without restoring the system. Both Windows and Linux file system formats are supported. Supported file format include picture, text, and PDF. • Allows you to clear CDP data, which will delete all the CDP data of the VM instance, including the locked recovery points. The Cloud performs full backup for the VM instance the next time the CDP task is enabled. 2.2.2.5.2.4 Recovery Task A recovery task helps you quickly restore data by specifying a CDP task and recovery point, and allows you to view the recovery progress and logs in a more friendly way. • The Cloud provides a list of recovery tasks, allowing you to view the recovery records and progress in a more friendly way. • The CDP service applies to VM instances in different primary storage scenarios, including local , NFS, SharedBlock, and Ceph primary storages. • The Cloud supports instant recovery with a minimum RTO in seconds. • The Cloud allows you to restore data to the original VM instance or to a newly-created VM instance. ▬ Restore data to a newly-created VM instance: ■ Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. ■ The newly created VM instance will quickly start up for business recovery. ▬ Restore to the original VM instance: ■ Allows you create new volumes or overwrite current volumes. ■ Create new volumes: This method allows you to retain and attach volumes before recovery to the VM instance to ensure data security. ■ Overwrite current volumes: This method will overwrite the original data in the VM instance and keep the snapshots in the current volumes. 108 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles ■ During data restoration, the original VM instance will quickly start up for business recovery. • You can manage the lifecycle of recovery tasks, such as creating, enabling, disabling, and deleting recovery tasks. • You can rerun a failed or canceled recovery task. • You can cancel a task only during the recovery progress. After a task is canceled, intermediate data generated during the recovery process will not be retained. 2.2.2.5.2.5 Local Backup Server A local backup server is located at the local data center and is used to store local CDP data. • You can use the ImageStore deployed in the local data center as the local backup server. • You can also deploy a new local backup server. • You can add more than one local backup server. • You can view the CDP data backed up to the local backup server on the details page. 2.2.2.6 Scheduled O&M 2.2.2.6.1 Scheduled Job ZStack Cloud provides two types of scheduled O&M resources: scheduled jobs and schedulers. These two types of resources are independent from each other. You can create schedulers and scheduled jobs based on different rules, and associate or disassociate scheduled jobs with or from schedulers. 2.2.2.6.2 Scheduler ZStack Cloud provides two types of scheduled O&M resources: scheduled jobs and schedulers. These two types of resources are independent from each other. You can create schedulers and scheduled jobs based on different rules, and associate or disassociate scheduled jobs with or from schedulers. • A scheduled job defines that a specific action be implemented at a specified time based on a scheduler. ▬ You can associate any available scheduled job with a scheduler. ▬ You can select Disable, Enable, Attach, and Detach actions for a scheduled job based on your actual production environments. Issue: V5.1.8 109Technical Whitepaper / 2 Product Profiles ▬ If you delete a scheduler, the scheduled jobs associated with the scheduler will be disassociated. You can associate the scheduled jobs with other schedulers. ▬ Operations triggered by scheduled jobs are all recorded by the Audit feature. • A scheduler is used to schedule jobs. It is suitable for business scenarios that last for a long time. ▬ A scheduler defines the implementation rules for a scheduled job. ▬ A scheduler can be used for long-term operations, for example, creating snapshots at a specified interval for a VM instance. ▬ If you delete a scheduler, the scheduled jobs associated with the scheduler will be disassociated. You can associate the scheduled jobs with other schedulers. ▬ Operations triggered by schedulers are all recorded by the Audit feature. 2.2.2.7 Tag Management A tag is used to mark resources. You can use a tag to search for and aggregate resources. Specifically, you can quickly locate the required resources by tag type and tag name. • You can create tags with different colors, simple style, and brief description. You can also attach tags to resources and search resources by using tags. This will improve your search efficiency. • You can search for the resources without tags by clicking the option "None" when you use tags to filter resources. This is convenient for maintenance operations. • Two types of tag are available: admin tags and tenant tags. ▬ Admin tags are created and owned by the administrator, and can be attached to VM instances, volumes, hosts, baremetal instances, and elastic baremetal instances. ▬ Tenant tags are created and owned by tenants, and can be attached to VM instances and volumes. • Currently, you can attach tags to or detach tags from VM instances, volumes, hosts, baremetal instances, and elastic baremetal instances. Considerations • Admin tags are created and owned by the administrator while tenant tags are created and owned by tenants. • Tags created by tenants can only be attached to resources of the corresponding tenants, while admin tags can be attached to all of the resources on the Cloud. 110 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles • The administrator can detach or delete tenant tags. • Tags in a project are owned by the project. Therefore, everyone in the project, including the project admin, project manager, and project member, can perform operations on these tags. • Currently, tag owners cannot be changed. • When you change a resource owner, all tenant tags attached to the resource will be detached. However, the admin tags are not affected. • After the Cloud is upgraded seamlessly, the existing tags will be updated accordingly and displayed in the latest way. If an exception occurs, refresh your browser or create a new tag. 2.2.2.8 Migration Service ZStack Cloud provides the Migration Service, allowing you to migrate VM systems and data from other virtualization platforms to the current cloud. Currently, with the Migration Service, you can: • Migrate VM instances from the vCenter that you took over to the current cloud. The supported vCenter versions include 5.5, 6.0, 6.5, 6.7, and 7.0. Note that the version of the vCenter server must be consistent with that of the ESXi host. • Migrate VM instances from a KVM cloud platform to the current cloud. Note: If you took over vCenter 7.0, to ensure that the VM console can open properly, we recommend that you download the trusted root CA certificate when you log into vCenter. Figure 2-36: V2V Migration Issue: V5.1.8 111Technical Whitepaper / 2 Product Profiles The Migration Service is a separate feature module. To use this feature, you need to purchase both the Base License and the Plus License of the Migration Service. The Plus License cannot be used independently. Advantages of the Migration Service are as follows: • Allows you to perform one-click V2V migrations for VM instances in bulk. • Allows you to add a conversion host and create a V2V job and lets the Cloud do the rest. • Allows you to configure an independent migration network and a network QoS for a conversion host to control transmission bottlenecks and improve migration efficiencies. • Allows you to customize configurations for destination VM instances when you create a V2V job. • Monitors and manages the entire migration process in the visualized, well-designed UI. 2.2.2.8.1 V2V Migration Currently, you can migrate VM instances from a VMware cloud platform or a KVM cloud platform to the current cloud. Source Cloud Platform: VMware You can migrate VM instances from the vCenter you take over to the current Cloud by creating a migration task. • Before migrations, perform data synchronization to manually synchronize the latest status of resources in the vCenter that you took over. • You can perform bulk V2V migrations for VM instances, and customize configurations of the migrated VM instances. • The supported vCenter versions include 5.0, 5.1, 5.5, 6.0, 6.5, 6.7, and 7.0. Note that the version of the vCenter server must be consistent with that of the ESXi host. 112 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles • The supported VM systems of the source vCenter include RHEL/CentOS 4.x, 5.x, 6.x, 7.x, SLES 11, 12, 15, Ubuntu 12, 14, 16, 18, Windows 7, and Windows Server 2003 R2, 2008 R2, 2012 R2, 2016, 2019. • The VM instances will be forced to shut down during the V2V migration. Therefore, pay attention to the business impact. Note: The system firstly attempts to shut down the VM instances gently. If the shutdown fails, the system will perform force shutdown. • The type of the source primary storage is not enforced. The type of the destination primary storage can be LocalStorage, NFS, Ceph, or SharedBlock. • For Windows VM instances, the Windows VirtIO driver is automatically installed during the migration. This improves the NIC and disk efficiencies. • You can perform V2V migration for VM instances booted by UEFI. After the migration, these VM instances are also booted by UEFI. Source Cloud Platform: KVM You can migrate VM instances from a KVM platform to the current Cloud by creating a migration task. • You can perform bulk V2V migrations for VM instances, and customize configurations of the migrated VM instances. • You can migrate the VM instances that are running or paused. Do not power off the VM instances to be migrated. • You can perform V2V migrations for VM instances booted by UEFI. After the migration, these VM instances are also booted by UEFI. • The type of the source primary storage is not enforced. The type of the destination primary storage can be LocalStorage, NFS, Ceph, or SharedBlock. • For different types of source primary storages or destination primary storages, the libvirt version and QEMU version must meet the following requirements: ▬ If either the source primary storage or destination primary storage is Ceph, use libvirt 1.2.16 and QEMU 1.1 or their later versions. ▬ If neither the source primary storage nor destination primary storage is Ceph, use libvirt 1.2. 9 and QEMU 1.1 or their later versions. Issue: V5.1.8 113Technical Whitepaper / 2 Product Profiles 2.2.2.8.2 V2V Conversion Host Before you can perform V2V migrations, specify a host in a destination cluster as the V2V conversion host. • A V2V conversion host must have sufficient hardware resources, such as network bandwidth and disk space. The following table lists the minimum configuration requirements. Table 2-5: Minimum Configuration Requirements for V2V Conversion Host Hardware Configuration Requirements CPU Minimum 8 cores Memory Minimum 16 GB Network Minimum 1 Gigabyte NIC Minimum 50 GB for the rest of storage spaces Storage Note: You can modify the storage configuration according to the number of VM instances to be migrated. • The type of the V2V conversion host must be consistent with that of the source cloud platform. • You can set an independent migration network and a network QoS for a V2V conversion host to control transmission bottlenecks and to improve migration efficiencies. 2.2.3 Operational Management 2.2.3.1 Tenant Management Tenant Management allows users to create and manage their organization structures based on their actual business scenarios. It also provides features such as project-based resource access control, ticket management, and independent zone management. The Tenant Management feature is provided in a separate module. Before you can use this feature, you need to purchase the Plus License of Tenant Management, in addition to the Base License. Definitions Definitions related to Tenant Management: 114 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles • Personnel and Permissions: The Tenant Management system is structured on the basis of personnel and permissions. You can create departments and roles based on your business needs, and grant a variety of permissions to your users. • Organization: Organization is the basic unit in Tenant Management. You can create an organization or synchronize an organization through SSO authentication. The organizations can be categorized into the default department and the customized department. You can customize a new team and a sub-department. The new team, usually a company or subcompany (subsidiary), can be used to create multi-level departments. An organizational structure tree is displayed in cascade, and you can directly get a complete picture of the organization structure. Note: Notice that project members can only view the organization structure where their team belongs to. • User: A user is a natural person that constructs the most basic unit in Tenant Management. There are local user and the SSO user on ZStack Cloud. ▬ Local User: A user that is created on the Cloud. A local user can be added to an organizati on or a project, and attached to a role. ▬ SSO User: A user is that is synchronized to the Cloud through SSO. A SSO user can be added to an organization or a project, and attached to a role, and changed to a local user. Note: • To log in to the Cloud, tenant management users need to use the Tenant login entry. ▬ Local users log in to the Cloud via the Local User entry. ▬ AD/LDAP users log in to the Cloud via the AD/LDAP User entry. ▬ OIDC/OAuth2/CAS users log in to the Cloud from the SSO application without the password. • The admin and platform manager can view the list of all users. • If you created an organizational structure tree on the Cloud, platform members can view only the list of users belonging to the organizational structure. If you did not create any organizational structure tree, platform members can view all users. • User Group: A user group is a collection of natural persons or a collection of project members. You can use a user group to grant permissions. Issue: V5.1.8 115Technical Whitepaper / 2 Product Profiles • Role: A role is a collection of permissions that can be granted to users. A user that assumes a role can call API operations based on the permissions specified by the role. Roles are categorized into platform roles and project roles. ▬ Platform Role: After a user has a platform role attached, the user will have the management permission of the corresponding zone. Permissions of a platform role take effect only in the zone managed by the user. ▬ Project Role: After a user joins a project and have a project role attached, the user will have the permission to use the project and manage the data in the project. Note: • One user can have both platform roles and project roles attached. • One user can have more than one platform role or project role attached. • In a project, if a user has multiple project roles attached, the user will have all the permissions attached to the project roles. • Single Sign On: The Single Sign On service provided by the Cloud. It supports seamless access to SSO systems. Through the service, related users can directly log in to the Cloud and manage cloud resources. Currently, AD/LDAP/OIDC/OAuth2/CAS servers can be added. ▬ AD authentication: Active Directory (AD) is a directory service designed for Windows Standard Server, Windows Enterprise Server, and Windows Datacenter Server. AD provides an independent, standard login authentication system for increasingly diverse office applications. AD users or organizations can be synchronized to the user list or organization of ZStack Cloud via an AD server, while specified AD login attributes can be used to directly log in to ZStack Cloud. ▬ LDAP authentication: Lightweight Directory Access Protocol (LDAP) can provide a standard directory service that offers an independent, standard login authentication system for increasingly diverse office applications. LDAP users can be synchronized to the user list of ZStack Cloud via an LDAP server, while specified LDAP login attributes can be used to directly log in to ZStack Cloud. ▬ OIDC authentication: 116 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles OpenID Connect (OIDC) is a set of authentication protocols based on the OAuth2 protocol , and it allows the clients to verify the user identity and obtain basic user configuration information. The user information can be synchronized to the Cloud according to the mapping rules via an OIDC server, and users of the OIDC authentication system can log in to the Cloud without the password. ▬ OAuth2 authentication: Open Authorization 2.0 (OAuth2) is a set of authorization protocol standards that can authenticate and authorize users to access related resources. The Cloud currently only supports authorization through the authorization code. The user information can be synchronized to the Cloud according to the mapping rules via an OAuth2 server, and users of the OAuth2 authentication system can log in to the Cloud without the password. ▬ CAS authentication: Central Authentication Service (CAS) is a set of single sign-on protocols that allow website applications to authenticate users. The user information can be synchronized to the Cloud according to the mapping rules via a CAS server, and users of the CAS authentication system can log in to the Cloud without the password. • Project Management: Project management allows you to schedule resources based on projects. You can create an independent resource pool for a specific project. By this way, you can better manage the project lifecycle (including determining time, quotas, and permission s) to improve cloud resource utilizations at granular, automatic level and strengthen mutual collaborations between project members. • Project: A project is a task that needs to be accomplished by specific personnel at a specified time. In Tenant Management, you can plan resources at the project granularity and allocate an independent resource pool to a project. The word Tenant in Tenant Management mainly refers to projects. A project is a tenant. ▬ When you create a project, you need to specify the resource quotas and reclaim policy, and add project members. ▬ The basic resources (instance offering, image, network, and other resources) on the Cloud are suggested to shared or created in advance. Issue: V5.1.8 117Technical Whitepaper / 2 Product Profiles • Ticket Management: To better provide basic resources efficiently for each project, project members (project admins, project managers, or regular project members) can apply for tickets to obtain cloud resources. Tickets are reviewed and approved according to custom ticket review processes of each project. Finally, the admin, project admins, department managers, and the customized approvers approve the tickets. Currently, five types of ticket are available: apply for VM instances, delete VM instances, modify VM configurations, modify project cycles, and modify project quotas. • Process Management: Process management is part of ticket management that manages the processes related to the resources of projects. Processes can be categorized into default processes and custom processes. ▬ Default process: The project member submits a ticket to the admin, and then the admin approves the ticket. This process applies to the following scenarios: ■ The tickets that are not configured with a ticket process. ■ The tickets which apply for modifications on the project cycle. ■ The tickets which apply for modifications on the project quota. ■ If the custom ticket process is deleted, the tickets will be resubmitted automatically via the default ticket process. ▬ Custom process: The project member submits a ticket. The project member makes process settings via process management. Finally, the admin or project admin approves the ticket. This process applies to the following scenarios: ■ The tickets created to apply for VM instances, delete VM instances, and change VM configurations will be prioritized to be submitted via the configured, custom ticket process . ■ If you modify the valid ticket process, the tickets will be automatically resubmitted via this modified, custom ticket process. ■ If you modify the invalid ticket process, you need to resubmit the tickets manually by using this modified, custom ticket process. • My Approval: In the Cloud, only the administrator and project administrators are granted approval permissions. the administrator and project administrators can approve or reject a ticket. If a ticket is approved, resources are automatically deployed and allocated to the specified project. Note: 118 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles The platform admin and regular platform members do not have the permission for ticket management, and the menu My Approval is not supported for these two roles. SSO Rename Starting form ZStack Cloud 5.1.8, Third-party authentication is renamed to Single Sign-On (SSO). The following table describes some of the common term changes that have been updated throughout this guide as a result of the rename. Legacy Term Current Term Third-Party Authentication Single Sign On or SSO Third-Party Authentication Server SSO Server Third-Party Authentication System SSO System or SSO Authentication System Third-Party User SSO User Third-Party Sub-Account SSO Sub-Account Third-Party Attribute SSO Attribute Architecture The Tenant Management mainly includes four subfeatures, including project management, ticket management, independent zone management, and Single Sign On. • Platform Management: To effectively manage the Cloud, the platform user (platform admin/regular platform member) can cooperate with the super administrator to manage and operate the Cloud together. ZStack Cloud provides various system roles such as Platform Admin Role and Dashboard Role. You can also satisfy various usage scenarios by creating custom roles at the API level. • Project Management: The project management is project-oriented to plan for resources. Specifically, you can create an independent resource pool for a specific project. Project lifecycles can be managed ( including determining time, quotas, and permissions) to improve cloud resource utilizations at granular, automatic level and strengthen mutual collaborations between project members. • Ticket Management: To better provide basic resources efficiently for each project, project members (project admins , project managers, or regular project members) can submit tickets to obtain cloud resources . Tickets are reviewed and approved according to custom ticket review processes of each Issue: V5.1.8 119Technical Whitepaper / 2 Product Profiles project. Finally, the admin, project admins, department managers, and the customized approvers approve the tickets. Currently, five types of ticket are available, including applying for VM instances, deleting VM instances, modifying VM configurations, modifying project cycles, and modifying project quotas. • Independent Zone Management: Usually, a zone corresponds to an actual data center in a place. If you isolated resources for zones, you can specify the corresponding zone admins for each zone to achieve independent managements of various machine rooms. In addition, the admin can inspect and manage all zones. • Single Sign On: The Single Sign On is an SSO authentication service provided by ZStack Cloud. You are allowed to seamlessly access the SSO system. The corresponding account system can directly log in to the Cloud to conveniently use cloud resources. Currently, you can add an AD/LDAP/ OIDC/OAuth2/CAS server. Differences in Roles and relevant Permissions Definitions related to Tenant Management Account System: • admin: A super administrator who owns all permissions. Usually, the admin is the IT system administrator who have all the permissions. • Local User: A user that is created on the Cloud. A local user can be added to an organization, added to a project, and attached to a role. • SSO User: A user that is synchronized to the Cloud through SSO. An SSO user can be added to an organization, added to a project, and attached to a role. • Platform User: A user that is not added to a project yet, including platform admin and the regular platform member. • Platform Admin: A user that has the platform admin role attached. A platform admin who has been allocated a specified zone or all zones manages the data center of the allocated zone or zones. • Head of Department: The admin can assign a head for the department, and this role is used for identification only. When a head of department becomes a project member, the head of a department has the permission to check department bills. • Project User: A user who has joined a project, including project admin, project operator, and regular project member. 120 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles • Project Admin: A user that has the project admin role attached. A project admin is responsible for managing users in a project, and has the highest permission in a project. • Project Manager: A user that has the project manager role attached. A project manager assists project admins to manage projects. One or more project members in the same project can be specified to act as project managers. • Department Manager: The admin can assign a department manager for the new team. It is a type of platform role and is responsible for the operation management of the entire department , including project management, ticket management, checking bills, and department critical resource monitoring. • Root Role: The root role is used to limit the permission scope of the custom role. The permission of a custom role is inherited from its root role, and is a subset of the root role permission. • Quota: A measurement standard that determines the total quantity of resources for a project. A quota mainly includes the VM instance count, CPU count, memory capacity, maximum number of data volumes, and maximum capacity of all volumes. • Project Reclaim Policy: You need to specify a project reclaim policy when you create a project. There are three types of project reclaim policy, including unlimited, reclaim by specifying time, and reclaim by specifying cost. ▬ Unlimited: After you create a project, resources within the project will be in the enabled state by default. ▬ Reclaim by Specifying Time: ■ When the expiration date for a project is less than 14 days, the smart operation assistant will prompt you for The license will be expired after a project member logs in to the Cloud. ■ After the project expired, resources within the project will be collected according to the specified policy. The policy includes disabling login, preventing project members from logging in to the Cloud, stopping resources, and deleting projects. ▬ Reclaim by Specifying Cost: When the project spending reaches the maximum limit, resources within the project will be collected according to the specified policy. The policy includes disabling login, preventing project members from logging in to the Cloud, stopping resources, and deleting projects. Issue: V5.1.8 121Technical Whitepaper / 2 Product Profiles • Access Control: When you create a project, you can specify whether to allow or prohibit project members to or from logging in to the project within a specified time period. There are two types of access control policy: login allowed time and login prohibited time. ▬ Login Allowed Time: You can set the time when members in the project can log in to the project by day or week. After setting, the project members can log in to the project only during the login allowed time period. ▬ Login Prohibited Time:You can set the time when members in the project cannot log in to the project by day or week. After setting, the project members cannot log in to the project during the login prohibited time period. • Security group constraint: If you enable security group constraint, when a project member creates a VM instance, the VM instance must have one or more security groups attached. ▬ Before you can enable security group constraint for the project, make sure that the project security group quota is set to 1 or higher. ▬ If you enable the security group constraint for the project, a default security group is created when the project is created. The tenant management system grants users a variety of permissions. The permissions of different user roles are as follows: • Differences in Accounts Login in Tenant Management ▬ Admin can log in to the Cloud via Account Login. By using Chrome or Firefox, go to the Account Login page via http://management_node_ip: 5000/#/login. To log in to the Cloud, the admin must enter the corresponding user name and password. 122 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles Figure 2-37: Main Login Page ▬ For users (platform admin, platform user, project admin, project manager, regular project member, or department manager), log in to the Cloud via Project Login. By using Chrome or Firefox, go to the Project Login page via http://management_node_ip: 5000/#/ project. To log in to the Cloud, enter the corresponding user name and password. Specifically, the Cloud has two login entrances for Project Login as follows: • Local user: the user created on the Cloud. Log in to the Cloud via Local User. • AD/LDAP user: the SSO user synchronized to the Cloud via the SSO. Log in to the Cloud via AD/LDAP User, as shown in Project Login Page. After the successful login, you can select the platform or project to be managed to log in to the corresponding management interface. Issue: V5.1.8 123Technical Whitepaper / 2 Product Profiles Figure 2-38: Tenant Login Page • Feature Differences from Various Perspectives Project Regular Regular Platform Admin/ Department admin ( Platform Project Feature Admin ( Project Manager System Member ( Member ( Menu System Manager (System Role) Custom Custom Role) (System Role) Role) Role) Role) Organizati Configure Configure ○ ○ ○ ○ on as needed. as needed. Configure Configure User ○ ○ ○ ○ as needed. as needed. Configure Configure Role ○ ○ ○ ○ as needed. as needed. Project × × Configure × ○ × Member as needed. Configure Configure User Group ○ ○ ○ ○ as needed. as needed. Single Sign Configure ○ ○ × × × On as needed. 124 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles Project Regular Regular Platform Admin/ Department admin ( Platform Project Feature Admin ( Project Manager System Member ( Member ( Menu System Manager (System Role) Custom Custom Role) (System Role) Role) Role) Role) Configure Project ○ ○ × ○ × as needed. Process ○ Configure ○ × × × Management as needed. × × Configure My Tickets × ○ × as needed. My × × Configure ○ ○ ○ Approval as needed. • Differences in Permissions of Platform/Project Roles • Platform Roles: admin, platform admin, department manager, and regular platform user. The permissions corresponding to these roles are differentiated as follows: Role Difference admin A super administrator who owns all permissions. A platform admin is a type of administrator who has been allocated a specified zone or all zones, and assists the admin to jointly manage the Cloud. A platform admin has all the permissions that the admin has, except the following: • A platform admin is allocated a specified zone or all zones, and has the permissions to manage resources in the zone or zones only. Currently, a platform admin is not granted relevant Platform Admin permissions to create or delete zones. • A platform admin does not have the permissions related to ticket management, and the menu My Approval is not displayed for this role. • A platform admin does not have the permissions related to certificate management, and cannot perform actions such as uploading a certificate. Department Manager The department manager is a role who has been allocated a specified department, which can be designated by the admin for the Issue: V5.1.8 125Technical Whitepaper / 2 Product Profiles Role Difference new team and responsible for managing the whole department. A department manager has the following permissions: • View homepage: Allows you to view the summary of project resources in the department under the management only. • View the Cloud monitor: Allows you to view the monitoring information of critical resources of the department under your management. • View organizations: Allows you to view the organizational structure of the Cloud, but not to perform related operations. • View users: Allows you to view the user information on the Cloud, but not to perform related operations. • View user groups: Allows you to view the user group information , but not to perform related operations. • Viewing roles: Allows you to view the system project roles of the Cloud, the project roles whose owner is the admin, and the project roles whose owner is the management department (and sub-departments). • View projects and project-based operations: For projects under the managed department (and sub-departments), you can view, edit, and add project members. Setting a department, changing billing prices, generating project templates, and setting logon time limits for projects are not supported. • Ticket approval: Supports ticket approval, but the menu Process Management is not displayed. • View/Export bills: Allows you to view or export project bills and departmental bills of the department (and sub-departments) under your management. Platform members other than the platform admin. A Platform member has all the permission that the admin has, except the following: • A regular platform member does not have the permissions Regular Platform related to ticket approval, and the menu My Approval is not Member displayed for this role. • A regular platform member can view users who are in the same organizational structure only. • Ungranted permissions. • Project Roles: project admin, project manager, and project member. The permissions corresponding to these roles are differentiated as follows: 126 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles ▬ A project admin can specify one or more project members in the same project to act as project managers, assisting project admins to manage projects. ▬ A project manager has all the permissions that a project admin has, but Advantages The Tenant Management of ZStack Cloud has the following advantages: • Full-featured: Tenant Management provides users with a range of features such as organizati on structure managements, project-based resource access control, ticket management, and independent zone management. • User-friendly: Tenant Management allows you to manage the operation permissions of different roles in a multi-level organizational structure, making the organizational management more flexible and user-friendly. • Cost-effective: Each organization has different kinds of departments. In a traditional IT company, resources are allocated to these departments based on their actual needs, and permissions are assigned as needed as well. Against the backdrop of cloud migration, the management over the departments is achieved on the cloud to minimize the management costs. Scenarios Each organization has its own administrative departments. In a traditional IT company, resources are allocated to administrative departments based on their actual needs, and permissions are assigned as needed as well. After companies migrate their business to the cloud, they expect to enjoy the same experience in resources allocation and permissions assignment on the cloud, which is compatible with the management by administrative departments. The Tenant Management of ZStack Cloud provides users with a range of features such as organization structure managements, project-based resource access control, ticket management, and independent zone management. Through the division of the organizational structure, it provides the same management as the administrative department and minimizes the management costs. 2.2.3.1.1 Organization Tenant Management provides an organization management feature for enterprise users, where an organizational structure tree is displayed in cascade and you can directly get a complete picture Issue: V5.1.8 127Technical Whitepaper / 2 Product Profiles of the enterprise organization structure. Enterprise Management mainly includes the following concepts: The concepts of an organization is shown in Associated Concepts of Organization. Figure 2-39: Associated Concepts of Organization 2.2.3.1.2 User A user is a natural person that constructs the most basic unit in Tenant Management. Users in ZStack Cloud can be divided into different types based on where the user is created and whether the user joined a project. • User type based on where the user is created: 128 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles ▬ Local user: Users created in the Cloud. You can add a local user to an organization or project, or attach a role to a local user. ▬ 3rd-party user: Users synchronized to the Cloud through 3rd-party authentication. You can add a 3rd-party user to an organization or project, attach a role to a 3rd-party user, or change a 3rd-party user to local user. Note: • To log in to the Cloud, tenant management users need to use the project login entry. ▬ Local users log in to the Cloud via the Local User entry. ▬ AD/LDAP users log in to the Cloud via the AD/LDAP User entry. ▬ OIDC/OAuth2/CAS users log in to the Cloud from the 3rd-party application without the password. • The admin and platform administrator can view the list of all users. • If you created an organizational structure tree in the Cloud, platform members can view only the list of users belonging to the organizational structure. If you did not create any organizational structure tree, platform members can view all users. • User type based on whether the user joined a project: ▬ Platform member: A user that is not added to a project yet, including platform manager and the regular platform member. ▬ Project member: A user that has joined a project, including project admin, project manager, and regular project member. 2.2.3.1.3 Role A role is a collection of permissions used for entitling users to manage resources by calling associated APIs. A role has two types, including system role and custom • Platform role: After a user has a platform role attached, the user will have the management permission of the corresponding zone. Permissions of a platform role take effect only in the zone managed by the user. • Project role: After a user and its member group join a project and have a project role attached, the user will have the permission to use the project and manage the data in the project. Note: Issue: V5.1.8 129Technical Whitepaper / 2 Product Profiles • One user can have two types of roles attached. • One user can have more than one platform role or project role attached. • In a project, if a user and its member group have multiple project roles attached, the user and its member group will share all the permissions of the user and the member group. The same user supports binding two role types at the same time. The same user supports binding multiple platform roles or project roles. In a project, if a user and member group are bound to multiple project roles, the permissions they have are the full set of all project roles. 2.2.3.1.4 3rd Party Authentication 3rd-Party Authentication is a third-party authentication service provided by ZStack Cloud. With this service, ZStack Cloud can seamlessly connect the third-party login authentication system and the corresponding account system can directly log in to the Cloud to conveniently use cloud resources. Currently, you can add an AD/LDAP server. • AD authentication: Active Directory (AD) is a directory service designed for Windows Standard Server, Windows Enterprise Server, and Windows Datacenter Server. AD provides an independent, standard login authentication system for increasingly diverse enterprise office applications. AD users or organizations can be synchronized to the user list or organization of ZStack Cloud via an AD server, while specified AD login attributes can be used to directly log in to ZStack Cloud. • LDAP authentication: Lightweight Directory Access Protocol (LDAP) can provide a standard directory service that offers an independent, standard login authentication system for increasingly diverse enterprise office applications. LDAP users can be synchronized to the user list of ZStack Cloud via an LDAP server, while specified LDAP login attributes can be used to directly log in to ZStack Cloud. • OIDC authentication: OpenID Connect (OIDC) is a set of authentication protocols based on the OAuth2 protocol, and it allows the clients to verify the user identity and obtain basic user configuration information. 130 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles The user information can be synchronized to the Cloud according to the mapping rules via an OIDC server, and users of the OIDC authentication system can log in to the Cloud without the password. • OAuth2 authentication: Open Authorization 2.0 (OAuth2) is a set of authorization protocol standards that can authenticate and authorize users to access related resources. The Cloud currently only supports authorization through the authorization code. The user information can be synchronized to the Cloud according to the mapping rules via an OAuth2 server, and users of the OAuth2 authentication system can log in to the Cloud without the password. • CAS authentication: Central Authentication Service (CAS) is a set of single sign-on protocols that allow website applications to authenticate users. The user information can be synchronized to the Cloud according to the mapping rules via a CAS server, and users of the CAS authentication system can log in to the Cloud without the password. 2.2.3.1.5 Project Management Tenant Management provides the project management feature for enterprise users. Project management allows you to schedule resources based on projects. Specifically, you can create an independent resource pool for a specific project. This way, you can better manage the project lifecycle (including determining time, quotas, and permissions) to improve cloud resource utilizations at granular, automatic level and strengthen mutual collaborations between project members. Concepts of the project management is shown in Associated Concepts of Project Management. Issue: V5.1.8 131Technical Whitepaper / 2 Product Profiles Figure 2-40: Concepts of Project Management 2.2.3.1.6 Ticket Management The Tenant Management provides the ticket management feature for enterprise users. To better provide basic resources efficiently for each project, project members (project admins, project managers, or regular project members) can apply for tickets to obtain cloud resources. Tickets are reviewed and approved according to custom ticket review processes of each project. Finally, admins, project admins, or department managers approve the tickets. Currently, five types of ticket are available: apply for VM instances, delete VM instances, modify VM configurations, modify project cycles, and modify project quotas. The major workflow is shown in Major Workflow of Ticket Management. 132 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles Figure 2-41: Major Workflow of Ticket Management 2.2.3.2 Billing Management 2.2.3.2.1 Bills A bill is the expense of resources totaled at a specified time period. Billing is accurate to the second. Bills can be categorized into project bills, department bills, and account bills. 2.2.3.2.2 Pricing List ZStack Cloud provides a quasi-public cloud billing experience. You can customize the unit price for different resources by using a pricing list and obtain related bills after you associate the pricing list with a project or an account. Currently, the following resources in the Cloud can be billed: CPU, memory, root volume, data volume, GPU device, elastic baremetal instances, and public IP (VM IP), and public IP (VIP). 2.2.3.3 Access Control 2.2.3.3.1 Console Proxy Console proxy allows you to log in to a VM instance by using the IP address of a proxy. You can view the information about the proxy used to launch your VM console. • The console proxy address only needs to be modified on the management node. • The address of default proxy is the IP address of the management node. • You can launch the VM console properly only when the state and status is Enabled and Connected, respectively. 2.2.3.3.2 Access Key An AccessKey pair is a security credential that one party authorizes another party to call API operations and access its resources in the Cloud. AccessKey pairs shall be kept confidential. Issue: V5.1.8 133Technical Whitepaper / 2 Product Profiles ZStack Cloud provides two types of AccessKey: local AccessKey and third-party AccessKey. • Local AccessKey: A local AccessKey pair consists of an AccessKey ID and AccessKey secret. It is a security credential that the Cloud authorizes a third-party user to call API operations and access its cloud resources. AccessKey pairs shall be kept confidential. An AccessKey pair has the full permissions of its creator. • Third-party AccessKey: A third-party AccessKey pair consists of an AccessKey ID and AccessKey secret. It is a security credential that a third-party user authorizes the Cloud to call API operations and access its cloud resources. AccessKey pairs shall be kept confidential. Note: • AccessKey is a key factor for the Cloud to perform security authentication on API requests. We recommend that you keep your AccessKey confidential to maintain securities. • If your AccessKey is at risk of leakage, we recommend that you delete it in time and create a new one. 2.2.3.4 Application Center Application Center allows you to add third-party applications to the Cloud and then access the applications by using the Cloud. It extends the functionality of the Cloud. 2.2.4 Settings 2.2.4.1 Sub-Account Management A sub-account can be created by the admin or synced from an SSO authentication system and is managed by the admin. Resources created under a sub-account are managed by the sub- account. You can use a sub-account to create and manage resources under its management and implement fine-grained control over the permissions on resources. Concepts • admin: The admin has super privileges over resources and shall be owned by the IT system administrator. 134 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles ▬ The admin can share instance offerings, disk offerings, networks, images, and other cloud resources with sub-accounts or revoke the resources from sub-accounts. Sub-accounts can only manage resources to which they are granted access. ▬ The admin can modify resource quotas granted to a sub-account based on different business scenarios. ▬ After the admin created a VXLAN pool, sub-accounts can create VXLAN networks based on the VXLAN pool. ▬ Changing the owner of a VM instance will change the owner properties of the EIPs associated with the VM instance. • Sub-account: ▬ Sub-accounts can be categorized into local sub-accounts and SSO sub-accounts: ■ A local sub-account is created by the admin. An SSO sub-account is synced from an SSO authentication server. ■ SSO authentication: The SSO authentication service, powered by the Cloud, supports seamless access to SSO authentication systems. Through the service, related users can directly login to the Cloud and manage cloud resources. Currently, OIDC servers can be added. ■ OIDC server: An SSO authentication server that applies the OIDC protocol. It authenticates and authorizes SSO users to log into the Cloud without password and syncs user information to the Cloud based on the mapping rule. ■ A sub-account has management permissions on VM instances, images, volumes, and security groups created under the sub-account. A sub-account can perform read operations on resources shared by the admin, but cannot delete the resources. ■ Deleting a sub-account will delete all resources created by the sub-account, such as VM instances, volumes, and images. ■ The names of sub-accounts must be unique. ■ Resource quotas that the admin shares with a sub-account is displayed on the homepage of the sub-account. ■ Before a sub-account can create a VM instance, the admin must share an instance offering, disk offering, network, and other required resources with the sub-account. Otherwise, a VM instance cannot be created. Issue: V5.1.8 135Technical Whitepaper / 2 Product Profiles ■ A sub-account can use an image that it adds to the Cloud or use an image shared by the admin. • Quota: Resource quotas that the admin shares with a sub-account specify the maximum resources that the sub-account can manage, including computing resource quotas, storage resource quotas, network resource quotas, and other resource quotas. The admin uses the preceding resource quota settings to manage the maximum resources granted to sub-accounts. If a resource is deleted but not expunged, the resource still occupies storage space of primary storage and volumes. SSO Rename Starting form ZStack Cloud 5.1.8, Third-party authentication is renamed to Single Sign-On (SSO). The following table describes some of the common term changes that have been updated throughout this guide as a result of the rename. Legacy Term Current Term Third-Party Authentication Single Sign On or SSO Third-Party Authentication Server SSO Server Third-Party Authentication System SSO System or SSO Authentication System Third-Party User SSO User Third-Party Sub-Account SSO Sub-Account Third-Party Attribute SSO Attribute 2.2.4.2 Email Server If you select Email as the endpoint of an alarm, you need to set an email server. Then alarm messages are sent to the email server. 2.2.4.3 Log Server A log server is used to collect logs of the management node. You can add a log server to the cloud and use the collected logs to locate errors and exceptions. This makes your O&M more efficient. 136 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles 2.2.4.4 IP Allowlist/Blocklist An IP blocklist or allowlist identifies and filters IP addresses that access the Cloud. You can create an IP allowlist or blocklist to improve access control of the Cloud. Note: If the login requests are forwarded to the Cloud through a load balancer, correctly configure an X-Forwarded-For parameter for the load balancer. Without this parameter, the Cloud is unable to identify the actual client IP and fails to execute the access control accurately according to the allowlist/blocklist. 2.2.4.5 HA Policy HA Policy is a mechanism that ensures sustained and stable running of the business if VM instances are unexpectedly stopped or are errored because of errors occurring to compute, network, or storage resources associated with the VM instances. By enabling this feature, you can customize VM HA policies to ensure your business continuity and stability. Concepts The HA Policy feature involves the following key concepts: • HA mode: Specifies whether to enable auto restart if VM instances are unexpectedly stopped or are errored because of errors occurring to compute, network, or storage resources associated with the VM instances. None and NeverStop are supported: ▬ None: VM instances are not auto restarted no matter it is planned to be stopped or unexpectedly stopped. ▬ NeverStop: ■ Unexpectedly stopped VM instances are auto restarted on another host depending on the failover strategy you configure for them. ■ VM instances do not restart automatically after they are stopped manually or through scheduled jobs. • VM Failover Strategy: Specifies whether to migrate a VM instance to another host if errors occur to the compute resource, storage resource, or network resource associated with the VM instance. The VM failover mechanism inspects the following resource status: • Management Network Connectivity Status: Issue: V5.1.8 137Technical Whitepaper / 2 Product Profiles ▬ Management network connectivity status indicates the status of the network that connects the management node and the host where VM instances reside. ▬ This status may turn Abnormal if errors occur to the management node or to the management network. • Storage Network Connectivity Status: ▬ Detects the connectivity status of the network that VM instances use to access the primary storage where the root volumes of these VM instances reside. ▬ This status may turn Abnormal if errors occur to the primary storage or to the storage network. • Business NIC Status: ▬ Business NIC status may turn Abnormal if errors occur to the host business NIC or the switch port directly connecting to the host business NIC that is associated with the L2 network of VM instances. Based on the resource status inspection, the Cloud allows you to configure failover strategies for 4 fault scenarios: Fault Scenario Management Storage Business Fail Over Network Network NIC Status Connectivi Connectivi ty Status ty Status Scenario A: Normal Normal Abnormal Enable/Disable Business NIC Fault Scenario B: Normal Abnormal Normal Enable/Disable Storage Network Fault Scenarios C: Normal Abnormal Abnormal Set as false if both the Storage Network scenario A and B have the and Business NIC failover policy set as false Fault . Set as true if either of the scenario A or B has the failover policy set as true. Scenario D: Abnormal Normal Normal Disable. The failover cannot Management be enabled in this scenario. Network Fault 138 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles Note: The failover policies take effect on VM instances whose HA modes are set as NeverStop only. Fundamentals ZStack Cloud HA Policy has the following mechanisms: • The Cloud polls the running status of VM instances. If a VM instance is unexpectedly stopped, its HA mode is checked. If the HA mode of the VM instance is NeverStop, then the VM instance is restarted on the current host or another host. Figure 2-42: VM HA Started After Unexpectedly Stopped • The Cloud polls the status of the hosts where VM instances reside. Either of the management network connectivity status, storage network connectivity status, and business NIC status of the host turns abnormal, the corresponding VM failover strategy and VM HA mode are Issue: V5.1.8 139Technical Whitepaper / 2 Product Profiles checked. If the corresponding failover strategy is Yes and VM HA mode is NeverStop, then related VM instances are migrated to another host. Figure 2-43: VM HA Started After Host Business NIC Turns Down Characteristics HA Policy has the following characteristics: • Comprehensive & Powerful: Covers all mainstream HA scenarios, including various failures, and ensures the stability and continuity of your business. • Flexible & Visualized: Provides a simple table that allows you to configure VM failover strategies with one click. This table functions together with the HA Mode that can be configured on all and individual VM instances, thus greatly improving the flexibility of your business HA configuration. Scenarios The following describes the scenarios of the HA Policy feature. • Host Business NIC Turns Down: 140 Issue: V5.1.8Technical Whitepaper / 2 Product Profiles If a host business NIC turns down, to ensure high availability of business, all VM instances associated with this NIC are expected to migrate to other hosts. • For example, your business VM instances are running MySQL database service which is required to achieve high availability. In this case, you can set the HA mode of these VM instances to NeverStop and turn on the switch corresponding to Abnormal Business NIC Status. Then as long as host resources are sufficient, in case that a host business NIC associated with these VM instances turns down, these VM instances will be auto started on other hosts. • VM Unexpectedly Stops: If a VM instance is unexpectedly stopped, it is expected to auto HA start. • For example, your VM instances are running important business applications. To ensure business auto-recovery in case of VM stops due to reasons such as host powered-offs or business overloads, you can set the HA mode of these VM instances to NeverStop. Then if these VM instances are stopped, they are auto started. Issue: V5.1.8 141Technical Whitepaper / 3 Product Features 3 Product Features Licensing in ZStack Cloud is supplied in different functionality packages as Base and Plus. This topic describes features covered in the Enterprise Prepaid base license and add-on features provided in plus licenses. For more information about the licensing details, see License Management. For differences about features provided in different editions, contact our official sales. Features in Enterprise Prepaid Type Features Description Displays multi-dimensional data statistics on cards and allows you to customize your own dashboard by adding and Custom Dashboard dragging cards. Provides a default dashboard for users with different roles. Displays the platform resources in real time by using monitors with various themes. Allows you to switch between the KVM monitor and the Monitor Dashboard vCenter monitor as needed. Allows you to switch between zones. You can have the real- time monitoring on all zones or a specific zone. Allows you to view the details of API requests that are called by using various methods, including POST, DELETE, PUT, GET, and GET-ZQL, after you perform operations on the API Inspector UI. ZStack Cloud supports a browser-based interface using HTML5 or later version for managing and monitoring of server resources. Bulk Action Allows you to manage VM instances in bulk. Allows you to create VM instances through different entries. Create VM Instance Allows you to specify the root volume capacity and batch attach data volumes via VM creation. VM Instance Allows you to import a VM instance on a third-party platform Import VM Instance by using the OVF template and customize the configurations of the VM instance. Provides two VM display methods: List View and Directory View VM Instance View. 142 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to set a default view for the VM instance page in Global setting or switch view for the current page. Allows you to manage the lifecycle of VM instances, such as Manage VM Instance creating, importing, stopping, booting, rebooting, powering off , recovering, pausing, exporting, and deleting VM instances. Allows you to access VM instances through terminals without using remote tools. Supports three types of console mode: SPICE, VNC, and SPICE+VNC. The SPICE protocol supports SSL encrypted channel to further ensure desktop security. VM Console Allows you to paste texts into VNC consoles. Allows you to manage VM power status in VNC consoles, including stopping, rebooting, resuming, pausing, forcing stopping, and powering off VM instances. Allows you to set the console password, set the console password by force in the Global Setting, and configure the password strategy such as the password complexity and password length in the Global Setting. Copies data in the root volumes of the VM instance only. Allows you to clone running, paused, and stopped VM instances on LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storage. Supports ImageStore and Ceph backup storage. Clone VM Instance Allows you to choose clone method as needed, including full without Data Volumes clone, instant full clone, and linked clone. Allows you to set a storage allocation policy, including system allocation and manual allocation. Allows you to configure network settings, including enable or disable NICs, assign IP, assign MAC address, and select security group. Clone VM Instance Copies data in the root volumes as well as data volumes of a with Data Volumes VM instance. Issue: V5.1.8 143Technical Whitepaper / 3 Product Features Type Features Description Allows you to clone running, paused, and stopped VM instances on LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storage. Supports ImageStore and Ceph backup storage. Does not clone shared volumes (if any) with VM instances. Allows you to choose clone method as needed, including full clone, instant full clone, and linked clone. Allows you to set a storage allocation policy, including system allocation and manual allocation. Allows you to configure network settings, including enable or disable NICs, assign IP, assign MAC address, and select security group. Allows you to merge snapshots of a VM instance into one flat snapshot to improve resource performance and data security . Flatten Allows you to unlink the dependency between linked clone VM instances and source VM instances by flattening to achieve data independence. Allows you to customize tags for VM instances so that you Custom Tag can locate them quickly. Allows you to create groups to categorize and manage VM instances. You can create up to 4-level groups with the root directory as the first-level group. Change Group Allows you to manage the lifecycle of a group, such as creating and deleting a group. Allows you to specify a group for a VM instance or change the group it belongs to. Allows you to migrate a VM instance from a host to another without changing the primary storage. Supports hot migration and cold migration. Change Host Hot migration: Migrates a VM instance in the running state. Hot migration applies to all types of the primary storage. Allows you to hot migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage or shared primary storage.Re 144 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description If the migration is blocked because the VM instance has high I/O operations for a long time, you can enable auto converge to ensure a smooth migration. Cold migration: Migrates a VM instance in the stopped state. Cold migration applies to LocalStorage primary storage only. Allows you to cold migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage primary storage. Allows you to cold or hot migrate a VM instance based on the workloads of the destination host. Allows you to hot migrate a VM instance with a VF NIC attached. Allows you to migrate a VM instance from a primary storage to another without changing the host. Allows you to migrates valid data, and the migrated VM instance follows the provisioning type of the target primary storage. Supports hot migration and cold migration across SharedBloc k primary storage. Supports hot migration across SharedBlock and Ceph primary storage. Hot migration: Migrates a VM instance in the running state. Change Primary Snapshots of the VM instance to be migrated will not be Storage saved after the hot migration across SharedBlock primary storage or across SharedBlock and Ceph primary storage. If you hot migrate a VM instance from a SharedBlock primary storage to a Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. Allows you to hot migrate a VM instance with a VF NIC attached. Cold migration: Migrates a VM instance in the stopped state. Allows you to hot or cold migrate a VM instance with all attached volumes (excluding shared volumes). Issue: V5.1.8 145Technical Whitepaper / 3 Product Features Type Features Description Allows you to migrate a VM instance from a host and primary storage to another host and primary storage. Supports hot migration and cold migration. Hot migration: Migrates a VM instance in the running state. Supports hot migration across the same type of primary storage, including Ceph↔Ceph, NFS↔NFS, and SharedBloc k↔SharedBlock. Snapshots of the VM instances to be migrated will not be saved after the hot migration across the same type of primary storage. If you hot migrate a VM instance across Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. Allows you to hot migrate a VM instance across different types of primary storage, including Ceph↔SharedBloc k, LocalStorage↔SharedBlock, LocalStorage↔Ceph, LocalStorage↔NFS, SharedBlock↔NFS, and Ceph↔NFS. Change Host and Snapshots of the VM instances to be migrated will not be Primary Storage saved after the hot migration across different types of primary storage. If you hot migrate a VM instance from a SharedBlock, LocalStorage, or an NFS primary storage to a Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. Supports hot migration across Ceph pools within the same Ceph primary storage and allows you to migrate only root volume or migrate data volumes with VM instances. Allows you to enable or disable auto-convergence policy during storage migration. Allows you to manually specify destination hosts. Allows you to hot migrate a VM instance with a VF NIC attached. Cold migration: Migrates a VM instance in the stopped state. Allows you to cold migrate a VM instance across the same type of primary storage, including Ceph↔Ceph and NFS↔ NFS. 146 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to cold migrate a VM instance across the same type of primary storage without data volumes. If you cold migrate a VM instance across Ceph primary storage, you can specify a root volume pool for the volumes to be migrated. Supports cold migration of VM instances (with data volumes) across Ceph pools within the same Ceph primary storage. Allows you to clean up raw data after migration to release more space after you confirm the data integrity. Modify Instance Allows you to modify the instance offering (CPU and memory Offering ) of a running or stopped VM instance. Allows you to set the GPU specification for a stopped VM Set GPU Specification instance. You can attach, modify, and detach a physical GPU specification or virtual GPU specification as needed. Allows you to expand the root volume of a running or stopped Resize Root Volume VM instance. The new size takes effect immediately. Allows you to expand the data volume of a running or Resize Data Volume stopped VM instance. The new size takes effect immediately. Allows you to change the owner of a running or stopped VM Change Owner instance. Allows you to change the operating system of a stopped VM Change System instance. Allows you to restore a VM instance to the initial state of the Reimage VM Instance VM image. All the data in the root volume will be overwritten. Allows you to set the boot order for a VM instance. Set Boot Order Supports three boot types: boot from hard disk, boot from CD ROM, and boot from network. Boot from Host Allows you to specify a host on which a VM instance boots. Allows you to set VM high availability (HA) so that the VM instance can reboot automatically in case of unexpected shutdown because of the VM errors or faults of compute, VM High Availability storage, or network that the VM instance is residing on. You can view the reboot progress on the UI. You can set Default HA Mode When Creating VM instance in Platform Setting > HA Policy > Advanced Setting to set the HA mode used for a newly created VM instance by default. You can change the Issue: V5.1.8 147Technical Whitepaper / 3 Product Features Type Features Description HA mode for a VM instance individually during or after the creation. After the change, the default value does not take effect on this VM instance. Allows you to set whether the base time of a VM instance is Time Synchronization the same as that of the host. Allows you to attach/detach SSH keys to/from VM instances SSH Key Attachment/ with the Linux or BSD operating system. Detachment Allows you to create or delete an SSH key. Allows you to change the password of a Windows or Linux Change VM Password running VM instance. Allows you to set the hostname when you create a VM Set Hostname instance. Allows you to set resource priority (Normal and High). When resource contention occurs, VM instances with High Resource Priority resource priority can compete for more resources than those with Normal resource priority. Allows you to set the cross-cluster high availability policy for a VM instance. If the policy is enabled, the VM instance can be automatically migrated across clusters. If disabled, the VM instance can only operate in the cluster where the VM instance resides when this policy takes effect. Currently, this policy applies to host migration scenarios such Cross-Cluster High as starting up a VM instance on another host to achieve HA Availability or migrating a VM instance to another host if the source host enters the maintenance mode. This policy takes effect only for VM auto-migrations. Other actions, such as manual hot migration, VM startups on specified hosts, and Dynamic Resource Scheduling (DRS) policy-based migrations are not affected. Allows you to redirect a USB device from a VDI client to a USB Redirection VDI VM instance. Allows you to schedule snapshot creation at specified time points to record the state of the root volume, data VM Snapshot volume, or memory of an instance before you perform a business-sensitive operation. This allows rollback in case of breakdowns. 148 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Supports two snapshot types: Single snapshot and snapshot group. The snapshot group allows you to restore a group of VM instances in bulk. Allows you to create snapshots for VM instances that are in the running state. Allows you to create snapshots for VM instances that are in the stopped state. Supports VM auto boot after restoring from snapshots. Allows you to delete VM snapshots in bulk. Allows you to create a VM instance from a single snapshot or create a VM instance with data volumes from a snapshot group. Allows you to create a backup for a running VM instance. Allows you to create either an incremental backup or a full backup for a VM instance. VM Backup Allows you to create a backup for a VM instance with its volumes (excluding shared volumes) when the VM instance is in the running state. This feature is provided by the Backup Service module. Allows you to create a template image based on a VM instance so that you can create VM instances in bulk in a custom way. VM Image Allows you to create a VM image when the VM instance is in the running or stopped state. Supported backup storage: ImageStore and Ceph. Creates VM instances based on an ISO disk which guides ISO-based the VM system installation. Deployment Supports multiple ISOs per VM instance, improving the business deployment efficiency. Template-based Creates VM instances based on a system template. Deployment Add/Remove VM Allows you add a running or stopped VM instance to or Scheduling Group remove a VM instance from a VM scheduling group so as to associate with/disassociate from related VM scheduling Issue: V5.1.8 149Technical Whitepaper / 3 Product Features Type Features Description policies. This way, you can manage the distribution of VM on hosts and ensure high performance and high availability. Allows you to attach/detach a data volume to/from a running Attach/Detach Volume or stopped VM instance. Allows you to optimize drive models and identify a volume by its SCSI WWN. Allows VM instances in Ceph or SharedBlock primary storage Shared Volume to share the same data volume. Allows you to create an image for root volumes or data volumes attached to a VM instance when the VM instance is in the running or stopped state. Create Volume Image Before you can create an image for shared volumes on a SharedBlock primary storage, stop all the VM instances attached by the shared volume first. Allows you to set QoS for root volumes and data volumes Set Volume QoS attached by a VM instance when the VM instance is in the running or stopped state. Enable/Disable NIC Allows you to enable or disable NICs of the vNIC type. Allows you to attach/detach a NIC to/from a running or Attach/Detach NIC stopped VM instance. You can set a default NIC. Allows you to set the NIC type when the VM instance is in the stopped state. Set NIC Type Allows you to change the NIC type from a VF NIC to a vNIC only. Allows you to set the NIC model for a running or stopped VM instance. Supported VM NIC models: virtio, rtl8139, and Set NIC Model e1000. This operation applies to Linux and Paravirtualization operating systems only. Allows you to change the L3 network for a VM NIC without Change L3 Network affecting the hardware information such as the MAC address for VM NIC and PCI address of the NIC. Allows you to set the network QoS for a running or stopped Set Network QoS VM instance. Allows you to update NIC configurations according to the Sync NIC Configurat NIC parameters you set on the Cloud, including IP address, ions netmask, gateway, DNS, and MTU. 150 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to read a NIC IP address configured in the VM Read NIC IP instance and make it displayed on and managed by the Configured in the VM Cloud. Make sure that the NIC is belong to an L3 network Instance disabled with IP address management and does not have an IP address assigned on the Cloud. Allows you to customize a MAC address when you create a Customize MAC VM instance. Address Allows you to change the MAC address when the VM instance is in the stopped state. Allows you to customize an IP address when you create a VM instance. Customize IP Address Allows you to change the IP address when the VM instance is in the stopped or running state. Allows you to attach an EIP to or detach an EIP from a VM Attach/Detach EIP NIC. Allows you to enable multi-gateway by running zstack-ctl. VM Multi-Gateway If enabled, each VM NIC has an independent gateway. Allows you to create/delete a vDrive for a stopped VM Create/Delete vDrive instance. You can attach/detach an ISO to/from a drive. Allows you to attach/detach a LUN to/from a running or stopped VM instance. Allows you to attach/detach a physical GPU device to/from a running or stopped VM instance. Attach/Detach Allows you to attach/detach a virtual GPU device to/from a Peripheral Device running or stopped VM instance. Allows you to attach/detach a USB device to/from a running or stopped VM instance. Allows you to attach/detach other peripheral devices, such as Moxa cards, to/from a running or stopped VM instance. Allows you to set the CPU model for a VM instance through three entries: Global Setting, Cluster Setting, and VM Setting CPU Model . The setting takes effect with the following priority: Global Setting < Cluster Setting < VM Setting. Assigns the virtual CPUs (vCPUs) of a VM instance to CPU Pinning specific host pCPUs, which improves VM performance. Issue: V5.1.8 151Technical Whitepaper / 3 Product Features Type Features Description Allows you to configure vNUMA for a VM instance to generate a topology of virtual NUMA nodes for the VM vNUMA Configuration instance. This topology enables a vCPU on a vNUMA node to primarily access the local memory and thus improves VM performance. Allows you to configure EmulatorPin for a VM instance so EmulatorPin that all other threads than virtual CPU (vCPU) threads and Configuration IO threads of a VM instance are assigned to physical CPUs ( pCPUs) of the host. Allows you to install performance optimization tools ( GuestTools) for the Qemu Guest Agent installation and internal monitoring of Linux VM instances. VM Performance Allows you to install performance optimization tools ( Optimization GuestTools) for Windows and Windows Virtio VM instances for Qemu Guest Agent installation and internal monitoring. You can install the Virtio driver with one click to improve the disk and NIC performances. Allows you to import user data when you create a VM instance. You can upload user-defined parameters or Import User Data scripts to customize configurations for VM instances or to accomplish specific tasks. Inherits the BIOS mode from the image you selected when you create a VM instance. The BIOS mode includes Legacy and UEFI. BIOS Mode Inherits the BIOS mode of the original VM instance when you create a VM image or clone a VM instance. Allows you to change the BIOS mode when the VM instance is in the running or stopped state. After RDP is enabled, you can launch the VM console in RDP VM RDP mode by default in VDI scenarios. Provides IP/MAC anti-spoofing and ARP anti-spoofing. If enabled, VM instances can only communicate with outside Anti-Spoofing Mode networks using the IP/MAC addresses allocated by the Cloud . External monitoring: Collects the VM data such as CPU, VM Monitoring memory, disk I/O, NIC data from hosts by using libvirt. 152 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Internal monitoring: Collects the VM data such as CPU, memory, and disk size data from VM instances by using an agent. An agent is required for internal monitoring. Allows you to enable Instance Offering Online Modification for a single VM instance so that you can online modify the instance offering (CPU and memory) for the VM instance. Allows you to enable Hyper-V for a Windows VM instance. Allows you to disable the hypervisor for a VM instance, to make certain applications skip their virtualization detection on this VM instance. Allows you to disable hypervclock for a Windows VM instance. Allows you to set the number of queues when VirtIO NIC traffics are allocated to multiple CPUs, which improves the Advanced Settings NIC performance. Allows you to enable Memory Balloon for a VM instance. It monitors in real time the memory usage of VM instances and the host. Its dynamic reclaim and allocation mechanism makes sure the efficient use of host memory Allows you to specify the reserve size of memory after you enable Memory Balloon. Allows you to enable Kernel-Same Page Merging for a VM instance. It detects VM memory pages mapped to physical memory pages with identical content and remaps these VM memory pages to the same physical memory page, allowing multiple VM instances share host memory resources and reducing resource wastes. Audits all of the actions performed on VM instances, which Audit effectively ensures the security of the Cloud environment. Allows you to customize the items to be displayed on a VM Custom Column list. Allows you to export the VM information as a CSV table, Export CSV File which helps in statistical analysis and problem diagnosis. Provides three deletion policies to lower risks caused by Resource Deletion misoperations. The policies include Direct, Delay (default), Policy and Never. Issue: V5.1.8 153Technical Whitepaper / 3 Product Features Type Features Description Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. Bulk Action Allows you to manage volumes in bulk. Create Volume Provides multiple strategies to create volumes. Allows you to manage the lifecycle of volumes, such as Manage Volume creating, enabling, disabling, and deleting volumes. Attach/Detach Allows you to attach/detach a volume to/from an instance. Instance Allows you to migrate a volume to another host. This action applies to local primary storage only. Change Host Allows you to migrate a volume based on the workloads of the destination host. Allows you to migrate a volume to another primary storage. Allows you to migrate valid data, and the migrated volume follows the provisioning type of the target primary storage. Supports volume migration across the same type of primary Volume storage, including Ceph↔Ceph, NFS↔NFS, and SharedBloc k↔SharedBlock. Allows you to migrate volumes not attached to any instances Change Primary between Ceph↔Ceph, NFS↔NFS, and SharedBlock↔ Storage SharedBlock. Allows you to migrate volumes attached to a VM instance in the stopped state across SharedBlock primary storage. Supports volume migration across Ceph pools within the same Ceph primary storage. Allows you to clean up raw data after migration to release more space after you confirm the data integrity. Change Owner Allows you to change the owner of a volume. Allows you to expand a volume that is not attached to any instance. Resize Volume Allows you to expand the volume of a running or stopped instance. 154 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description In Ceph primary storage, allows you to expand a shared volume that is not attached to any instance or is attached to a stopped instance. Allows you to customize tags for volumes so that you can Custom Tag locate them quickly. Allows you to create a backup for a volume that is attached to a running instance. Volume Backup Allows you to create either an incremental backup or a full backup for a volume. This feature is provided by the Backup Service module. Allows you to create a template image based on a volume, and helps you to create volumes in bulk in a custom way. Allows you to create an image for a volume that is not attached to any instance. Allows you to create an image for a volume that is attached to a running or stopped instance. Volume Image In SharedBlock primary storage, allows you to create an image for a shared volume that is not attached to any instance or is attached to a stopped instance. In Ceph primary storage, allows you to create an image for a shared volume that is not attached to any instance or is attached to a running or stopped instance. Allows you to schedule snapshot creation at specified time points to record the state of a root volume or data volume before you perform a business-sensitive operation. This Volume Snapshot allows rollback in case of breakdowns. Allows you to restore a volume snapshot as needed. Allows you to delete volume snapshots in bulk. Set Volume QoS Allows you to set QoS for volumes. Allows you to merge snapshots of a volume into one flat snapshot to improve resource performance and data security. Flatten Allows you to unlink the dependency between linked clone volumes and source volumes by flattening to achieve data independence. Issue: V5.1.8 155Technical Whitepaper / 3 Product Features Type Features Description Allows you to create shared volumes in Ceph or SharedBlock Shared Volume primary storage. Audits all of the actions performed on volumes, which Audit effectively ensures the security of the Cloud environment. Allows you to export the volume information as a CSV table, which helps in statistical analysis and problem diagnosis. Allows you to specify volume information items to be Export CSV File contained in the CSV table. Allows you to export the information of the root volumes associated with selected data volumes simultaneously. Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), Resource Deletion and Never. Policy Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. Bulk Action Allows you to manage images in bulk. Allows you to add two types of images: system image (ISO/ Image) and volume image (Image). Allows you to set the CPU architecture of an image, including x86_64, aarch64, and mips64el. Creating VM instances, creating VM images, and cloning VM instances will inherit the CPU architecture of the original image. Allows you to set the image platform, such as Linux,Windows , and Other. Image Allows you to upload an image by using an URL or local Add Image browser. Allows you to view the image uploading speed and remaining time if you upload an image by using the local browser. Allows you to set the BIOS mode for an image, including Legacy and UEFI. Creating VM instances, creating VM images, and cloning VM instances will inherit the BIOS mode of the original image. Calculates the MD5 values of images uploaded to ImageStore for you to validate the image integrity after the uploading. 156 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of images, such as adding Manage Image , enabling, disabling, and deleting images. Allows you to migrate an image to another backup storage. Change Backup This action applies to Ceph backup storage only. Storage Allows you to clean up raw data after migration to release more space after you confirm the data integrity. Allows you to export an image from an ImageStore or Ceph backup storage. Export Image Provides the MD5 value of the downloaded image to check the image integrity. Allows you to synchronize images among different Sync Image ImageStore backup storage in the same management node. Allows you to set the sharing mode of an image, including Set Sharing Mode share globally, share to specified projects or accounts, and not share. Audits all of the actions performed on images, which Audit effectively ensures the security of the Cloud environment. Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), Resource Deletion and Never. Policy Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. Bulk Action Allows you to manage instance offerings in bulk. Allows you to select a host allocation policy, including host with minimum number of running VMs (default policy), host with minimum CPU utilization, host with minimum memory utilization, host with maximum number of running VMs, host where the VM is located last time, and random host allocation Instance Offering Create Instance to create VM instances. Offering When the host allocation strategy is host with minimum CPU utilization or host with minimum memory utilization, you can select the mandatory strategy mode or non-mandatory strategy mode (default mode). If the Cloud can obtain the host load information, it will create VM instances according to the host allocation strategy. If the Issue: V5.1.8 157Technical Whitepaper / 3 Product Features Type Features Description Cloud could not obtain the host load information, it will create VM instances according to the strategy mode. Allows you to set disk QoS and network QoS for an instance offering. Allows you to set advanced parameters through JSON to customize an instance offering. Manage Instance Allows you to manage the lifecycle of images, such as Offering creating, enabling, disabling, and deleting instance offerings. Allows you to set the sharing mode of an instance offering Set Sharing Mode , including share globally, share to specified projects or accounts, and not share. Audits all of the actions performed on instance offerings Audit , which effectively ensures the security of the Cloud environment. Bulk Action Allows you to manage disk offerings in bulk. Allows you to set the disk QoS for a disk offering. Create Disk Offering Allows you to set advanced parameters through JSON to customize a disk offering. Disk Allows you to manage the lifecycle of disk offerings, such as Manage Disk Offering Offering creating, enabling, disabling, and deleting disk offerings. Allows you to set the sharing mode of a disk offering, Set Sharing Mode including share globally, share to specified projects or accounts, and not share. Audits all of the actions performed on disk offerings, which Audit effectively ensures the security of the Cloud environment. Allows you to manage physical GPU specifications in bulk. Bulk Action vGPU specifications do not support bulk actions. Automatically detects available physical GPU specifications GPU Manage Physical GPU on the Cloud and lists them in the UI. Specificat Specification Allows you to enable or disable a physical GPU specification. ion Generates virtual GPU specifications from the detected Manage Virtual GPU physical GPU specifications and lists them in the UI. Specification Allows you to enable or disable a virtual GPU specification. 158 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to set ROM for physical GPU specifications for Set ROM physical GPU passthrough. Allows you to set the sharing mode of a GPU specification Set Sharing Mode , including share globally, share to specified projects or accounts, and not share. Audits all of the actions performed on GPU specificat Audit ions, which effectively ensures the security of the Cloud environment. Allows you to set a health check mechanism, including load balancer health check and VM health check to trigger elastic self-healing. Allows you to set the resource monitoring and alarm mechanism to trigger elastic scaling. The mechanism includes trigger metrics, scale-out policy, scale-in policy , and whether to enable alarm notification (if enabled, an endpoint is required). The trigger metrics include both Create Auto-Scaling external monitoring items (VM Memory Utilization Average, Group VM CPU Utilization Average) and internal monitoring items ( VM Memory Utilization Average, VM CPU Utilization Average ) of VM instances. Note that an agent is required for internal monitoring. Allows you to set a periodic policy (scale-out policy or scale Auto- -in policy) for an auto-scaling group. The scale-out/scale- Scaling in cycle can be accurate to minutes with a minimum cycle Group interval of 15 minutes. Allows you to manage the lifecycle of auto-scaling groups Manage Auto-Scaling , such as creating, enabling, disabling, and deleting auto- Group scaling groups. Allows you add an auto-scaling group to or remove an auto- scaling group from a VM scheduling group so as to associate Add/Remove VM with/disassociate from related VM scheduling policies. This Scheduling Group way, you can manage the distribution of VM instances in 他和 on hosts and ensure high performance and high availability. Changing image takes effect only on VM instances that are Change Image newly created or added to the group. The images of existing VM instances do not change. Allows you to view the scaling activities in an auto-scaling Scaling Records group. Issue: V5.1.8 159Technical Whitepaper / 3 Product Features Type Features Description Audits all of the actions performed on auto-scaling groups Audit , which effectively ensures the security of the Cloud environment. Allows you to schedule snapshot creation at specified time points to record the state of an instance before you perform a Create Snapshot business-sensitive operation. This allows rollback in case of breakdowns. Displays instances and snapshots on the snapshot management page with instances on the left and snapshots on the right. You can view the relationship between instances and snapshots dynamically. The instance panel on the left allows you to sort instances Snapshot Manage Snapshot according to their snapshot count or snapshot size. The snapshot panel on the right allows you to view the snapshots by list or by topology. Allows you to manage the lifecycle of snapshots, such as creating and deleting snapshots. Create Instance Allows you to create an instance from an instance snapshot. Revert Snapshot Allows you to restore an instance from an instance snapshot. Audits all of the actions performed on snapshots, which Audit effectively ensures the security of the Cloud environment. Allows you to create four types of VM scheduling policies: VM Exclusive from Each Other, VM Affinitive to Each Other, VMs Affinitive to Hosts, and VMs Exclusive from Hosts. The former two define the relationship between VM instances and Create VM Scheduling the latter two define the relationship between hosts and VM Policy instances. VM Every four of the VM scheduling policies can be executed Scheduling based on either of the following two mechanism: Hard and Policy Soft. Allows you to manage the lifecycle of VM scheduling policies Manage VM , such as creating, editing, enabling, disabling, and deleting Scheduling Policy scheduling policies. Associate/Disassocia Allows you to associate with/disassociate from one or more te VM Scheduling VM scheduling polices with a VM scheduling group. Group 160 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to associate/disassociate one or more VM Associate/Disassocia scheduling polices with/from a host scheduling group. te Host Scheduling You can associate/disassociate only VMs Affinitive to Hosts Group and VMs Exclusive from Hosts with/from a host scheduling group. Allows you to add one or more VM instances to or remove Manage VM one or more VM instances from a VM scheduling group. Scheduling Group Allows you to manage the lifecycle of VM scheduling groups, such as creating, editing, and deleting VM scheduling groups. Allows you to add one or more hosts to or remove one or more hosts from a VM scheduling group. Manage Host Scheduling Group Allows you to manage the lifecycle of host scheduling groups , such as creating, editing, and deleting host scheduling groups. Audits all of the actions performed on VM scheduling Audit polices, which effectively ensures the security of the Cloud environment. Allows you to generate SSH key pairs on the Cloud or import a generated SSH public key to the Cloud. Create SSH Key Supported encryption methods: ssh-rsa、ssh-dss、ecdsa- sha2-nistp256、ssh-ed25519、ssh-ecdsa. SSH Key Allows you to manage the lifecycle of SSH keys, such as Manage SSH Key creating, editing, and deleting SSH keys. Allows you to attach/detach SSH keys to VM instance. VM Attachment/ Detachment Allows you to attach one SSH key to one or more VM instance. In a data center, a zone corresponds to an equipment room . You can create one or more zones as needed, and create Create Zone clusters/network resources and primary storage to each zone . Zone Allows you to manage the lifecycle of zones, such as creating Manage Zone , enabling, disabling, and deleting zones. Allows you to manage the clusters, baremetal clusters/elastic Manage Associated baremetal clusters (licenses are required), primary storage, Resources backup storage, L2 networks and other resources in a zone. Issue: V5.1.8 161Technical Whitepaper / 3 Product Features Type Features Description Audits all of the actions performed on zones, which effectivel Audit y ensures the security of the cloud environment. Allows you to define cluster attributes (KVM and XDragon ) based on the hypervisor type of hosts. Hosts in a KVM cluster use the KVM virtualization technology, and hosts in a XDragon cluster use the X-Dragon architecture. Allows you to define cluster attributes based on the host CPU Create Cluster architecture, including x86_64, aarch64, and mips64el. Allows you to specify a VDI network and migration network for a cluster. Allows you to set the VM CPU model and host CPU model in a cluster as needed. Allows you to manage the lifecycle of clusters, such as Manage Cluster creating, enabling, disabling, and deleting clusters. Allows you to manage the VM instances, hosts, primary Manage Associated storage, iSCSI storage, NVMe storage, L2 networks, Resources peripheral devices, and other resources in a cluster. Allows you to set the CPU overcommit, memory overcommit, and host reserved memory for all VM instances in a cluster. Cluster Allows you to enable vNIC multi-queue upgrading for all VM instances in a cluster to improve the VM performance. Allows you to enable multi-queue driver support for all VM NICs in a cluster to allocate Virtio NIC traffic to multiple CPUs . Allows you to enable huge page for all hosts in a cluster, which effectively reduce the CPU performance loss of VM Advanced Settings instances. Allows you to enable Hyper-V simulation for all Windows VM instances in a cluster. Allows you to set the default graphics card type at the VM startup for all VM instances in a cluster. Allows you to enable KVM virtualization flag for all VM instances in a cluster. Allows you to enable Dynamic Resource Scheduling (DRS ) for clusters. This feature monitors the CPU or memory load of hosts on a cluster basis, and allows you to configure 162 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description manual or auto DRS strategy to balance cluster loads and improves O&M efficiencies. Manual DRS provides scheduling suggestions based on which you can schedule resources for load balancing. Auto DRS schedules resources based on the system scheduling algorithm without arousing your awareness. Allows you to enable Zero Copy for all hosts in a cluster. Enabling this feature will reduce the number of data copies between user space and kernel space, lower CPU usage, and improve vNIC performance. Audits all of the actions performed on clusters, which Audit effectively ensures the security of the cloud environment. Bulk Action Allows you to manage hosts in bulk. Allows you to add hosts manually or by importing a template. You can add up to 500 hosts at a time. Add Host Supports two hypervisor types: KVM and XDragon. KVM hosts use the KVM virtualization technology and XDragon hosts use the X-Dragon architecture. Allows you to manage the lifecycle of hosts, such as adding Manage Host , enabling, disabling, reconnecting, putting into maintenance mode, deleting, starting, shutting down, and restarting hosts. Allows you to customize tags for hosts so that you can locate Custom Tag them quickly. Host Allows you to change the SSH password of a host. The new Change Host SSH password takes effect after the host automatically reconnects Password . Allows you to modify the IPMI username and password of a Modify IPMI Info host. Allows you to enter the web terminal of a host and perform Enter Web Terminal operations on the host. Allows you to bind multiple physical NICs on the host. Add Bond Supports two bond modes: active-backup mode and LDAP mode. Manage Associated Allows you to manage the VM instances, VPC vRouters, and Resources other virtual resources on a host. Issue: V5.1.8 163Technical Whitepaper / 3 Product Features Type Features Description After you deploy SAN storage (iSCSI storage and FC storage ) on a host, you can manage the LUNs on the host and pass through them to VM instances. Allows you to manage the physical NICs detected on a host, generate VF NICs from these physical ones through SR-IOV , and pass through the VF NICs to VM instances. These VF NICs inherit the high performance of those physical ones. Allows you to manage the physical GPU devices detected on a host and pass through them with other peripheral devices (such as GPU graphics card and GPU sound cards) to VM instances. Allows you to generate virtual GPU devices from physical GPU devices (NVIDIA/AMD graphics cards) and attach these virtual GPU devices to VM instances. Allows you to manage the USB devices detected on a host and pass through them to VM instances. Allows you to manage the PCI devices detected on a host, edit the PCI allowlist, and pass through these PCI devices to VM instances. The PCI devices include Ali-NPU cards, IB cards in PCI mode, and FPGA cards. When the overall workload decreases, the Cloud is working on supporting the consolidation of workloads and the redistribution of VM instances among hosts in a cluster so that some hosts can be powered off to reduce power consumption. Intel EPT Hardware Allows you to enable Intel EPT hardware assist for Intel Assist CPUs to improve the CPU performance. Monitors and displays host metrics such as CPU, memory, disk read and write, disk size, and NIC throughput. Host Monitoring Monitors and displays the number and status of hardware devices on the host, such as CPU, memory, disk, RAID card , power supplu slot, fan, temperature sensor, physical GPU, and vGPU. Audits all of the actions performed on hosts, which effectively Audit ensures the security of the Cloud environment. Allows you to export the host information as a CSV table, Export CSV File which helps in statistical analysis and problem diagnosis. 164 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage GPU devices in bulk, such as enabling Bulk Action /disabling GPU devices. Allows you to view all physical GPUs and vGPUs in the current zone. View GPU Devices Provides a directory tree, allowing you to locate a GPU device quickly by the cluster or the node that the GPU resides on or the instance that the GPU is attached to. Allows you to manage the lifecycle of physical GPU devices, such as enabling/disabling physical GPU devices and editing the GPU name. Allows you to execute virtualization and virtualization restoration actions on physical GPU devices. Allows you to set the sharing mode of a physical GPU device Manage Physical GPU , including share globally, share to specified projects or Devices accounts, and not share. Allows you to passthrough physical GPUs to VM instances. GPU Monitors and displays physical GPU metrics such as Device GPU utilization, memory utilization, power consumption, temperature, fan speed, PCIe RX I/O (only of some NVIDIA GPU devices), and PCIe TX I/O (only of some NVIDIA GPU devices). Allows you to manage the lifecycle of vGPU devices, such as enabling/disabling vGPU devices. Allows you to set the sharing mode of vGPU device, including Manage vGPU share globally, share to specified projects or accounts, and Devices not share. Allows you to attach vGPU devices to VM instances. Monitors and displays vGPU metrics such as vGPU utilization and memory utilization. Audits all of the actions performed on GPU devices, which Audit effectively ensures the security of the Cloud environment. Allows you to export the GPU device information as a Export CSV File CSV table, which helps in statistical analysis and problem diagnosis. Primary Allows you to use the local disk directory of your host as a Local Storage Storage primary storage. Issue: V5.1.8 165Technical Whitepaper / 3 Product Features Type Features Description Supported backup storage: ImageStore. Allows you to manage the lifecycle of local primary storage , such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting local primary storage. Allows you to manage VM instances, volumes, clusters, hosts, and other resources on a local primary storage. Monitors and displays the percentage of used capacity of the local primary storage. Supports predicting physical storage usage trend for local primary storage. Supports NFS protocols. All hosts can automatically mount the same NFS shared directory as the primary storage. Supported backup storage: ImageStore. Allows you to specify a storage network for NFS primary storage. The storage network is used to check the health status of VM instances. Allows you to manage the lifecycle of NFS primary storage , such as adding, enabling, disabling, reconnecting, putting NFS into maintenance mode, and deleting NFS primary storage. Allows you to manage VM instances, volumes, clusters, and other resources on a NFS primary storage. Allows you to clean up the raw data preserved after migration across NFS primary storage. Monitors and displays the percentage of used capacity of NFS primary storage. Supports predicting physical storage usage trend for NFS primary storage. Supports network shared storage provided by commonly used distributed file systems, such as MooseFS, GlusterFS, OCFS2, and GFS2. SharedMountPoint Supported backup storage: ImageStore. Allows you to specify a storage network for SharedMoun tPoint primary storage. The storage network is used to check the health status of VM instances. 166 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of SharedMountPoint primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedMountPoint primary storage. Allows you to manage VM instances, volumes, clusters, and other resources on a SharedMountPoint primary storage. Monitors and displays the percentage of used capacity of SharedMountPoint primary storage. Supports predicting physical storage usage trend for SharedMountPoint primary storage. Supports Ceph distributed block storage. Supported editions: Ceph open source edition (J/L/N) and Ceph enterprise edition . If you add Ceph enterprise to the Cloud, you can enjoy the license validity reminder. Supported backup storage: ImageStore and Ceph. Allows you to specify Ceph pools such as root volume pool , data volume pool, and image cache pool when you add a Ceph primary storage. You can manage all the Ceph pool centrally, add more Ceph pools to expand the capacity, customize the display name of Ceph pool, and specify Ceph pools when you create VM instances, clone VM instances Ceph , and create volumes. You can also create alarms for Ceph pools. Allows you to specify a storage network for Ceph primary storage. The storage network is used to check the health status of VM instances. Allows you to add multiple Ceph monitors and manage all the monitors centrally. Allows you to manage the lifecycle of Ceph primary storage , such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph primary storage. Allows you to manage VM instances, volumes, block storage volumes, clusters, and other resources on a Ceph primary storage. Issue: V5.1.8 167Technical Whitepaper / 3 Product Features Type Features Description Allows you to clean up the original data preserved after migration across Ceph primary storage. Monitors and displays the percentage of used capacity of Ceph primary. Supports predicting physical storage usage trend for Ceph primary storage. Allows you to use a block device divided from a SAN storage as a storage pool. SharedBlock primary storage supports iSCSI and FC shared access protocols. Supported backup storage: ImageStore. Allows you to specify a provisioning method (thick provisioni ng or thin provisioning) when you add a SharedBlock primary storage. You can also specify the provisioning method when you create VM instances, clone VM instances, or create volumes by using a SharedBlock primary storage. Allows you to specify a storage network for SharedBlock primary storage. The storage network is used to check the health status of VM instances. Allows you to add multiple shared blocks and refresh the storage capacity to view its changes when you expand or SharedBlock replace a block device. Allows you to forcibly clean up the data in a block device, such as the signature in the file system, RAID, and partition table. Allows you to manage the lifecycle of SharedBlock primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedBlock primary storage. Allows you to manage VM instances, volumes, clusters , LUNs, and other resources on a SharedBlock primary storage. Allows you to clean up the original data preserved after migration across SharedBlock primary storage. Monitors and displays the percentage of used capacity of SharedBlock primary storage. 168 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Supports predicting physical storage usage trend for SharedBlock primary storage. Uses vhost-user mode to connect with high-performance SSD distributed storage. Supported backup storage: ImageStore. Allows you to manage the lifecycle of Vhost primary storage , such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Vhost primary storage. Vhost Allows you to manage VM instances, volumes, block storage volumes, clusters, and other resources on a Vhost primary storage. Monitors and displays the percentage of used capacity of Vhost primary storage. Supports predicting physical storage usage trend for Vhost primary storage. Supports more than one local primary storage per cluster. Supports more than one NFS primary storage per cluster. Supports more than one SharedBlock primary storage per cluster. Support Multiple Supports one local primary storage and one NFS/ Primary Storage Per SharedMountPoint/SharedBlock primary storage per cluster. Cluster Supports one Ceph primary storage and multiple SharedBloc k primary storage per cluster. Supports one Ceph primary storage and up to 3 LocalStora ge primary storage per cluster. Supports one Vhost primary storage per cluster. Allow you to set the space preallocation policy for volumes on local, NFS, SharedMountPoint, and SharedBlock primary storage. Advanced Settings Allow you to set the storage preallocation policy for SharedBlock primary storage. Allow you to set storage overcommit for all types of primary storage. Issue: V5.1.8 169Technical Whitepaper / 3 Product Features Type Features Description Audits all of the actions performed on primary storage, which Audit effectively ensures the security of the cloud environment. Stores image files as image slices and supports incremental storage. Supported primary storage: LocalStorage, NFS, SharedMoun tPoint, Ceph, and SharedBlock. Allows you to obtain the existing image files under the mount path of the ImageStore backup storage. Allows you to specify a data network for an ImageStore backup storage for data communication with compute nodes. Supports image synchronization between different ImageStore backup storage on the same management node, and allows you to specify an image synchronization network ImageStore for ImageStore backup storage. Allows you to manage the lifecycle of ImageStore backup storage, such as adding, enabling, disabling, reconnecting, and deleting ImageStore backup storage. Backup Allows you to clean up invalid data stored in ImageStore Storage backup stores to releases storage space. Allows you to change the password for an ImageStore backup storage. Allows you to centrally manage images in an ImageStore backup storage. Monitors and displays the percentage of used capacity of ImageStore primary storage. Stores image files as Ceph distributed blocks. Supported primary storage: Ceph. Allows you to add multiple Ceph monitors and manage all the monitors centrally. Ceph Allows you to specify Ceph pools when you add a Ceph backup storage. Allows you to specify a data network for a Ceph backup storage for data communication with compute nodes. 170 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of Ceph backup storage , such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph backup storage. Allows you to centrally manage images in a Ceph backup storage. Allows you to clean up the original data preserved after migration across Ceph backup storage. Monitors and displays the percentage of used capacity of Ceph backup storage. Audits all of the actions performed on backup storage, which Audit effectively ensures the security of the cloud environment. Allows you to add an iSCSI server and directly log in to iSCSI storage after you add the server successfully. Synchronizes data on iSCSI storage and displays all block devices on iSCSI storage in real time. Allows you to add a block device divided from an iSCSI iSCSI storage as a SharedBlock primary storage and pass through it to VM instances. Allows you to manage the lifecycle of iSCSI storage, such as enabling, disabling, and deleting iSCSI storage. Allows you to attach/detach an iSCSI storage to/from a SAN cluster. Storage Synchronizes device information after you deployed an FC storage and displays the FC storage and its block devices in real time. Allows you to add a block device divided from an FC storage as a SharedBlock primary storage and pass through it to VM FC instances. Synchronizes information about a single block device on an FC storage. Checks the status of the cluster where block devices are located. Synchronizes device information after you deployed an NVMe / NVMe storage and displays the NVMe storage and its block Storage devices in real time. Issue: V5.1.8 171Technical Whitepaper / 3 Product Features Type Features Description Allows you to add a block device divided from an FC storage as a SharedBlock primary storage. Allows you to attach network-type tags to physical NIC ports to mark the actual usage of the networks they reside on. NIC ports with tags can be displayed on this page by network Physical types or by cluster. / Network Allows you to modify the network types of physical NIC ports. Allows you to view the flow monitoring based on network types. Three entries are provides: Dashboard, cluster details pages, and host details pages. Supports the following types of L2 networks: L2NoVlanNe twork, L2VlanNetwork, VxlanNetwork, and HardwareVx lanNetwork. VLAN (802 1Q) supports a maximum of 4094 logical networks, and VXLAN supports a maximum of 16 million logical networks. VxlanNetwork is a software VXLAN-based solution that effectively addresses the shortage of logical network segments in the cloud data center and MAC flooding in upper layer switches. HardwareVxlanNetwork is a solution for working with third- party hardware SDN. By adding an SDN controller, you can Network take over the SDN network of hardware switches on the L2 Network Resource Cloud, therefore reducing network latency and improving VXLAN network performance. Supports four types of network acceleration mode, including Normal, SR-IOV, and Smart NIC. The normal mode supports all types of L2 networks and the latter two support only L2VlanNetwork and L2NoVlanNetwork. Allows you to change an L2NoVlanNetwork to an L2VlanNetwork or change an L2VlanNetwork to an L2NoVlanNetwork. Allows you to modify the VLAN ID of an L2VlanNetwork. Allows you to modify the VNI of a VxlanNetwork. Allows you to manage the lifecycle of L2 networks, such as creating and deleting L2 networks. 172 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to centrally manage L3 networks and clusters on an L2 network. Supports software SDN VXLAN pools and hardware SDN VXLAN pools. A software SDN VXLAN pool is a collection of VxlanNetwork L2 networks, and a hardware SDN VXLAN pool is a collection of HardwareVxlanNetwork L2 networks. Allows you to manage the lifecycle of VXLAN pools, such as VXLAN Pool creating and deleting VXLAN pools. Allows you to manage VNI ranges in a VXLAN pool and customize the name of the VNI ranges. Allows you to centrally manage the VTEP, clusters, and VXLAN networks in a VXLAN pool. A public network is an L3 network that has direct access to the Internet. Allows you to manage the lifecycle of public networks, such as creating and deleting public networks. Allows you to add IP ranges of IPv4 and IPv6 types. Allows you to reserve network ranges of IPv4 and IPv6 addresses. IPv4 public networks allow you to add either an IP range or an address pool. An address pool can be used to create Public Network virtual IP addresses only. Allows you to customize the MTU of a public network to limit the size of network transmission packets. Monitors and displays the IP usage statistics of public networks, which helps to improve IP planning efficiency. Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a public network. Allows you to enable or disable DHCP service and modify DHCP service IP. A flat network is an L3 network connected to the network where the host is located and has direct access to the Flat Network Internet. VM instances in flat network networks can use IP resources of an actual network. Issue: V5.1.8 173Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of flat networks, such as creating and deleting flat networks. Allows you to enable or disable IP Address Management for a flat network. Allows you to add IP ranges of IPv4 and IPv6 types. Allows you to reserve network ranges of IPv4 and IPv6 addresses. IPv4 flat networks support the following network services : DHCP, User Data, elastic IP, security group, and port mirroring. IPv6 flat networks support the following network services: DHCP, DNS, elastic IP, and security group. Allows you to customize the MTU of a flat network to limit the size of network transmission packets. Monitors and displays the IP usage statistics of flat networks, which helps to improve IP planning efficiency. Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a flat network. Allows you to enable or disable DHCP service and modify DHCP service IP. A VPC network is an L3 private network where VM instances can be created. A VM instance in a VPC network can access the Internet through a VPC vRouter. Allows you to manage the lifecycle of VPC networks, such as creating and deleting VPC networks. Allows you to add IP ranges of IPv4 and IPv6 types. Allows you to reserve network ranges of IPv4 and IPv6 VPC Network addresses. IPv4 VPC networks support the following network services : DHCP, User Data, DNS, SNAT, route table, elastic IP , port forwarding, load balancing, IPsec tunnel, security group, dynamic routing, multicast routing, VPC firewall, port mirroring, and netflow. IPv6 VPC networks support the following network services: DHCP, DNS, and security group. 174 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to attach/detach a VPC vRouter to/from a VPC network. Allows you to customize the MTU of a VPC network to limit the size of network transmission packets. Monitors and displays the IP usage statistics of VPC networks, which helps to improve IP planning efficiency. Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a VPC network. A VPC vRouter is a dedicated VM instance that provides multiple network services. Allows you to specify a host on which a VPC vRouter starts. Allows you to specify a primary storage when you create a VPC vRouter. Allows you to specify a default IPv4 address or IPv6 address for a VPC vRouter. Allows you to set a DNS (IPv4/IPv6) on a VPC vRouter and centrally manage all the DNS on the VPC vRouter. Allows you to associate the virtual CPUs (vCPUs) of a VPC vRouter with host pCPUs stringently and allocate specific pCPUs for the VPC vRouter, thus improving VPC vRouter performances. VPC vRouter Allows you to manage the lifecycle of VPC vRouters, such as creating, starting, stopping, restarting, and deleting VPC vRouters. Allows you to migrate a VPC vRouter to another host without changing the primary storage. This action is supported only by VPC vRouters in the running state. We recommend that you perform this action during off-peak hours. Allows you to migrate a VPC vRouter to another primary storage and host. You can hot migrate a VPC vRouter across different types of primary storage, including LocalStorage↔ SharedBlock, LocalStorage↔NFS, and SharedBlock↔NFS; You can hot migrate a VPV vRouter across primary storage of the same type, including SharedBlock↔SharedBlock Allows you to access a VPC vRouter by using a terminal. You can also set the console password for a VPC vRouter. Issue: V5.1.8 175Technical Whitepaper / 3 Product Features Type Features Description Supports auto migration across clusters. Applicable scenarios: start up a VPC vRouter on another host to achieve HA or migrate a VPC vRouter to another host if the source host enters the maintenance mode. Allows you to set the CPU model for a VPC vRouter through three entries: Global Setting, Cluster Setting, and VPC vRouter Setting. The setting takes effect with the following priority: Global Setting < Cluster Setting < VPC vRouter Setting. Allows you to enable distributed routing for a VPC vRouter as needed to optimize east-west traffic. Allows you to enable the SNAT network service for a VPC vRouter as needed. Supports STS to improve network transmission efficiency. Supports external monitoring: Collects the VPC vRouter data such as CPU, memory, disk I/O, NIC data from hosts by using libvirt. Supports internal monitoring: Collects the VPC vRouter data such as CPU, memory, and disk size data from VM instances by using an agent of the VPC vRouter. Allows you to centrally manage the VPC networks, public networks, and DNS resources associated with a VPC vRouter. Allows you to set QoS for a VPC vRouter to limit its upstream and downstream bandwidth. Allows you to centrally manage the network services provided by a VPC vRouter, such as virtual IP addresses, elastic IP addresses, IPsec tunnels, port forwarding, and load balancing. Supports OSPF dynamic routing protocols in large-scale network environment. Supports multicast routing to forward multicast messages sent by multicast sources to VM instances. Has higher resource priority than VM instances by default. When resource contention occurs, the resource priority is as 176 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description follows: VM instances with Normal priority < VM instances with High priority < VPC vRouters. A VPC vRouter HA group consists of two VPC vRouters. Either VPC vRouter can be a primary or secondary VPC vRouter for the group. If the primary VPC vRouter does not work as expected, the VPC vRouter becomes the secondary VPC vRouter in the group to ensure high availability of business. VPC vRouter HA Allows you to manage the lifecycle of VPC vRouter HA Group groups, such as creating and deleting VPC vRouter HA groups. Allows you to add a VPC vRouter to an HA group and centrally manage all VPC vRouters in this group. Any configuration changes on a VPC vRouter will apply to its partner VPC vRouter. Supports VPC vRouter image. Allows you to set the CPU architecture of a vRouter image , including x86_64 and aarch64. Creating VPC vRouters or load balancing instances will inherit the CPU architecture of the original image. Allows you to upload a vRouter image by using a URL or local browser. vRouter Image Allows you to manage the lifecycle of vRouter images, such as creating, enabling, disabling, deleting, recover, and completely deleting vRouter images. Allows you to export a vRouter image on the UI from ImageStore or Ceph backup storage. Allows you to centrally manage exported vRouter images and provides the MD5 value of the downloaded image to check the image integrity. Allows you to manage the lifecycle of vRouter offerings, vRouter Offering such as creating, enabling, disabling, and deleting vRouter offerings. Allows you to add external SDN controllers to control network devices such as external switches. This helps to reduce SDN Controller network latency and improve the VXLAN network performanc e. Issue: V5.1.8 177Technical Whitepaper / 3 Product Features Type Features Description Currently, only H3C SDN controllers (VCFC) are supported. Allows you to manage the lifecycle of SDN controllers, such as creating and deleting SDN controllers. A management network is used to manage physical resources in the Cloud. Allows you to manage the lifecycle of management networks , such as creating and deleting management networks. Allows you to add IP ranges of the IPv4 type. Management Network Allows you to customize the MTU of a management network to limit the size of network transmission packets. Monitors and displays the IP usage statistics of management networks, which helps to improve IP planning efficiency. Allows you to centrally manage the IP ranges (IPv4) on a management network. A flow network is a dedicated network for port mirror transmission. You can use a flow network to transmit the mirrors of data packets of NIC ports to the target ports. Allows you to manage the lifecycle of flow networks, such as creating and deleting flow networks. Flow Network Allows you to add IP ranges of the IPv4 type. Monitors and displays the IP usage statistics of flow networks , which helps to improve IP planning efficiency. Allows you to centrally manage the IP ranges (IPv4) on a flow network. Audits all of the actions performed on network resources Audit , which effectively ensures the security of the cloud environment. Provides security control over VM instances on L3 networks. Allows you to manage the lifecycle of security groups, such as creating, enabling, disabling, and deleting security groups. Network Security Group Service Allows you to add/delete ingress/egress rules to/from a security group and manage these rules centrally, including modifying,enabling, disabling, importing, and exporting rules and setting rule priorities.. 178 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Supports ALL, TCP, UDP, and ICMP protocols for security group rules. Allows you to set a source security group by security group rules. Security group rules apply the allowlist and blocklist mechanism. For newly created security groups, ingress and egress rules with the ALL protocol type are configured by default. The rules allow mutual communications among VM instances in the same security group. Allows you to centrally manage VM NICs associated with a security group. Provides multiple network services by using VIPs in bridged network environments. Divides VIPs into public VIP, flat network VIP, and VPC VIP based on the network where the VIP is created. Divides VIPs into system VIP and custom VIP based on how the VIP is created. Virtual IP Address ( VIP) Allows you to manage the lifecycle of VIPs, such as adding and deleting VIPs. Allows you to set QoS for public network VIPs and flat network VIPs. You can set a QoS individually for a VIP or make it use a shared bandwidth. Monitors and displays VIP metrics such as network traffic and network packet rate. IP addresses in a private network are translated into an EIP that is in another network. This way, private networks can be accessed from other networks by using EIPs. Divides EIPs into public EIP and flat network EIP based on Elastic IP Address ( the network where the EIP is created. EIP) Allows you to manage the lifecycle of EIPs, such as adding and deleting EIPs. Allows you to associate/disassociate an EIP with/from a VM NIC. Allows you to change the owner of an EIP. Issue: V5.1.8 179Technical Whitepaper / 3 Product Features Type Features Description Works based on the layer-3 forwarding service provided by VPC vRouters and forwards traffic flows of specified IP addresses and ports in a public network to the specified ports of VM instances. If your public IP addresses are insufficient, you can configure port forwarding for multiple VM instances by using one public IP address and port. Port Forwarding Supports TCP and UDP. Allows you to manage the lifecycle of port forwarding, such as creating and deleting port forwarding. Allows you to associate/disassociate port forwarding with/ from a VM NIC. Distributes traffic flows of a VIP to backend servers. It automatically inspects the availability of backend servers and isolates unavailable servers during traffic distribution, which improves the availability and service capability of your business. Supports two types of load balancing services: shared- performance load balancing that works based on VPC vRouters and dedicated-performance load balancing that works based on load balancer instances. Allows you to specify the HA mode for dedicated-performanc e load balancers: single node and dual node (active-backup). Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers. Load Balancing Allows you to create shared-performance load balancers by using public networks or VPC networks. Allows you to create dedicated-performance load balancers by using public networks, flat networks, or VPC networks. Supports network traffic transmission between IPv4 and IPv6 protocols. Monitors and displays load balancer metrics such as inbound /outbound traffic and active/concurrent/new sessions. Allows you to centrally manage listeners, backend server groups, and other resources associated with load balancers. Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers. 180 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Listener protocols support TCP, HTTP, HTTPS, and UDP. Supports multiple load balancing algorithms, including Round Robin, Min Connections, Source IP Hash, and Weighted Round Robin. Health check protocols support TCP, HTTP, and UDP. Listeners that use the HTTPS protocol allow you to associate /disassociate certificates. You can upload certificates or certificate chains and manage these certificates centrally. Listeners that use the HTTP or HTTPS protocol allow you to configure forwarding rules for domain forwarding and manage these rules centrally. Supports two session persistence mechanisms: TCP/UDP -based 4th-layer session persistence and HTTP/HTTPS- based 7th-layer session persistence 4th-layer session persistence uses Source IP Hash algorithm to direct requests from clients of the same source IP address to a backend server. 7th-layer session persistence supports Round Robin, Weighted Round Robin, and Weighted Round Robin. When using Round Robin or Weighted Round Robin algorithm, a load balancer inserts or rewrites a cookie to direct requests to the backend server previously responded. When using Source IP Hash algorithm, a load balancer uses the Hash function to direct requests from clients of the same source IP address to a backend server. Allows you to associate/disassociate listeners with/from backend server groups. Listeners that use a weighted round-robin load-balancing algorithm allow you to set the weight value for each backend server separately. Allows you to manage the lifecycle of backend server groups , such as creating and deleting backend server groups. Allows you to add/remove backend server to/from backend server groups. Issue: V5.1.8 181Technical Whitepaper / 3 Product Features Type Features Description Allows you to add VM NICs or other servers outside of the Cloud as backend servers. Note that the later method applies to only dedicated-performance load balancers. Dedicated-performance load balancers allows you to create/ delete load balancer offerings. Monitors ingress and egress traffic of VPC vRouters and decides whether to allow or block specific traffic based on a defined set of security rules. Allows you to manage the lifecycle of VPC firewalls, such as creating and deleting VPC firewalls. Allows you to centrally manage rules and rule sets associated with VPC firewalls. Allows you to manage the lifecycle of rules, such as adding, enabling, disabling, and deleting rules. Configures ingress and egress rules by default after a VPC firewall is created and allows you to customize these rules as needed. Allows you to manually add rules to a VPC firewall by specifying a single IP address or an IP/port set. VPC Firewall Allows you to add multiple rules to a VPC firewall by importing a template. You can also modify the rule template and upload it as needed. Allows you to set priorities for VPC firewall rules. VPC firewall rules have three behaviors: Accept, Drop, and Reject. VPC firewall rules support the following packet status: new (new connection requests), established (established connections), invalid (unidentifiable connections), and related (new connection requests that are associated with existing connections). VPC firewall rules support the following protocols: ALL, TCP , UDP, ICMP, GRE, ESP, AH, IPIP, VRRP, IPENCAP, PIM, OSPF, and IGMP. Allows you to manage the lifecycle of rule sets, such as adding and deleting rule sets. 182 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to centrally manage rules and network resources in a rule set. Modifications on rules in a rule set take effect after you synchronize the modifications. Allows you to save firewall rules as a rule template (managed by the Cloud or export them as a CSV file (offline). Allows you to manage the lifecycle of rule templates, such as creating and deleting rule templates. Allows you to save IP/port sets as a generic template. Allows you to manage the lifecycle of IP/port sets, such as adding, enabling, disabling, and deleting IP/port sets. Encrypts and verifies IP packets that transmit over a virtual private network (VPN) from one site to another. IPsec negotiation mode: Supports only the Main mode due to security reasons. The Aggressive mode is not supported. IPsec IKE configurations: Support IKEv1 and IKEv2(default) IPsec security protocol: Supports only the Encapsulating Security Payload (ESP) protocol. IPsec encapsulation mode: Supports only the Tunnel mode. The Transport mode is not supported. IPsec Tunnel IPsec routing model: Supports only policy-based IPSec VPN . Route-based IPSec VPN is not supported. Therefore, the tunnel supports only unicast data, and does not support multicast and broadcast. Allows you to manage the lifecycle of IPsec tunnels, such as creating and deleting IPsec tunnels. Monitors the connection status of IPsec tunnels Allows you to centrally manage network resources associated with an IPsec tunnel. Supports Open Shortest Path First (OSPF) protocols. Allows you to manage the lifecycle of OSPF areas, such as Dynamic Routing creating and deleting OSPF areas. Supports two types of OSPF areas: Standard and Stub. Issue: V5.1.8 183Technical Whitepaper / 3 Product Features Type Features Description Provides three authentication methods for OSPF areas: None , Plaintext, and MD5. Allows you to centrally manage the routing configuration of OSPF areas. Monitors the ingress and egress traffic of the NICs of VPC vRouters. Allows you to manage the lifecycle of netflows, such as Netflow creating and deleting netflows. Supports two versions of data flows: V5 and V9. Allows you to centrally manage the routing configuration of netflows. Mirrors the traffic data of VM NICs and sends the traffic data to the target ports. This helps to analyze the data packets of ports, which simplifies the data monitoring and management and makes it easier to locate network errors and exceptions. Port Mirroring Allows you to manage the lifecycle of port mirroring, such as creating, enabling, disabling, and deleting port mirroring. Supports three types of sessions: Ingress, Egress, and Bi- direction. Allows you to centrally manage port mirroring sessions. Allows you to customize routing configurations as needed. Allows you to manage the lifecycle of route tables, such as adding, enabling, disabling, and deleting route tables. Allows you to centrally manage route entries and VPC vRouter resources in routing tables. Route Table Allows you to manage the lifecycle of route entries, such as adding and deleting route entries. Supports two types of route entries: static route entries and blackhole route entries. Allows you to set route priorities. Forwards the multicast messages sent by the multicast Multicast Route source to VM instances, which realizes point-to-multipoint connection between the sender and the receiver. 184 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to enable multicast route as needed. After enabled, the multicast route takes effect for all networks associated with VPC vRouters. Supports PIM-SM and PIM-SSM routing protocols. In the PIM -SM protocol, RP routers are the essential device in the PIM -SM domain. The RP addresses support static configuration and dynamic election through the BSR mechanism. Allows you to centrally manage the multicast configuration tables and multicast routing tables. Provides bandwidth sharing service and centralized speed control for public network VIPs. You can bind multiple VIPs to a shared bandwidth to allow instances using these VIPs to share the same bandwidth resource, thereby reducing the cost on public network communications. Allows you to customize the size of a shared bandwidth. Allows you to manage the lifecycle of a shared bandwidth, such creating, editing, and deleting a shared bandwidth. Shared Bandwidth Allows you to bind/unbind public network VIPs to/from a shared bandwidth. Allows you to centrally manage VIPs bound to a shared bandwidth. Allows you to view whether a shared bandwidth takes effect on VIPs bound to it. Provides an intuitive monitoring to display the flow data of all VIPs and each VIP bound to a shared bandwidth. Audits all of the actions performed on network resources Audit , which effectively ensures the security of the cloud environment. Allows you to manage the lifecycle of resource stacks, such as creating and deleting resource stacks. Allows you to create resource stacks by using a stack CloudForma template (system template or custom template), uploading a Resource Stack tion file (in UTF8-encoded format), or customizing a text (in the designer). Allows you to preview the template configurations before you complete the creation. Issue: V5.1.8 185Technical Whitepaper / 3 Product Features Type Features Description Allows you to centrally manage the templates, resources, and events associated with a resource stack. Allows you to manage the lifecycle of stack templates, such as creating, enabling, disabling, and deleting stack templates. Stack Template Allows you to create stack templates by customizing a text or uploading a file. Allows you to modify the template content as needed. Provides commonly used sample templates for your reference. Sample Template Allows you to manage the lifecycle of sample templates, such as enabling and disabling sample templates. Allows you to establish dependencies between resources by drag-and-drop connections on the canvas. Allows you to undo, redo, zoom in, zoom out, fit to canvas, delete, and clear the canvas. Designer Allows you to set global parameters of the following types: String, Number (integer or floating point), Comma-delimited list (equivalent to List in Java), and Boolean. Allows you to preview templates, generate resource stacks, and save as stack templates. Audits all of the actions performed on CloudFormation, which Audit effectively ensures the security of the cloud environment. Displays the network topology in the Cloud, helping you to manage and maintain your networks more efficiently. Allows you to refresh the topology to view latest information. Allows you to export the global topology in PNG format. Allows you to hide or unhide VM instances, highlight the Network Global Topology selected resources, view the resource information in hover, Topology and view the VM/VPC vRouter status. Allows you to fit to window and zoom in, zoom our the canvas . Allows you to search for resources by resource category and attribute within the current global topology. Custom Topology Allows you to generate a custom topology. 186 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to refresh the topology to view latest information. Allows you to export the custom topology in PNG format. Allows you to highlight the selected resources, view the resource information in hover, and view the VM/VPC vRouter status. Allows you to fit to window and zoom in, zoom our the canvas . Allows you to search for resources by resource category and attribute within the current global topology. Displays the performance metrics of key resources. Allows you to view the monitoring data by resources, including VM instance, VPC vRouter, host, backup storage, L3 network, and virtual IP. Supports two monitoring methods: external monitoring and internal monitoring. Allows you to view the monitoring data by selecting a time span. Available time spans: 15 minutes, 1 hour, 1 week, and custom. View Performance Analysis Supports advanced filtering, including filter by monitoring Performanc items (metrics and thresholds), resource scope (all resources e /specified resources), and owner scope (all owners/specified Analysis owners). Allows you to sort the items by resource name or monitoring metric. Allows you to view the monitoring data details of a single resource. Allows you to customize the number of items to be displayed on each page. By default, 10 items are displayed per page. Allows you to export all the report information or export the Export Performance information on the current page in CSV format. Analysis Report Allows you to export the average, maximum, or minimum values of the metrics for VM instances and VPC vRouters. Capacity Resource Capacity Displays the capacities and usages of key resources as Card cards in the Cloud. Management Issue: V5.1.8 187Technical Whitepaper / 3 Product Features Type Features Description Supports the following resources: primary storage, backup storage, management node, VM instance, volume, image, snapshot, and compute node. Allows you to jump to the corresponding resource list from the current card. Allows you to view top 10 resources based on the capacity usage. Supports the following resources: host, primary storage, backup storage, VM instance, volume, image, and snapshot. Resource Capacity Top 10 Allows you to sort resources by capacity utilization, used physical capacity, available physical capacity, total physical capacity. Allows you to view the disk usage details of a single resource . Allows you to view the health status of each management node in a multi-management node environment. Management Allows you to view the management IP and node status. Mode / Allows you to view the management service status, including Monitoring whether the monitor IP is reachable, whether the peer management node is reachable, whether the virtual IP is reachable, and the database status. Monitors time-series data and events and sends alarm messages to specified endpoints. Supports default alarms and custom alarms. Supports resource alarms, event alarms, and extended alarms. Allows you to manage the lifecycle of default resource alarms Monitoring , such as enabling and disabling default resource alarms. and Alarm Alarm Allows you to manage the lifecycle of custom resource alarms, such as enabling and disabling custom resource alarms. Allows you to create resource alarms for two types of time- series data: resource utilization and resource capacity. Provides three emergency levels for resource alarms: emergent, major, and info. 188 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to enable alarm recovery notification for resource alarms as needed. If enabled, when a resource monitored by a resource alarm recovers from the alarmed status, the system receives a notification. Allows you to centrally manage the endpoints and alarm records of a resource alarm. Allows you to manage the lifecycle of custom event alarms , such as creating, deleting, enabling and disabling custom event alarms. Provides three emergency levels for event alarms: emergent , major, and info. Allows you to centrally manage the endpoints and alarm records of an event alarm. Allows you to manage the lifecycle of extended alarms, such as enabling and disabling extended alarms. Allows you to centrally manage the endpoints and alarm records of an extended alarm. Provides a set of alarm rules for critical resources, which can be used to quickly establish monitoring and alarm services for these resources. Applies to resources such as hosts, VM instances, and VPC One-click Alarm vRouters. Allows you to enable or disable one-click alarms. Allows you to enable, disable, and modify a single alarm rule for a one-click alarm. Encapsulates alarm rules as a template and works with resource groups. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency. Allows you to manage the lifecycle of alarm templates, such as creating and deleting alarm templates. Alarm Template Allows you to add/remove alarm rules to/from alarm templates and centrally manage these rules in an alarm template. Allows you to attach/detach tags to/from an alarm template. Allows you to clone an alarm template. Issue: V5.1.8 189Technical Whitepaper / 3 Product Features Type Features Description Allows you to associate/disassociate resource groups with/ from an alarm template and centrally manage these resource groups of an alarm template. Groups resources based on business requirements and works with alarm templates. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency. Allows you to manage the lifecycle of resource groups, such as creating and deleting resource groups. Allows you to add/remove resources to/from a resource Resource Group group and centrally manage these resources in a resource group. Allows you to attach/detach tags to/from a resource group. Allows you to associate/disassociate alarm templates with/ from a resource group. Allows you to centrally manage the alarms, endpoints, and alarm records of a resource group. Sends messages to endpoints by using a text template. Allows you to manage the lifecycle of message templates, such as creating and deleting message templates. Supports the following endpoints: email, DingTalk, Microsoft Teams, Alibaba Cloud SMS, Universal SMS, WeCom, Lark, and Webhook. Message Template Supports the following alarm types: resource alarm and event alarm. Supports the following types of message texts: alarm message text and recovery message text. Allows you to make a template default or cancel the default setting. Only one default template is allowed. Allows you to modify the content in a message template. Allows you to connect to extended message sources. Allows you to manage the lifecycle of message sources, Message Source such as creating, enabling, disabling, and deleting message sources. Supports Ceph Enterprise. 190 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Provides preconfigured alarm message conversion template and allows you to customize parameters in the template. Allows you to obtain your subscribed information by using an endpoint. Supports default endpoints and custom endpoints (email, short message, Webhook, DingTalk, Microsoft Teams, SNMP trap receiver, WeCom, and Lark). Short message endpoints support two SMS gateway service provider: Alibaba Cloud and Emay Softcom. Default endpoints receive messages sent from the Cloud. Allows you to manage the lifecycle of custom endpoints, such as creating, enabling, disabling, and deleting custom endpoints. Endpoint Allows you to send test messages to custom endpoints to check whether the endpoints can receive Cloud alarm messages properly. Allows you to modify endpoints configurations flexibly, such as the message languages, addresses, mention members, and security settings. Allows you to add/remove alarms to/from an endpoint and centrally manage these alarms, including resource alarms and event alarms. Allows you to centrally manage messages (alarm messages and extended messages) received by an endpoint. Audits all of the monitoring and alarm actions, which Audit effectively ensures the security of the cloud environment. Allows you to view and centrally manage alarm messages sent from the Cloud . Displays alarm messages of different emergency levels in the last seven days on a bar chart. Alarm Cloud Platform Alarm Displays alarm messages of different resources in the last Message Message seven days on a pie chart. Allows you to view up to 1,000 alarm messages in the message list. Allows you to filter messages by resource. Issue: V5.1.8 191Technical Whitepaper / 3 Product Features Type Features Description Allows you to filter messages by specifying a time span. Allows you to mark alarm messages as read and filter read or unread messages as needed. Allows you to filter messages by emergency levels (emergent , major, and info). Allows you to filter messages by alarm type (resource alarm and event alarms). Allows you to converge and sort alarm messages based on the alarm times. Allows you to set a silence period for alarm messages . During the silence period, no alarm messages will be generated. You can process the alarm information when you are convenient. Allows you to cancel the silence period for alarm messages. Allows you to view the details about an alarm. Allows you to export the alarm messages as a CSV table, which helps in statistical analysis and problem diagnosis, and allows you to export the filtered alarm messages. Allows you to take over third-party alarm messages and push , manage them centrally. Extended Alarm Allows you to mark alarm messages as read and filter read or Message unread messages as needed. Allows you to filter messages by specifying a time span. Provides five inspection categories, including platform Five Inspection , compute, network, storage, and global setting. These Categories categories cover all key resources and services of the Cloud. Provides an in-built three-layer healthiness scoring Multi-layer Healthiness mechanism that scores resources and services, inspection One- Scoring Mechanism items, and the overall Cloud. It also displays the score of click healthiness for the overall Cloud. Inspection Provides O&M suggestions on resources in warning or fault O&M Suggestion status. Provides inspection introduction, summary, and results, Inspection Report and details of abnormal inspection items as well as O&M suggestions. 192 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to select inspection items for one-click inspection. Inspection Allows you to pause, resume, and cancel inspection, Management implement re-inspection, and export PDF-formatted inspection reports. Allows you to view and manage operations that are being performed. Displays the task progress and remaining time in real time. Current Task Allows you to cancel, suspend, and continue a current task as needed. Allows you to view the details about a current task. Displays the historic operations performed in the Cloud. Allows you to view all the operations that were performed. Allows you to filter operation logs by specifying a time span. Allows you to filter operation logs by task results, including succeeded, failed, canceled, canceling, exception, timeout, Historic Operation suspended, and unknown. Allows you to filter operation logs by operators. Operation Allows you to export operation logs in CSV format. Log Allows you to view the details about an operation log. Allows you to set the operation log retention period in the Global Setting. Displays the VM auto-scheduling logs triggered by the management node, such as VM recovery from HA and host maintenance. Allows you to view all the auto-scheduling logs that were triggered. Auto-Scheduling Logs Allows you to filter auto-scheduling logs by specifying a time span. Allows you to filter auto-scheduling logs by task results, including succeeded and failed. Allows you to export auto-scheduling logs in CSV format. Allows you to view the details about an auto-scheduling log. Issue: V5.1.8 193Technical Whitepaper / 3 Product Features Type Features Description Allows you to set the auto-scheduling log retention period in the Global Setting. Monitors and records all activities in the Cloud, which effectively ensures the security of the cloud environment. Allows you to filter audit records by resource actions and login actions. Audit / Allows you to filter audit records by specifying a time span. Allows you to filter audit records by task results, including succeeded and failed. Allows you export audit records in CSV format. Allows you to view the details about an audit record. Allows you to collect the logs of the Cloud and of various Collect Log nodes on the Cloud that are generated in the specified time Log range. Collection Manage Log Allows you to collect, recollect, download, delete, and cancel the collection of logs. Allows you to manage the lifecycle of scheduled jobs, such as creating, enabling, disabling, and deleting scheduled jobs. Supports VM instances and volumes. Scheduled Job Allows you to view job records centrally. Allows you to attach/detach schedulers to/from a scheduled job. Scheduled Allows you to manage the lifecycle of schedulers, such as O&M creating and deleting schedulers. Allows you to centrally manage the scheduled jobs of a Scheduler scheduler. Allows you to centrally manage schedulers that were completed. Audits all of the scheduled O&M actions, which effectively Audit ensures the security of the cloud environment. Allows you to customize tags for resources and quickly locate Tag / resources by tag type and tag name. Supports admin tags and tenant tags. 194 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of tags, such as creating and deleting tags. Allows admins to attach/detach tags to/from all resources on the Cloud and tenants to attach/detach tags to/from resources of tenants. Allows you to centrally manage resources with a tag attached . Audits tag actions, which effectively ensures the security of the cloud environment. A bill is the expense of resources totaled at a specified time period. Billing is accurate to the second. Supported bill types; project bills, department bills, and sub- account bills. Allows you to filter bills by specifying a time span. Allows you to view project bills in a list, export all of the project bills in CSV format, view the billing details of a single project, and export the bills of a single project in CSV format. Allows you to view department bills in a list, view the bills of the current department or its sub-departments, view the bills of directly affiliated projects in a list, export total bills of all directly affiliated projects in CSV format, view the billing Billing details of a single project, and export the bills of a single Bills Management project in CSV format. Allows you to view sub-account bills in a list, export all of the sub-account bills in CSV format, view the billing details of a single sub-account, and export the bills of a single sub- account in CSV format. Allows you to disable the billing feature in Global Setting. Then, the system stops billing resources and bills are no longer generated. By default, bills are generated every day at 00:00. You can change the bill generation time in the Global Setting. Allows you to set the currency symbol displayed on the UI in the Global Setting. Default value: ¥. Valid values: ¥, $, €, £, A $, HK$, ¥, CHF, and C$. Issue: V5.1.8 195Technical Whitepaper / 3 Product Features Type Features Description A pricing list is a list of unit prices of different resources. The unit price of a resource is set based on the specification and usage time of the resource. Allows you to manage the lifecycle of pricing lists, such as creating and deleting pricing lists. Allows you to set the unit price for the following resources : CPU/memory, volume (root volume/data volume), GPU device (desktop GPU and compute GPU), network (VM Pricing List public IP and virtual IP), and elastic baremetal instance ( elastic baremetal offering). Allows you to generate bills based on disk performances. You can set the billing unit price for root volumes and data volumes with different performances by setting advanced parameters. Allows you to modify the billing unit price as needed. Allows you to centrally manage the price history and related resources. Allows you to set a console proxy to log in to a VM instance. Console Proxy Allows you to reconnect a console proxy. An AccessKey pair is a security credential that one party authorizes another party to call API operations and access its resources in the Cloud. Supports two types of AccessKey: local AccessKey and third -party AccessKey. AccessKey Allows you to manage the lifecycle of local AccessKeys, Access Management such as generating, enabling, disabling, and deleting local Control AccessKeys. Allows you to manage the lifecycle of third-party AccessKeys , such as generating and deleting third-party AccessKeys. Audits all of the AccessKey actions, which effectively ensures the security of the cloud environment. An IP blocklist or allowlist identifies and filters IP addresses that access the Cloud. IP Allowlist/Blocklist Allows you to enable the IP allowlist/blocklist feature in the Global Setting as needed. 196 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of IP allowlists/blocklists, such as adding and deleting IP allowlists/blocklists. Audits all of the IP allowlist/blocklist actions, which effectively ensures the security of the cloud environment. Allows you to add URLs of third-party applications. This allows you to manage the applications in a centralized way and quickly open the applications. Supports the following types of applications: storage, Applicatio database, security, IaaS, PaaS, and SaaS applications. / n Center Allows you to set the sharing mode of a resource, including share globally, share to specified projects or accounts, and not share. Allows you to manage the lifecycle of applications, such as adding and deleting applications. A sub-account is created by the admin or synced from an SSO authentication system and is managed by the admin. Resources created under a sub-account are managed by the sub-account. Allows you to manage the lifecycle of local sub-accounts, such as creating and deleting local sub-accounts. Allows you to add an SSO server to the Cloud so as to integrate the SSO system and enable password-free login of related accounts in the system. Sub- The supported SSO server type includes OIDC. Account / Allows you to configure user mapping rules for the OIDC Management server. Allows you to manage the lifecycle of the SSO server, such as adding and deleting the SSO server. Allows you to manage the lifecycle of SSO sub-accounts, such as synchronizing and deleting SSO sub-accounts. Allows you to set the initial password or change the password of a sub-account. Allows you to bill for resources used by sub-accounts, attach pricing lists to a sub-account, and change pricing lists for the sub-account. Issue: V5.1.8 197Technical Whitepaper / 3 Product Features Type Features Description Allows you to set two-factor authentication for sub-account login, view the two-factor QR codes of the sub-account, and download the two-factor QR codes. Allows you to set and manage resource quota for sub- accounts, including compute resources, storage resources, and network resources. Allows you to centrally manage the associated or shared resources of a sub-account. Audits all of the sub-account actions, which effectively ensures the security of the cloud environment. Allows you to customize the theme and appearance of the Cloud. Theme and Allows you to set the global appearance (theme), titles ( Appearance browser/login interface/platform interface), and monitor (title and appearance/data monitoring method). Allows you to reset to default settings with one click. Allows you to configure NTP time servers for the Cloud to sync the clock of the time servers with all nodes of the Cloud . Three time protocol modes are supported: Internal, Internal Time Management and External, and External. Allows you manually sync time by force to save your time. System Displays the latest system UTC date, time, and time zone. Setting If you select Email as the endpoint of an alarm, you need to set an email server. Then alarm messages are sent to the email server. Allows you to manage the lifecycle of email servers, such as adding, enabling, disabling, and deleting email servers. Supported email server type: SMTP. Email Server Supported encryption type: STARTTLS, SSL/TLS, and NONE. Allows you to test the email server connectivity. Allows you to change the owner of email servers. Audits all of the email server actions, which effectively ensures the security of the cloud environment. 198 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description A log server is used to collect logs of the management node . You can add a log server to the cloud and use the collected logs to locate errors and exceptions. This improves your O& M efficiency. Allows you to manage the lifecycle of log servers, such as adding and deleting log servers. Allows you to set the log facility from LOCAL0 to LOCAL7. Log Server This value is used to match the log server. Allows you to select a log severity to make the log server only receive logs of this level or higher levels. Valid values: ALL, TRACE, DEBUG, INFO, WARN, ERROR, and FATAL. Allows you to test the log server connectivity. Audits all of the log server actions, which effectively ensures the security of the cloud environment. Connects 3rd-party platform and Cloud through SNMP, enabling the 3rd-part platform to get monitoring data from Cloud or receive alarms pushed from Cloud. Allows you to enable/disable SNMP Management. Allows you to configure SNMP parameters in a visual method SNMP Management . Allows you to add SNMP trap receivers to receive alarms from Cloud. Allows you to add SNMP trap receivers as endpoints and attach them to specified alarms. HA Policy is a mechanism that ensures sustained and stable running of the business if VM instances are unexpected ly stopped or are errored because of errors occurred to compute, network, or storage resources associated with the Platform VM instances. HA Policy Setting Provides None and NeverStop VM HA modes, which specify whether to enable auto restart if VM instances are stopped. Allows you to configure VM Failover Strategy in a table based on the management network connectivity status, storage network connectivity status, and business NIC status. Issue: V5.1.8 199Technical Whitepaper / 3 Product Features Type Features Description Allows you to modify host error detection settings and advanced HA-related settings. These settings take effect on the Cloud. Allows you to view and filter VM HA logs. Provides multiple templates that encapsulate scenario-based global settings. You can apply a template globally with one click based on your business needs. This improves your O& M efficiency. Applies to VM performance optimization, restoration from Scenario Template high availability, cloud security setting, and production environment setting. Allows you to apply a scenario template with one click. Allows you to reset to default settings with one click. Allows you to modify settings of a single item in a scenario template. Allows you to configure settings that take effect on the whole platform. Support basic settings and advanced settings. Allows you to reset to default settings with one click. Global Setting Supports quick search and directory navigation to help you quickly locate target items. Allows you to modify settings of a single item in the Global Setting. Allows you to enable version detection which periodically detects the latest version including production environment recommended versions or technical preview versions Allows you to specify the auto detection duration by day, System Version Detection week, month, or year. and Security Allows you to implement manual detection or use the auto detection. It provides information about the version number and the highlights if the latest version is available. Experience Allows you to join in or opt out the Experience Improvement Improvement Program Program. 200 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to configure and manage a SSL certificate, Certificate including third-party certificate and system self-signed Management certificate. Licensing in the Cloud is supplied in different functionality packages as Base and Plus. You can purchase a package as needed. The Base license provides the basic and essential features of the Cloud, which can meet the mainstream business requirements. Functionalities covered in the Base license include Standard, Enterprise Trial, and Enterprise Prepaid. The Plus license provides add-on features or feature enhancements to meet the specific business requirements. Functionalities covered in the Plus license include VMware Management, Tenant Management, ARM64 Management , Backup Service, Continuous Data Protection (CDP) Service, Migration Service, Baremetal Management, Elastic Baremetal Management, Alibaba Cloud Hybrid Cloud License Management, Cryptography Security Compliance, 5x8 (7x24 / Management ) After-Sales Service, SR-IOV NIC Service, GPU Service, Billing Management, CloudFormation, Auto-Scaling Service, Smart NIC Service, Container Service-CPU, and Container Service-vCPU. A Base license is required to install the Plus license. Supports two licensing methods: USB key and request key. The USB key licensing method allows you to obtain the authorization by inserting only one USB key into the management node. The request key method allows you to obtain the authorizat ion by uploading the license file to the management node. Allows you to view the current license status and licensing records. Allows you to delete a Plus license as needed. Provides license expiration reminders when your license is about to expire, expired, or license quota exceeds. Issue: V5.1.8 201Technical Whitepaper / 3 Product Features Type Features Description Allows you to access the UI via HTTP or HTTPS. Supports account login and tenant login. Login Method Allows you to access the Cloud and experience all of the features by using command lines. Allows you to set the maximum number of continuous login failures that trigger verification by verification code. Default: 6 . Supports two-factor authentication, which further enhances the account security. Allows you to set the login password complexity by set the password length and characters combined of digits, uppercase/lowercase letters, and special characters. Cloud Login Allows you to set the password validity period by customizing the password update cycle. We recommend that you change Login Security the login password regularly to ensure the login security. Supports historical password check and allows you to customize the number of recent passwords that cannot be reused. Allows you to specify whether to lock the login account if the logins continuously fail, the number of allowed failed attempts , and how long the account will be locked. Allows you to specify whether to disallow simultaneous connection sessions established by one user. If yes, one user can establish only one connection session with the platform. Allows you to set the login interface with the default link. Supports SPICE, RDP, and VNC protocols. Allows you to specify a VDI network. Supports USB redirection, which means multiple USB devices are compatible. VDI Solution Allows you to set an independent VDI network. Supports multi-screen display. Supports microphones. Supports SPICE to optimize traffics. 202 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Provides a quick navigation entry, which is convenient for Quick Navigation users to quickly locate and enter the required features and UI services. Highlights Provides one-stop global search, allowing you to search for Global Search features, resources, and documents. Embedded Document Provides embedded documents in the help center. Allows you to complete installing and deploying the Cloud from scratch within just 30 minutes with one simple command . Supports the following installation modes: Tenant Installati / Management Mode, Community Management Mode, on Compute Node Mode, Expert Mode, and Simplified Expert Mode. Supports ISO: h84r ISO. Allows you to burn ISO images to U drives by using Rufus. Allows you to seamlessly upgrade the Cloud from an earlier Seamless Upgrade version to a later version. Upgrade Deployment Allows you to specify the deployment environment from the Environment Upgrade Expert Mode. Features in VMware Management Type Features Description Allows you to take over vCenter 5.5, 6.0, 6.5, 6.7, and 7.0. Supported protocols: HTTPS (default) and HTTP. Supports automatic and manual data synchronization. Automatic data synchronization occurs when a vCenter is added to the Cloud for the first time. You can also enable vCenter Data Auto Sync in the Global Setting and set vCenter Basic Resource an automatic synchronization interval to realize a regular automatic data synchronization. Allows you to centrally manage resources associated with a vCenter, including clusters, primary storage, backup storage , hosts, and resource pools. Allows you to delete a taken over vCenter from the Cloud . This deletes only the local record of the vCenter and Issue: V5.1.8 203Technical Whitepaper / 3 Product Features Type Features Description associated resources but does not affect the real resources in the remote vCenter. Allows you to manage the lifecycle of vCenter VM instances , such as creating, booting, stopping, rebooting, resuming, pausing, powering off, deleting, and recovering vCenter VM instances. Allows you to launch the console of a vCenter VM instance and set the console password as needed. Allows you to clone a vCenter VM instance online or offline without data volumes. Allows you to hot migrate a vCenter VM instance across shared primary storage with data volumes attached. Allows you to modify the instance offering (CPU/memory) of VM Instance a stopped vCenter VM instance. Allows you to change the owner of a running or stopped vCenter VM instance. Allows you to set the HA level (None/NeverStop) for a vCenter VM instance. You can enable VM HA in the Global Setting as needed. Allows you to attach custom tags to vCenter VM instances for an efficient resource location. Supports an external monitoring on the CPU, memory, disk, virtual disk, and NIC of a vCenter VM instance. Allows you to centrally manage resources associated with a vCenter VM instance, such as volumes and NICs. Supported L2 networks: L2NoVlanNetworks and L2VlanNetw orks. Supported L3 networks: public networks, flat networks, and VPC networks. Network Supported switch types: dvSwitch and vSwitch. Supported VPC network services: SNAT, DHCP, elastic IP, port forwarding, load balancing, and IPsec tunnel. Allows you to manage the lifecycle of networks, such as creating L2/L3 networks and deleting L3 networks. 204 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to set the sharing mode for an L3 network. Valid values: share globally, share to specified projects or accounts, and not share. Provides a list displaying the IP usage of an L3 network to improve IP planning efficiency. Allows you to attach a cluster to the L2 network an L3 network belongs to. Allows you to centrally manage IPv4 network ranges of an L3 network. Allows you to manage the lifecycle of vCenter volumes, such as creating, enabling, disabling, deleting, recovering, and Volume expunging vCenter volumes. Allows you to attach/detach a volume to/from an instance. Allows you to change the owner of a vCenter volume. Supported vCenter image types: system images in the VMDK format and volume images in VMDK format. Allows you to select the image platform. Supported platforms : Linux, Windows, and Other. Allows you to upload a vCenter image by using a URL. Image Allows you to manage the lifecycle of vCenter images, such as adding, enabling, disabling, deleting, recovering, and expunging vCenter images. Allows you to set the sharing mode for a vCenter image. Valid values: share globally, share to specified projects or accounts, and not share. Allows you to change the owner of a vCenter image. Provides a list to centrally display event alarm messages of the vCenter, helping you locate problems quickly. Event Message Allows you to view event messages in a specified time period . Allows a tenant/sub-account to manage the lifecycle of resources such as VM instances and volumes of a vCenter it Multi-account belongs to. Management Allows a tenant/sub-account to use vCenter resources such as networks and images shared by the admin. Issue: V5.1.8 205Technical Whitepaper / 3 Product Features Type Features Description Allows a tenant/sub-account to view the usage of KVM VM instances and vCenter VM instances on the dashboard. Allows a tenant/sub-account to view the billing information of KVM and vCenter resources. Allows a tenant to apply for vCenter VM instances by submitting tickets. Audits all of the vCenter actions, which effectively ensures Audit the security of the cloud environment. Features in Tenant Management Type Feature Description The basic element constructing organization structures. An organization structure consists of organizations of various levels. Provides a tree diagram to show the organizations in an organization structure. The admin or platform managers see all structure trees on the Cloud, while a normal platform or project member see only the tree its organization belongs to. Divides organizations into the default department and custom departments according to the users they organize. A custom department is used to organize personnel assigned to this department, and the default department is used to Personnel organize personnel has not been assigned to any custom and department. Once a personnel is assigned to a custom Organization Permission department, it is removed from the default department. s The default department is generated automatically by the system. You cannot delete the default department or add a sub-department to it. Allows you to centrally manage immediate members of the default department. Divides custom departments into two types according their addition methods: creating on local and synchronizing from an SSO platform. The first method creates a custom department to organize local users and the second method provides a custom department to organize SSO users. Divides custom departments into new teams and sub- departments according to their structural levels. A new 206 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Feature Description team is a top-level department that allows you to add sub- departments of various level to it. Allows you to manage the lifecycle of a custom department, such as creating and deleting a custom department. Allows you to add sub-departments to a custom department or change the superior department for a sub-department. Allows you to set a department manager for a top-level department and department admins for custom departments. Allows you to centrally manage the immediate members and associated project resources of a custom department. Allows you to set quotas on custom department resources, such as the compute resource quota, storage resource quota , network resource quota, and other resource quota. Natural persons performing as the most basic units in Tenant Management. Divides users into local users and SSO users according to their origins. Local users are created on the Cloud while SSO users are synchronized from SSO platforms. Allows you to manage the lifecycle of a local user, such as creating and deleting a local user. Supports two methods to create local users: custom creation and template import. Allows you to change the login password for a local user. User Allows you to enable the certificate login feature for a local user to authenticate its identity when it logs in to the Cloud. Allows you to change a deleted AD/LDAP user from an SSO user to a local user. Allows you to delete an SSO user. Allows you to add/remove a user to/from a department, user group, or project. Allows you to set a platform or project role for a user. Allows you to specify a zone for a user to manage. Allows you to export the user information as a CSV table, which helps in statistical analysis and problem diagnosis. Issue: V5.1.8 207Technical Whitepaper / 3 Product Features Type Feature Description A collection of natural persons as well as a collection of project members. Allows you to manage the lifecycle of a user group, such as creating and deleting a user group. User Group Allows you to add users to a user group and centrally manage the users in the user group. Allows you to add a user group to a project and assign unified project roles to the users in the user group. A collection of permissions, granting users and user groups with permissions to perform actions on resources with APIs. Divides roles into platform roles and project roles according to the scenarios in which their permissions take effect. A platform role has permissions to manage the zone assigned to it while a project member has permissions to manage the project it belongs to. Divides roles into system roles and custom roles according to their generation mechanisms. System roles including admin, platform manager, department Role manager, monitor role, project admin, and project manager. Roles other than these are all custom roles. System roles are generated by the system automatically. You can view the UI permissions and API permissions of a system role. Allows you to manage the lifecycle of a custom role, such as creating and deleting a custom role. Allows you to modify the UI permissions and UI permissions of a custom role. Allows you to view the users and user groups bond with a role. Supports seamlessly access to SSO systems to enable SSO users to log in to the Cloud. Supports SSO server types: AD, LDAP, OIDC, OAuth2, and SSO CAS. Allows you to enable the SSL/TSL encryption for AD and LDAP servers. 208 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Feature Description Allows you to enable SSL Certificate Check Skipping for LDAP servers configured with SSL certificates in Global Setting to skip all SSL certificate checks when the Cloud accesses these servers. Allows you to configure allowlist or blocklist filter mechanism and filter rules for an AD or LDAP server to filter the users that does not need or need to be synchronized from the base DN. Allows you to configure synchronize mapping rules for an SSO server. Allows you to manage the lifecycle of an SSO server, including adding and deleting an SSO server. Allows you to manually synchronize the latest user informatio n from a AD or LDAP server. Allows you to manually test the connectivity of a AD or LDAP server. Audits all personnel and permissions actions, which effectivel Audit y ensures the security of the cloud environment. A project is a tenant. You can plan resources based on projects and create a separate resource pool for a project. Supports two project configuration methods: manual configuration and configuration with a project template. Supports project reclaim policies: unlimited, reclaim by specifying time, and reclaim by specifying cost. A project set as reclaimed by specifying time or reclaimed Project by specifying cost allows you to specify one of the following Project Management reclaim actions: disable project member login, disable project login and stop project resource, and delete project. Allows you to set an access control for a project as needed , allowing project members to log in to the Cloud during a specified time period, or prohibiting project member from logging in to the Cloud during a specified time period. Allows you to enable security group constraint for a project to associate a security group by force to each VM instance created by the project members. Issue: V5.1.8 209Technical Whitepaper / 3 Product Features Type Feature Description Allows you to manage the lifecycle of a project, such as creating, enabling, disabling, deleting, recovering, and expunging a project. Allows you to restore an expired project. The project member can log in to the project and the project resources work normally after the restoration. Allows you to generate a project template from an existing project for the fast creation of later projects. Allows you to set a project admin who can set project managers to help the project management. Allows you to set a department for a project. The project bill is merged into the department bill. Allows you to stop project resources, including VM instances and VPC vRouters. This action does not disable the project members from logging in to the project. Allows you to set quotas on project resources, such as compute resource quota, storage resource quota, network resource quota, and other resource quota. Allows you to centrally manage the members, user groups, associated resources, and shared resources of a project. A template that identifies various resource quotas. You can use a project template to create a template quickly. Allows you to manage the lifecycle of a project template, Project Template such as creating and deleting a project template. Allows you to set quotas for a project template, such as compute resource quota, storage resource quota, network resource quota, and other resource quota. Audits all project management actions, which effectively Audit ensures the security of the cloud environment. Helps you provide basic resources to project more efficiently. Divides processes into the default process and custom Ticket Process Management processes according to their generation mechanisms. Management The default process is generated by the system and consists of two flows: the submitting ticket flow and the final approval and execution flow. The default process allows project 210 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Feature Description admins, project managers, and normal project members to submit tickets, and the admin to approve and execute tickets. The default process applies to following tickets: tickets to modify project cycle, tickets to modify project quota, and tickets that are not specified with a custom process. Allows the admin, platform managers and normal platform members with corresponding permissions to create custom processes. A custom process consists of following flows: the submitting ticket flow, intermediate approval flows, and the final approval and execution flow. A custom process allows project admins, project managers, and normal project members to submit tickets; project admins, project mangers , normal project members, and department managers joining the projects to be responsible for intermediate approval flows , and the admin and project admins to be responsible for the final approval and execution flow. A custom process applies to following tickets: tickets to apply for VM instance, tickets to delete VM instance, and tickets to modify VM configuration. Supports the process lifecycle management, such as creating, enabling, disabling, and deleting a custom process. Supports ticket flow modifications. Allows project admins, project managers, and normal project members to submit tickets. Supports following ticket types: apply for VM instance (KVM/ ESX), delete VM instance, modify VM configuration, modify project quota, and modify project cycle. Ticket Application Supports ticket lifecycle management, such as creating and deleting a ticket. Allows project members to recall a pending ticket, or resubmit a recalled or rejected ticket. Provides intuitive ticket processing records. Allows project admins, project managers, normal project members, and department managers joining the projects to Ticket Approval be responsible for intermediate approval flows. Allows the admin and project admins to be responsible for the final approval and execution flow. Issue: V5.1.8 211Technical Whitepaper / 3 Product Features Type Feature Description Allows you to view pending and resolved tickets. Allows you to approve or reject a pending ticket. Provides intuitive ticket processing records. Allows the admin to view archived tickets, including resolved tickets that are deleted. Audits all ticket management actions, which effectively Audit ensures the security of the cloud environment. Features in Backup Service Type Features Description Supports intuitive viewing and unified management of backup jobs on the Cloud to improve O&M efficiency. Displays backup job overview on different cards, including the number, state, and status of backup jobs. Backup Job Displays backup job statistics in line chart and list format. Dashboard Allows you to set a time filter to view the execution of backup jobs within the selected time period. The time filter applies to both the line chart and list. Allows you to view backup job execution details. Allows you to create a backup job to back up local VM Backup instances, volumes, or databases to a specified storage Service server. Local backup, remote backup, and Public Cloud backup are currently supported. Allows you to manage the lifecycle of backup jobs, such as creating, enabling, disabling, and deleting backup jobs. Allows you to specify a local backup server for a backup Backup Job job. If two local backup servers are specified, the failover mechanism is supported. Allows you to specify a remote backup server for a backup job. Only one remote backup server is supported. Supported types: Remote Backup and Alibaba Cloud Backup. Allows you to set a network QoS and disk QoS for VM/ volume backup jobs. 212 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to back up a VM instance with its attached volumes. Allows you to set a backup mode for a VM instance/volume backup job (incremental backup + default full backup, incremental backup + custom full backup, full backup policy). Allows you to specify a backup mode for a backup job of management node database (full backup mode). Supports backup immediately after the job creation (VM instances/volumes backup jobs only). Allows you to manually perform a backup job, providing convenience for backing up important operations at any time. Allows you to set a data retention policy for a backup job, including local retention policy (by count/by time) and remote retention policy (permanently/by count/by time). Allows you to manage the backup resource of a backup job, including associating, disassociating, and viewing monitoring data in real time. Allows you to set a time filter to view backup job records within the selected time period. Significantly improves large file backup performance by optimizing the large file backup mechanism, supporting both physical and virtual tape libraries (requires tape library to provide file system mounting software, such as LTFS). Allows you to view the local backup data of VM instances, volumes, and databases in a list format. Allows you to view the backup data usage statistics of VM instances and volumes, including dependent incremental, incremental, and full. Allows you to recover the local backup data of VM instances/ Local Backup Data volumes to local. Supported recovery policy: New Resource and Overwrite Original Resource. Allows you to recover a VM instance with its attached volumes. (The local backup data of the VM instance needs to contain volume backup data.) Allows you to recover local backup data from management node database to local. Issue: V5.1.8 213Technical Whitepaper / 3 Product Features Type Features Description Allows you to change the owner of the local backup data of a VM instance. Allows you to scan a local backup server, and displays local backup data of the management node database on the cloud platform. Allows you to export the local backup data of the management node database to the specified path of the local backup server, which is available for download. Allows you to delete the local backup data. Allows you to view the details of the VM/volume local backup data. Supports two types of addition: Existing Backup Storage ( ImageStore only) and Add Server. Allows you to specify the backup network. In local backup scenarios, both data backup and recovery are implemented by using the backup network. Allows you to manage the lifecycle of local backup servers , such as creating, enabling, disabling, reconnecting, and deleting local backup servers. Allows you to scan a local backup server and display the local backup data record on the cloud platform. Local Backup Server Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from the local backup server to free up the storage space. Allows you to update the password of the local backup server. Allows you to manage the backup data on local backup server, including VM instances, volumes, and the local backup data on database. Displays local backup server resource in a real time by using monitors, including capacity percent used, NIC, CPU, memory, and disk. Remote Backup Allows you to add only one remote backup server. Supported Server types: Remote Backup and Alibaba Cloud Backup. 214 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of remote backup servers , such as adding, enabling, disabling, reconnecting, and deleting remote backup servers. Allows you to update the password of a remote backup server. Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from a remote backup server to free up the storage space. Allows you to manage the resources on a remote backup server, including backup data (VM instances, volumes, and the remote backup data on database) and zone. Allows you to view the remote backup data of VM instances, volumes and management node database in a list format. Allows you to synchronize the remote backup data of VM instances and volumes to a local backup server. Allows you to recover the remote backup data of VM instances/volumes to local. Note that the remote backup data needs to synchronize to local backup server first before recovering to local. Remote Backup Data Allows you to recover the remote backup data of management node database to local. Allows you to scan the remote backup server, and display remote backup data of the management node database on the cloud platform. Allows you to export the remote backup data of the management node database to the specified path of the remote backup server, which is available for download. Allows you to delete the remote backup data. Audits all of the backup service actions, which effectively Audit ensures the security of the cloud environment. Features in Continuous Data Protection (CDP) Service Type Features Description Displays the critical CDP information on different cards, ContinuousCDP Dashboard including the number and status of CDP tasks and recovery Data tasks, the CPU and memory utilization of backup servers, top Issue: V5.1.8 215Technical Whitepaper / 3 Product Features Type Features Description 5 backup server usage, the total disk I/O of backup servers, and unread alarm statistics in recent 7 days. Allows you to create CDP tasks to continuously back up your VM data to a specified backup server to achieve continuous data protection. Allows you to create CDP tasks in bulk for multiple VM instances. One CDP task corresponds to one VM instance. Allows you to perform a full backup for VM instances without installing any third-party agent. Performs a full backup for VM instances immediately after you create CDP tasks. Supports second/minute-level RPO settings Recommends the desired capacity required by a CDP task based on an algorithm when you create a CDP task for the first time, helping you to plan the backup space reasonably. CDP Task Supports multiple primary storage: The CDP service applies to VM instances in different primary storage scenarios Protection , including LocalStorage, NFS, SharedBlock, and Ceph (CDP) primary storage. Allows you to manage the lifecycle of CDP tasks, such as creating, enabling, disabling, and deleting CDP tasks. Allows you to modify the protection policy of a disabled CDP task, including the recovery point interval, backup aggregatio n frequency, recovery point retention policy, and the backup rate. Allows you to modify the task running policy to adjust the desired size and RPO policy for a CDP task. Allows you to view the creation progress of a CDP task. Provides CDP task resource alarms and event alarms and allows you to create these alarms. Allows you to back up CDP data on a local backup server. Displays the CDP running status in charts and tables and CDP Data allows you to view the details by specifying a time span. Displays hourly data changes so that you plan the backup capacity more reasonably. 216 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Provides a recovery point calendar, which identifies the dates with recovery points with colors and helps you to locate recovery points quickly. Allows you to lock recovery points. After a recovery point is locked, data of the recovery point will not be automatically cleared or deleted. Provides recovery point list and locked recovery point list and allows you to view the details by specifying a time span. Supports fast recovery based on selected recovery points ( including locked recovery points). Supports instant recovery with a minimum RTO in seconds. Supports entire restoration and file-level restoration. Entire restoration allows you to restore data to the original VM instance or to a newly-created VM instance. Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. The newly created VM instance will quickly start up for business recovery. Restore data to the original VM instance: Allows you to create new volumes or overwrite current volumes. Create new volumes: Allows you to retain and attach volumes before the recovery to the original VM instance to ensure data security. Overwrite current volumes: Overwrites the original data in the VM instance and retain the snapshots in the current volumes. After the data restoration, the original VM instance will quickly start up for business recovery. File-level restoration allows you to retrieve files without restoring the system. Supported file format include picture, text, and PDF. Allows you to clear CDP data, which will delete all the CDP data of the VM instance, including the locked recovery points . The Cloud performs full backup for the VM instance the next time the CDP task is enabled. Issue: V5.1.8 217Technical Whitepaper / 3 Product Features Type Features Description Provides a list of recovery tasks, allowing you to view the recovery records and progress for later audits and traceback. Allows you to restore data through a wizard-style process. Supports multiple primary storage: The CDP service applies to VM instances in different primary storage scenarios , including LocalStorage, NFS, SharedBlock, and Ceph primary storage. Supports instant recovery with a minimum RTO in seconds. Allows you to restore data to the original VM instance or to a newly-created VM instance. Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. The newly created VM instance will quickly start up for business recovery. Recovery Task Restore to the original VM instance: Allows you to create new volumes or overwrite current volumes. Create new volumes: Allows you to retain and attach volumes before the recovery to the original VM instance to ensure data security Overwrite current volumes: Overwrites the original data in the VM instance and retain the snapshots in the current volumes. After the data restoration, the original VM instance will quickly start up for business recovery. Allows you to manage the lifecycle of recovery tasks, such as creating, enabling, disabling, and deleting recovery tasks. Allows you to redo a failed or canceled recovery task. Allows you to cancel a recovery task during the recovery progress. After a recovery task is canceled, intermediate data generated during the recovery process will not be retained. Local Backup Server Allows you to back up CDP data on a local backup server. 218 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to use the ImageStore deployed in your local data center as the local backup server, or deploy a new local backup server. Allows you to add multiple local backup servers. Allows you to view the CDP data saved to a local backup server on a local backup server details page. Audits all of the CDP actions, which effectively ensures the Audit security of the cloud environment. Features in Migration Service Type Features Description Allows you to migrate VM instances from a taken-over vCenter to the Cloud. Supported vCenter versions: 5.5, 6.0, 6.5, 6.7, and 7.0. Supported vCenter VM operating systems: RHEL 4.x/5.x/6 .x/7.x, CentOS 4.x/5.x/6.x/7.x, SLES 11/12/15, Ubuntu 12/ 14/16/18, and Windows 7/Server 2003 R2/Server 2008 R2/ Server 2012 R2/Server 2016/Server 2019. Supported source primary storage: Unlimited. Supported destination primary storage: LocalStorage, NFS, Ceph, and Shared Block. Allows you to manage the lifecycle of V2V jobs, including Migration V2V Migration ( creating, rebooting, and deleting V2V jobs. Service VMware → the Cloud) Allows you to create V2V jobs for VM instances in bulk. The Cloud supports one V2V job per source VM instance. Allows you to enable the compression mode as needed, which effectively compresses the migration data cache and improves the cache space utilization of the V2V conversion host. Allows you to customize the configurations of destination VM instances. Allows you to view progress bars of V2V jobs. Automatically installs Windows VirtIO drivers for Windows VM instances during the migration process, which improves the NIC and disk operating efficiency. Issue: V5.1.8 219Technical Whitepaper / 3 Product Features Type Features Description Allows you to migrate VM instances from a KVM platform to the Cloud. Allows you to migrate running or paused VM instances. Supported source primary storage: Unlimited. Supported destination primary storage: LocalStorage, NFS, Ceph, and Shared Block. If the source primary storage or the destination primary storage is a Ceph storage, make sure that the libvirt is of 1.2 .16 or above version, and QEMU version is of 1.1 or above version before you perform the V2V migration. If neither the source primary storage nor the destination primary storage is a Ceph storage, make sure that the libvirt is of 1.2.9 or V2V Migration (KVM above version, and QEMU is of 1.1 or above version before → the Cloud) you perform the V2V migration. Allows you to manage the lifecycle of V2V jobs, including creating, rebooting, and deleting V2V jobs. Allows you to create V2V jobs for VM instances in bulk. The Cloud supports one V2V job per source VM instance. Allows you to enable the compression mode as needed, which effectively compresses the migration data cache and improves the cache space utilization of the V2V conversion host. Allows you to customize the configurations of destination VM instances. Allows you to view progress bars of V2V jobs. Allows you to specify a host in the destination cluster as a V2V conversion host. The migration data is firstly cached in the V2V conversion host and then migrated to the destination primary storage. Allows you to attach data volumes to a V2V conversion host, V2V Conversion Host so that you can cache data to your local disk or data volume as needed. Allows you to manage the lifecycle of V2V conversion hosts , such as adding, enabling, disabling, and deleting V2V conversion hosts. 220 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Make sure that the type of the V2V conversion host is consistent with that of the source platform. The state of a V2V conversion host is decoupled from that of the host added as the V2V conversion host. When the V2V conversion host is enabled but the host is disabled, the V2V conversion host is used exclusively for V2V migrations, and other VM instances will not be dispatched to this host. This improves the migration efficiency. Allows you to set an independent migration network and network QoS to control transmission bottleneck and improve the migration efficiency. Monitors and displays the capacity usage of V2V conversion hosts. Audits all of the V2V actions, which effectively ensures the Audit security of the cloud environment. Features in Baremetal Management Type Features Description Provides independent cluster management for baremetal chassis. Allows you to manage the lifecycle of baremetal clusters, such as creating, enabling, disabling, and deleting baremetal clusters. Allows you to attach/detach a deployment server to/from a Baremetal Cluster baremetal cluster. Allows you to attach/detach L2 networks to/from a baremetal Baremetal cluster. Management Allows you to centrally manage the resources associated with a baremetal cluster, such as the deployment server, baremetal chassis, and L2 networks. Allows you to specify an independent server as the deployment server to provide PXE services and console proxies for baremetal chassis. Deployment Server Allows you to manage the lifecycle of deployment servers , such as creating, enabling, disabling, reconnecting, and deleting deployment servers. Issue: V5.1.8 221Technical Whitepaper / 3 Product Features Type Features Description Allows you to attach/detach baremetal clusters to/from a deployment server. Allows you to create baremetal instances based on baremetal chassis, which can be uniquely identified by their BMC interfaces and IPMI configurations. Supports two types of addition: manual addition and template import. You can add up to 500 baremetal chassis at a time. Allows you to manage the lifecycle of baremetal chassis, such as adding, enabling, disabling, powering on, powering Baremetal Chassis off, rebooting, and deleting baremetal chassis. Allows you to automatically or manually obtain the hardware information of a baremetal chassis. Allows you to launch the console of a baremetal chassis and jump to its IPMI management page. Allows you to view the hardware configuration of a baremetal chassis in a list format. Quickly generates preconfigured files to achieve unattended bulk installation of baremetal instance operating systems. Divides preconfigured templates into system templates and custom templates based on how the preconfigured template is created. System templates are provided by the Cloud, which include the basic system variables and can be applied to simple unattended deployment scenarios. Custom templates are generated from the uploaded custom Preconfigured template files (in the UTF8 format), which include custom Template variables in addition to the basic system variables, and can be applied to complex unattended deployment scenarios. Supports the following operating systems: the custom OSs of the Cloud, mainstream Linux OSs (RHEL/CentOS series , Debian/Ubuntu series, and SUSE/openSUSE series), and other OSs. Supports the following types of template: kickstart (applies to the custom OSs of the Cloud, and RHEL/CentOS OSs ), preseed (applies to Debian/Ubuntu OSs), and autoyast ( applies to SUSE/openSUSE OSs). 222 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to manage the lifecycle of custom templates, such as adding, enabling, disabling, and deleting custom templates. Allows you to download a preconfigured template. Allows you to view the details of a preconfigured template. Created based on baremetal chassis as virtual instances of the baremetal chassis. You can add up to 50 baremetal instances at a time. Allows you to select images (in ISO format and are not live CDs) to deploy operating systems for baremetal instances. Allows you to achieve unattended bulk installation of baremetal instance operating systems with preconfigured files generated from the preconfigured templates. Allows you to configure business networks for a baremetal instance. Supports the following networks: flat network and public network. Supports the following network devices: NICs Baremetal Instance and NIC bonds. Allows you to manage the lifecycle of baremetal instances , such as creating, starting, stopping, rebooting, deleting, recovering, and expunging baremetal instances. Allows you to launch the console of a baremetal instance. Allows you to customize tags for baremetal instances so that you can locate them quickly. Supports internal monitoring: displays the baremetal instance data such as CPU, memory, disk I/O, disk size, and NIC I/O . An agent is required for internal monitoring. Allows you to centrally view the resources associated with a baremetal instance, such as NICs and disks. Audits all of the baremetal management actions, which Audit effectively ensure the security of the cloud environment. Issue: V5.1.8 223Technical Whitepaper / 3 Product Features Features in Elastic Baremetal Management Type Resource Description Visualizes and displays the logical architecture of elastic baremetal management feature, guiding you to quickly use the elastic baremetal management. Provides five quick start steps, including Preparation Quick Start → Provision Network → Elastic Baremetal Cluster → Wizard Gateway Node → Baremetal Node. After finishing the quick start wizard, you can create elastic baremetal instances. For ZStack Ceph Enterprise, you need to make sure that the configuration is correct before creating elastic baremetal instances. Specifies a dedicated network for PXE processes and image downloading when elastic baremetal instances are created. Provision Supported network type: IPv4. Network Allows you to manage the lifecycle of provision networks , such as creating and deleting provision networks. Elastic Baremetal Allows you to view the associated elastic baremetal Management clusters. Provides independent cluster managements for baremetal nodes. Allows you to set the CPU architecture of an elastic baremetal cluster, including x86_64 and aarch64. Allows you to manage the lifecycle of elastic baremetal clusters, such as creating, enabling, disabling, and deleting elastic baremetal clusters. Elastic Baremetal Allows you to attach/detach an L2 network of the Cluster NoVLAN/VLAN type to/from an elastic baremetal cluster. Allows you to change provision network for an elastic baremetal cluster. Allows you to attach/detach primary storage of the Ceph /Shared Block/Vhost type to/from an elastic baremetal cluster. Allows you to centrally manage resources associated with an elastic baremetal cluster, including gateway node 224 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Resource Description , baremetal node, primary storage, iSCSI storage, and L2 network. Forwards traffics of the Cloud and elastic baremetal instances. Allows you to manage the lifecycle of gateway nodes, such as adding, enabling, reconnecting, and deleting gateway nodes. Allows you to change the password of a gateway node. Gateway Node Allows you to change elastic baremetal cluster of a gateway node. Monitors and displays gateway node metrics such as NIC , CPU, and memory. Allows you to centrally manage elastic baremetal instances associated with a gateway node. A baremetal node is used to create elastic baremetal instances and is universally identified by its BMC interface and IPMI configurations. Supports two types of addition: custom and template import. You can add up to 500 baremetal nodes at a time . (You can modify the maximum number of bulk addition in global setting.) Allows you to set the CPU architecture of a baremetal node, including x86_64 and aarch64. Allows you to set the start method of a baremetal node, Baremetal Node including volume and local disk (non take-over/take-over ). Allows you to manage the lifecycle of baremetal nodes , such as adding, enabling, disabling, powering on, powering off, rebooting, and deleting baremetal nodes. Allows you to automatically or manually obtain the hardware information of a baremetal node. Allows you to modify the IPMI info when the power supply of the baremetal node is in Unknown state. Allows you to launch the console of a baremetal node and jump to its IPMI management page. Issue: V5.1.8 225Technical Whitepaper / 3 Product Features Type Resource Description Allows you to view the hardware information of baremetal nodes in a list format. An elastic baremetal offering defines the number of vCPU cores, memory size, CPU architecture, CPU model , and other configuration settings of elastic baremetal instances. You can use an elastic baremetal offering to create an elastic baremetal instance. Allows you to obtain an elastic baremetal offering by obtaining the hardware information of baremetal nodes. Elastic Baremetal Allows you manage the lifecycle of elastic baremetal Offering offerings, such as enabling and disabling elastic baremetal offerings. Allows you to set the sharing mode of an elastic baremetal offering, including share globally, share to specified projects or accounts, and not share. Allows you to centrally manage the baremetal nodes associated with an elastic baremetal offering. Comparable to instances virtualized through physical servers in performance, leverages resource scalability in the Cloud to achieve flexible applications and on-demand usages. Supports two types of creation: add by baremetal node and add by baremetal offering. Allows you to power off to release baremetal node. When elastic baremetal instances are stopped, baremetal nodes will be automatically released to avoid idle Elastic Baremetal resources (only elastic baremetal instances added by Instance elastic baremetal offerings and baremetal nodes that start on volume). Allows you to specify the storage allocation policy of an elastic baremetal instance, including system allocation and custom (only elastic baremetal instances added by elastic baremetal offerings and baremetal nodes that start on volume). Allows you to select an image to install the operating system for an elastic baremetal instance. Supported operating systems: x86 Windows (2012/2016/2019/10 ), x86 Linux (CentOS 7/8, Ubuntu 18 LTS/20 LTS), and 226 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Resource Description ARM Linux (CentOS 7/Kylin V10) (only elastic baremetal instances added by elastic baremetal offerings and baremetal nodes that start on volume/non take-over local disk). Allows you to specify the gateway node allocation policy , including LeastBmPreferredGatewayAllocationStrateg y, Last Gateway Node, and Random. You can select a gateway node as the first assigned gateway node for an elastic baremetal instance. Allows you to manage the lifecycle of elastic baremetal instances, such as creating, starting, stopping, rebooting , powering off, deleting, recovering, and expunging elastic baremetal instances. Allows you to automatically or manually obtain the status of an elastic baremetal instance. Allows you to launch the console of a running elastic baremetal instance (agent required). Allows you to customize tags for elastic baremetal instances so that you can locate them quickly. Allows you to attach/detach a volume to/from an elastic baremetal instance (agent required). Allows you to attach/detach a block storage volume to/ from an elastic baremetal instance (agent required). Allows you to change system of an elastic baremetal instance. Allows you to change the password of an elastic baremetal instance (agent required). Allows you to create an image for an elastic baremetal instance (only elastic baremetal instances that start on volume). Allows you to create a single snapshot for an elastic baremetal instance (only elastic baremetal instances that start on volume). Monitors and displays elastic baremetal instance metrics such as CPU, memory, disk, disk capacity, and NIC ( agent required). Issue: V5.1.8 227Technical Whitepaper / 3 Product Features Type Resource Description Allows you to configure business networks for elastic baremetal instances. Supported business network: flat network, public network, and VPC network. Supported network device: NIC and NIC Bond. Allows you to centrally manage resources associated with elastic baremetal instance, including volume, NIC ( provision NIC and business NIC), and local disk. Audits all of the elastic baremetal management actions Audit , which effectively ensure the security of the cloud environment. Features in Hybrid Cloud Management Type Features Description Allows you to synchronize Alibaba Cloud resources from added regions and zones to local, such as ECS instances , disks, VPCs, vSwitches, security groups, images, EIPs, Sync Data VPNs, virtual border routers, and router interfaces. Supports automatic and manual data synchronizations. Automatic synchronizations occur when regions or zones are newly added to local. Visualizes the logical architecture of Hybrid Cloud Management, guiding you to use Hybrid Cloud Management quickly. Hybrid Quick Start Wizard Provides three quick start steps: Create ECS Instance, Cloud Establish VPN Connection, and Create Alibaba Cloud Management Express Connect. ECS is Elastic Compute Service provided by Alibaba Cloud. Allows you to manage the lifcycle of an ECS instance, such as creating, starting, stopping, rebooting, and deleting an ECS instance. ECS Instance Allows you to launch the console of an ECS instance and modify the console password as needed. Allows you to modify the system user password of an ECS instance. The new password takes effect after you reboot the ECS instance. 228 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to centrally manage disks attached to an ECS instance. Alibaba Cloud disks that provide extended storage spaces for ECS instances. Supports two types of disks: ultra cloud disks and SSD disks. Allows you to manage the lifecycle of a disk, such as Disk creating and deleting a disk. Allows you to attach/detach disks to/from ECS instances. Allows you to set whether to delete a disk simultaneously when you delete the ECS instance it attached to. Alibaba Cloud images that provide template files to create ECS instances. Divides images into two types according to their origins: Alibaba Cloud images and custom images. Alibaba Cloud images are synchronized from Alibaba Cloud to local. Image Custom images are created locally and uploaded to Alibaba Cloud through buckets in corresponding regions. Allows you to choose the format of uploaded local images in Hybrid Cloud Settings. Valid values: .qcow2 and .raw. Displays the upload progress of local images. Allows you to delete images. Provides 3 CIDRs for you to create VPCs (Alibaba virtual private clouds) dedicated for ECS instances: 192.168.0.0/16 , 172.160.0.0/12, and 10.0.0.0/8 Allows you to manage the lifecycle of a VPC, such as creating and deleting a VPC. Allows you to create VPN connections and express connects based on VPCs. VPC Allows you to centrally manage associated resources of a VPC, such as vSwitches, vRouters, security groups, and VPN gateways. Allows you to manage the lifecycle of a vSwitch, such as creating and deleting a vSwitch. Allows you centrally manage the ECS instances associated with a vSwitch. Issue: V5.1.8 229Technical Whitepaper / 3 Product Features Type Features Description Allows you to add/delete route entries to/from vRouters. Provides three next hop options for route entries: hop to route interface, hop to ECS instance, and hop to VPN gateway. An IPsec tunnel created between a VPN gateway and a VPN customer gateway that enables communications between local private networks and VPC networks on Alibaba Cloud. A VPN gateway is a network connection service provided by Alibaba Cloud. You need to purchase it on Alibaba Cloud Console before you can use it. Allows you to delete a VPN gateway from local without influencing the corresponding actual resource on Alibaba Cloud. Allows you to centrally manage the VPN connections based on a VPN gateway. A VPN customer gateway provides services for the local data center. Allows you to manage the lifecycle of a VPN customer gateway, such as creating and deleting a VPN customer VPN gateway. Allows you to centrally manage the VPN connections based on a VPN customer gateway. Allows you to establish a VPN connection between a VPN gateway and a VPN customer gateway to enable encrypted communications between the local data center and Alibaba Cloud. Provides three entries for you to create VPN connections: from Quick Start Wizard, from a VPC action list, and on the VPN Connection page. Allows you attach multiple local VPC networks to a VPN connection. Supports NAT Traversal that ensures normal data transmissi ons even though a NAT device exists between the local data center and Alibaba Cloud. Express Connect A physical circuit to connect the local data center and the access point of Alibaba Cloud that ensures fast, stable and 230 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description secure communications between local private networks and Alibaba Cloud VPCs. Provides 2 creation entries for express connect: from Quick Start Wizard and on a VPC action list. Allows you to centrally manage resources used for express connects, such as router interfaces and virtual border routers . Allows you to add router interfaces to virtual border routers and VPC vRouters for message forwards. Allows you to specify regions to synchronize virtual border routers to local. Allows you to add/delete route entries to/from a virtual border router. Provides four next hop options for route entries: hop to ECS instance, hop to router interface, hop to VPN gateway, and hop to physical connection interface. Allows you to modify the interconnection address of a virtual border router. Alibaba Cloud security groups that provide security control services for ECS instances on the L3 network layer. Provides four initial rule options for security groups: Prohibit All (Default), Allow All, Disable Some Vulnerable Ports, and Allow Commonly Used Ports. Allows you to manage the lifecycle of a security group, such as creating and deleting a security group. Allows you to add/delete ingress or egress rules to/from a Security Group security group. Provides two authorization policy options for ingress/egress rules: Accept and Reject. Provides five protocol options for ingress/egress rules: ALL, TCP, UDP, ICMP, and GRE. Allows you to set priorities for ingress/egress rules. The rule with the highest priority takes effect when you set multiple rules on a same object. Issue: V5.1.8 231Technical Whitepaper / 3 Product Features Type Features Description Elastic IP addresses (EIP) in Alibaba Cloud public networks that enable ECS instances to access public networks. EIP Allows you manage the lifecycle of an EIP, such as creating and deleting an EIP. Allows you to attach/detach EIPs to/from ECS instances. Integrates Alibaba Cloud NAS to provide file systems as backend storage systems for AliyunNAS primary storage. Supports two methods to add NAS file systems: add an existing file system deployed on Alibaba Cloud, or create a new file system. NAS files systems supports two storage types: Performance and Capacity. NAS file systems supports two protocol types: NFS and SMB . Allows you to manage the lifecycle of an NAS file system, such as creating and deleting a file system. Allows you to create permission groups to limit accesses to a file systems. Permission groups support allowlist mechanisms, allowing Alibaba Cloud NAS you to add rules to allow specified IP addresses and CIDRs to access the file system. Supports two methods to create permission groups: add an existing permission group on Alibaba Cloud, or create a new permission group. Allows you to add/delete rules to/from a permission group. Allows you to set the permission range when you create a permission group rule, enabling an authentication objects to only read from the file system (RDONLY), or read from as well as write in the file system (RDWR). Allows you to set priorities for permission group rules. The rule with the highest priority takes effect when you set multiple rules on a same authentication object. Allows you to create an AliyunNAS primary storage based on a file system and permission groups. 232 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description AliyunNAS primary storage supports backup storage: ImageStorage backup storage. Allows you to manage the lifecycle of an AliyunNAS primary storage, such as adding, enabling, disabling, reconnecting, deleting an AliyunNAS primary storage or making it enter the maintenance mode. Allows you to centrally manage the resources associated with an AliyunNAS primary storage, such as VM instance, volumes, and clusters. Allows you to clean up garbage data of an AliyunNAS at a specified interval. You can modify the interval in Hybrid Cloud Settings. Monitors and displays the percentage of used capacity of an AliyunNAS primary storage. Integrates Alibaba Cloud EBS to serve as a local primary storage type, AliyunEBS. AliyunEBS primary storage supports backup storage: AliyunEBS backup storage. Allows you to manage the lifecycle of an AliyunEBS primary storage, such as adding, enabling, disabling, reconnecting, and deleting an AliyunEBS primary storage or making it enter the maintenance mode. Allows you to centrally manage the resources associated with an AliyunEBS primary storage, such as VM instances, Alibaba Cloud EBS volumes, and clusters. Monitors and displays the percentage of used capacity of an AliyunEBS primary storage. Allows you to clean up garbage data of an AliyunEBS at a specified interval. You can modify the interval in Hybrid Cloud Settings. Integrates Alibaba Cloud Object Storage Service (OSS) to serve as a local backup storage type, AliyunEBS. AliyunEBS backup storage supports primary storage: AliyunEBS primary storage. Issue: V5.1.8 233Technical Whitepaper / 3 Product Features Type Features Description Allows you to set a dedicated data network for an AliyunEBS backup storage to improve the data transmission efficiency between compute nodes and the backup storage. Allows you to manage the lifecycle of an AliyunEBS backup storage, such as adding, enabling, disabling, reconnecting, and deleting an AliyunEBS backup storage. Allows you to centrally manage the images in an AliyunEBS backup storage. Monitors and displays the percentage of used capacity of an AliyunEBS backup storage. Allows you to add Alibaba Cloud regions can be accessed by your AccessKey. The zones and resources in the regions can be synchronized to local. Supports two types of regions: Alibaba Cloud regions and Private Alibaba Cloud regions. Divides Private Alibaba Cloud regions into two types: AliyunNAS region and AliyunEBS region. Allows you to centrally manage the zones and buckets in a region. Allows you to use a bucket to transfer a local image to Region Alibaba Cloud. Supports two methods to add buckets: add an available bucket existing in the region, or create a new bucket. Allows you to manage the lifecycle of a bucket, such as adding and deleting a bucket. Allows you to set a bucket as the default bucket for the image upload. Allows you to cancel the default state of a bucket. Allows you to delete a region from local without influencing the corresponding actual resource on Alibaba Cloud. Allows you to synchronize zones in a region you added , or manually add zones that can be accessed by your AccessKey. Resources in an added zone can be synchroniz Zone ed to local. Allows you to centrally manage the resources associated with a zone, such as vSwithes and ECS instances. 234 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description Allows you to delete a zone from local without influencing the corresponding actual resource on Alibaba Cloud. An identity credential that has access to APIs of Alibaba Cloud or Private Alibaba Cloud, thus enabling you to use relevant Cloud services. Supports two types of AccessKeys: Alibaba Cloud AccessKeys and Private Alibaba Cloud AccessKeys. Divides Private Alibaba Cloud AccessKeys into two types: AccessKey AliyunNAS AccessKey and AliyunEBS AccessKey. Management Allows you to manage the lifecycle of an AccessKey, such as adding and deleting an AccessKey. Allows you to set an AccessKey as default to call APIs of Alibaba Cloud or Private Alibaba Cloud. Allows you to cancel the default state of an AccessKey. Displays the basic information of an AccessKey, which helps in the user management. Allows you to configure settings that take effect on the whole platform. Supports quick search and directory navigation to help you Hybrid Cloud Settings quickly locate target items. Allows you to modify settings of a single item in Hybrid Cloud Settings. Audits all of the Hybrid Cloud Management actions, which Audit effectively ensure the security of the cloud environment. Features in Cryptography Security Compliance Service Type Features Description Allows you to add a 3rd-party cryptographic platform to Cryptograp provide external cryptographic services, such as signature hy 3rd-Party Cryptograp and encryption. Security hic Service Allows you to manage the lifecycle of 3rd-party cryptographic Compliance services, such as adding and deleting 3rd-party cryptograp hic services. Issue: V5.1.8 235Technical Whitepaper / 3 Product Features Type Features Description Supports following 3rd-party cryptographic service platforms : Haitai Service Platform, Aisino Service Platform, and China Telecom Quantum Technology Service Platform. Provides event alarms for status metrics of the 3rd-party cryptographic service. An HSM pool is a logical group of hardware security modules (HSMs) and is used to provide unified cryptography services such as signature validation and encryption. Allows you to manage the lifecycle of HSM pools, such as creating and deleting HSM pools. HSM Pool Supports two HSM Type: Cryptographic Server and Signature Verification Server. Supports one Cryptographic server model: FLKSEC Supports 5 signature verification server model: FLKSEC, Netsign, Jit, Fisec, and Sansec. Allows you to manage the lifecycle of HSMs, such as adding , enabling, disabling, and deleting HSMs. HSM Provides event alarms for state and status metrics of the HSM. Provides certificate login and data protection by using hardware security modules (HSMs) that are tested and certified by the State Cryptography Administration. The Cloud manages these HSMs by using HSM pools and Platform Cryptography therefore can provide the certificate login and data protection Security Compliance services in a unified way. Allows you to enable both Certificate Login and Data Protection for the Cloud or enable either one separately. Allows you to view the enabling progress in a visualized way. The certificate login feature is implemented based on the SM2 algorithm. After this feature is enabled, UKey authentica tion is required during login, which helps to ensure the Certificate Login identity authenticity. Allows you to enable certificate login for admin or tenants ( Tenant Management Plus License is required). Data Protection The data protection feature is implemented based on the SM3, HMAC-SM3 and SM4 algorithms. After this feature 236 Issue: V5.1.8Technical Whitepaper / 3 Product Features Type Features Description is enabled, important data such as logs, passwords, and images can be encrypted and protected. This helps to ensure the data confidentiality and integrity. Allows you to customize a protection scope for log data. You can choose to protect logs produced in the last 30, 60, 90, or 180 days, or protect all log data. Audits all of the Cryptography Security Compliance Audit actions, which effectively ensures the security of the cloud environment. Issue: V5.1.8 237Technical Whitepaper / 4 Product Highlights 4 Product Highlights ZStack Cloud is the next-generation IaaS software featuring Simple, Strong, Scalable and Smart (4S). 1. Simple • Easy installation and deployment: Provides installation packages on our official website. You can install and deploy the Cloud from scratch within just 30 minutes. • Easy to set up: Supports bulk VM operations, such as creating or deleting VM instances in bulk. • Simple, practical operations: Provides a thorough User Guide with ample help information, productive community, and standard APIs. • Friendly UI: Provides a well-designed user interface with powerful features at your fingertip. 2. Strong • Stable, efficient system architecture design: Provides an asynchronous architecture, in -process microservices architecture, lock-free architecture, stateless service architectu re, and consistent hashing ring to ensure the system efficiency and stability. A single management node can manage tens of thousands hosts, and hundreds of thousands of VM instances. A cluster that contains multiple management nodes can use a database and a set of message buses to manage hundreds of thousands of hosts and millions of VM instances, and handle tens of thousands of concurrent APIs. • High concurrent API requests: A single ZStack Cloud management node can easily handle tens of thousands of concurrent API call requests per second. • Stringent HA requirements: When a network or management node is unavailable, VM instances can be automatically switched to another management node that is detected as healthy. The management node virtualization helps to achieve the high availability for a single management node. That is, standby management nodes will be dynamically applied within seconds if any management node is disconnected, thus ensuring your business continuity. 3. Scalable • Large scale: A single management node can manage one to tens of thousands of hosts and hundreds of thousands of VM instances. 238 Issue: V5.1.8Technical Whitepaper / 4 Product Highlights • Comprehensive API: ZStack Cloud provides a whole set of IaaS APIs. Hence, you can create brand-new, available zones across multiple geographical locations, modify network configurations, and upgrade physical servers. • Resource allocation based on your needs: Resizes important resources such as VM instances and cloud storages according to your demands. ZStack Cloud not only allows you to modify online the CPU, memory, and other resources for a VM instance, but also allows you to dynamically adjust its network bandwidth, disk bandwidth, and other resources for a VM instance. 4. Smart • Automatic O&M: Everything in ZStack Cloud is managed APIs. By using the Ansible inventory, ZStack Cloud can realize full-automatic deployment and upgrade as well as automatic detection and reconnection. If network jitters happen or hosts restart, each management node can be automatically reconnected to the networks or the hosts. Note that a ZStack Cloud scheduler allows you to start or stop VM instances on schedule, and allows you to take VM snapshots on schedule with the round-robin policy. • Online seamless upgrade: Provides one-click seamless upgrade within 5 minutes. Hence, you only need to upgrade and manipulate management nodes. After the Cloud is upgraded successfully and started, the compute node, storage node, and network node will be automatically upgraded as well. • Real-time global monitoring: Manages and controls the current resource consumption of the entire cloud. With the real-time monitoring, you can adjust your resources intelligently to save IT software and hardware resources. Issue: V5.1.8 239Technical Whitepaper / Glossary Glossary Instance An instance is a virtual machine or server that runs the images of operating systems in Cloud, such as VM instance and elastic baremetal instance. VM Instance A VM instance is a virtual machine instance running on a host. A VM instance has its own IP address and can access public networks and run application services. Volume A volume provides storage space for a VM instance. Volumes are categorized into root volumes and data volumes. Root Volume A root volume provides support for the system operations of a VM instance. Data Volume A data volume provides extended storage space for a VM instance. Image An image is a template file used to create a VM instance or volume. Images are categorized into system images and volume images. Instance Offering An instance offering defines the number of vCPU cores, memory size, network bandwidth, and other configuration settings of VM instances. Disk Offering A disk offering defines the capacity and other configuration settings of volumes. GPU Specification A GPU specification defines the frame per second (FPS), video memory, resolution, and other configuration settings of a physical or virtual GPU. GPU specifications are categorized into physical GPU specifications and virtual GPU specifications. 240 Issue: V5.1.8Technical Whitepaper / Glossary vNUMA Configuration vNUMA uses CPU pinning to passthrough the topology of associated host physical NUMA ( pNUMA) nodes to a VM instance, generating a topology of virtual NUMA (vNUMA) nodes for the VM instance. This topology enables a vCPU on a vNUMA node to primarily access the local memory and thus improves VM performance. NUMA (Non-Uniform Memory Access) Non-uniform memory access (NUMA) is a computer memory design where the memory access time depends on the memory location relative to the CPU. Under NUMA, a processor can access its own local memory faster than non-local memory and thus improves VM performance. pNUMA Node (physical NUMA Node) A pNUMA node (physical NUMA node) is a host NUMA node predefined based on the host NUMA architecture. It is used to manage the CPUs and memory of the host. pNUMA Topology (physical NUMA Topology) A pNUMA topology (physical NUMA topology) is the topology of the host NUMA nodes predefined by the CPU vendor based on the host NUMA architecture. vNUMA Node (virtual NUMA Node) A vNUMA node (virtual NUMA node) is generated by passing-through associated pNUMA nodes via CPU pinning. It is used to manage the CPUs and memory of a VM instance. vNUMA Topology (virtual NUMA Topology) A vNUMA topology (virtual NUMA topology) is the topology of VM NUMA nodes generated by passing-through associated pNUMA nodes via CPU pinning. Local Memory Local memory is the memory that a CPU (pCPU or vCPU) accesses through the Uncore iMC ( Integrated Memory Controller) of the same NUMA (pNUMA or vNUMA) node. Compared with accessing non-local memory, accessing local memory has lower latencies. CPU Pinning CPU pinning assigns the virtual CPUs (vCPUs) of a VM instance to specific physical CPUs ( pCPUs) of the host, which improves VM performance. Issue: V5.1.8 241Technical Whitepaper / Glossary EmulatorPin Configuration EmulatorPin assigns all other threads than virtual CPU (vCPU) threads and IO threads of a VM instance to physical CPUs (pCPUs) of the host so that these threads run on assigned pCPUs. Auto-Scaling Group An auto-scaling group is a group of VM instances that are used for the same scenarios. An auto- scaling group can automatically scale out or in based on application workloads or health status of VM instances in the group. Snapshot A snapshot is a point-in-time capture of data status in a volume. Affinity Group A VM scheduling policy is a resource orchestration policy based on which VM instances are assigned hosts to achieve the high performance and high availability of businesses. Zone A zone is a logical group of resources such as clusters, L2 networks, and primary storage. Zone is the largest resource scope defined in the Cloud. Cluster A cluster is a logical group of hosts (compute nodes). Host A host provides compute, network, and storage resources for VM instances. Primary Storage A primary storage is one or more servers that store volume files of VM instances. These files include root volume snapshots, data volume snapshots, image caches, root volumes, and data volumes. Backup Storage A backup storage is a storage server that stores VM image templates, including ISO image files. 242 Issue: V5.1.8Technical Whitepaper / Glossary iSCSI Storage iSCSI storage is an SAN storage that uses the iSCSI protocol for data transmission. You can add an iSCSI SAN block as a Shared Block primary storage or pass through the block to a VM instance. FC Storage FC storage is an SAN storage that uses the FC technology for data transmission. You can add an FC SAN block as a Shared Block primary storage or pass through the block to a VM instance. NVMe Storage A type of storage implemented via the NVMe-oF (NVMe over fabrics) protocol. You can add a block device configured from an NVMe storage as SharedBlock primary storage. L2 Network An L2 network is a layer 2 broadcast domain used for layer 2 isolation. Generally, L2 networks are identified by names of devices on the physical network. VXLAN Pool A VXLAN pool is a collection of VXLAN networks established based on VXLAN Tunnel Endpoints (VTEPs). The VNI of each VXLAN network in a VXLAN pool must be unique. L3 Network An L3 network includes IP ranges, gateway, DNS, and other network configurations that are used by VM instances. Public Network Generally, a public network is a logical network that is connected to the Internet. However, in an environment that has no access to the Internet, you can also create a public network. Flat Network A flat network is connected to the network where the host is located and has direct access to the Internet. VM instances in a flat network can access public networks by using elastic IP addresses. VPC Network A VPC network is a private network where VM instances can be created. A VM instance in a VPC network can access the Internet through a VPC vRouter. Issue: V5.1.8 243Technical Whitepaper / Glossary Management Network A management network is used to manage physical resources in the Cloud. For example, you can create a management network to manage access to hosts, primary storages, backup storages, and VPC vRouters. Flow Network A flow network is a dedicated network for port mirror transmission. You can use a flow network to transmit the mirrors of data packets of NIC ports to the target ports. VPC vRouter A VPC vRouter is a dedicated VM instance that provides multiple network services. VPC vRouter HA Group A VPC vRouter HA group consists of two VPC vRouters. Either VPC vRouter can be a primary or secondary VPC vRouter for the group. If the primary VPC vRouter does not work as expected, the VPC vRouter becomes the secondary VPC vRouter in the group to ensure high availability of business. vRouter Image A vRouter image encapsulates network services and can be used to create VPC vRouters. Dedicated-Performance LB Image A dedicated-performance load balancer (LB) image encapsulates dedicated-performance load -balancing services and can be used to create load balancer instances. However, a dedicated- performance load balancer image cannot be used to create VM instances. vRouter Offering A vRouter offering defines the number of vCPU cores, memory size, image, management network , and public network configuration settings of VPC vRouters. You can use a vRouter offering to create VPC vRouters that can provide network services for public networks and VPC networks. LB Instance Offering A load balancer (LB) instance offering defines the CPU, memory, image, and management network configuration settings used to create LB instances. LB instances provide load balancing services for the public network, flat network, and VPC network. 244 Issue: V5.1.8Technical Whitepaper / Glossary SDN Controller An SDN controller is used to control network devices such as switches. You can add an external SDN controller to the Cloud and use the controller to control external switches and other network devices. Security Group A security group provides security control services for VM NICs. It filters the ingress or egress TCP, UDP, and ICMP packets of VM NICs based on the specified security rules. VIP In bridged network environments, a virtual IP address (VIP) provides network services such as serving as an elastic IP address (EIP), port forwarding, load balancing, IPsec tunneling. When a VIP provides the preceding network services, packets are sent to the VIP and then routed to the destination network where VM instances are located. EIP An elastic IP address (EIP) functions based on the NAT technology. IP addresses in a private network are translated into an EIP that is in another network. This way, private networks can be accessed from other networks by using EIPs. Port Forwarding Port forwarding functions based on the layer-3 forwarding service of VPC vRouters. This service forwards traffic flows of the specified IP addresses and ports in a public network to specified ports of VM instances by using the specified protocol. If your public IP addresses are insufficient, you can configure port forwarding for multiple VM instances by using one public IP address and port. Load Balancer A load balancer distributes traffic flows of a virtual IP address to backend servers. It automatically inspects the availability of backend servers and isolates unavailable servers during traffic distributi on. This way, the load balancer improves the availability and service capability of your business. Listener A listener monitors the frontend requests of a load balancer and distributes the requests to a backend server based on the specified policy. In addition, the listener performs health checks on backend servers. Issue: V5.1.8 245Technical Whitepaper / Glossary Forwarding Rule A forwarding rule forwards the requests from different domain names or URLs to different backend server groups. Backend Server Group A backend server group is a group of backend servers that handles requests distributed by load balancers. It is the basic unit for traffic distribution by load balancer instances. Backend Server A backend server handles requests distributed by a load balancer. You can add a VM instance on the Cloud or a server on a third-party cloud as a backend server. Frontend Network A frontend network is a type of network that is associated with a load balancer. Requests from the network are distributed by the load balancer to backend servers based on a specified policy. Backend Network A backend network is a type of network that is associated with a load balancer. Requests from frontend networks are distributed by the load balancer to servers in the backend network. Load Balancer Instance A load balancer instance is a custom VM instance used to provide load balancing services. Certificate If you select HTTPS for a listener, associate it with a certificate to make the listener take effect. You can upload either a certificate or certificate chain. Firewall A firewall is an access control policy that monitors ingress and egress traffic of VPC vRouters and decides whether to allow or block specific traffic based on the associated rule sets and rules. Firewall Rule Set A firewall rule set is a set of rules that a firewall uses to defend against network attacks. You need to associate a rule set with the egress or ingress flow direction of VPC vRouter NICs to make the rule set take effect. 246 Issue: V5.1.8Technical Whitepaper / Glossary Firewall Rule A firewall rule is an access control entry associated with the egress or ingress flow direction of VPC vRouter NICs to defend against network attacks. A firewall rule includes rule priority, match condition, and behavior. Rule Template A rule template is a template that you can select when you add rules to a rule set or a firewall. IP/Port Set An IP or port set is a set of IP addresses or ports that you can select when you add rules to a rule set or a firewall. IPsec Tunnel An IPSec tunnel encrypts and verifies IP packets that transmit over a virtual private network (VPN ) from one site to another. OSPF Area An Open Shortest Path First (OSPF) area is divided from an autonomous system based on the OSPF protocol. This simplifies the hierarchical management of vRouters. NetFlow A NetFlow monitors the ingress and egress traffic of the NICs of VPC vRouters. The supported versions of data flows are V5 and V9. Port Mirroring Port mirroring mirrors the traffic data of VM NICs and sends the traffic data to the target ports. This allows for the analysis of data packets of ports and simplifies the monitoring and management of data traffic and makes it easier to locate network errors and exceptions. Route Table A route table contains information about various routes that you configure. Route entries in a route table must include the destination network, next hop, and route priority. CloudFormation CloudFormation is a service that simplifies the management of cloud resources and automates deployment and O&S. You can create a stack template to configure cloud resources and their Issue: V5.1.8 247Technical Whitepaper / Glossary dependencies. This way, resources can be automatically configured and deployed in batches. CloudFormation provides easy management of the lifecycle of cloud resources and integrates automatic O&S into API and SDK. Resource Stack A resource stack is a stack of resources that are configured by using a stack template. The resources in the stack have dependencies with each other. You can manage resources in the stack by managing the resource stack. Stack Template A stack template is a UTF8-encoded file based on which you can create resource stacks. The stack template defines the resources that you want, the dependencies between the resources , and the configuration settings of the resources. When you use a stack template to create a resource stack, CloudFormation parses the template and the resources are automatically created and configured. Sample Template A sample template is a commonly used resource stack. You can use a sample template provide by the Cloud to create resource stacks. Designer A designer is a CloudFormation tool that allows you to orchestrate cloud resources. You can drag and drop resources on a canvas and use lines to establish dependencies between the resources. Baremetal Cluster A baremetal cluster consists of baremetal chassis. You can manage baremetal chassis by managing a baremetal cluster where the chassis reside. Deployment Server A deployment server is a server that provides PXE service and console proxy service for baremetal chassis. Baremetal Chassis A baremetal chassis is used to create a baremetal instance and is identified based on the BMC interface and IPMI configuration setting. 248 Issue: V5.1.8Technical Whitepaper / Glossary Preconfigured Template A preconfigured template is used to create a preconfigured file that allows for unattended batch installation of an operating system for baremetal instances. Baremetal Instance A baremetal instance is an instantiated baremetal chassis. Elastic Baremetal Management Elastic Baremetal Management provides dedicated physical servers for your applications to ensure high performance and stability. In addition, this feature allows elastic scaling. You can apply for and scale resources based on your needs. Provision Network A provision network is a dedicated network for PXE boot and image downloads while creating elastic baremetal instances. Elastic Baremetal Cluster An elastic baremetal cluster consists of elastic baremetal instances. You can manage elastic baremetal instances by managing an elastic baremetal cluster where the instances reside. Gateway Node A gateway node is a node where the ingress and egress traffic of the Cloud and elastic baremetal instances is forwarded. Baremetal Node A baremetal node is used to create a baremetal instance and is identified based on the BMC interface and IPMI configuration setting. Elastic Baremetal Instance An elastic baremetal instance has the same performance as physical servers and allows elastic scaling. You can apply for and scale resources based on your needs. Elastic Baremetal Offering An elastic baremetal offering defines the number of vCPU cores, memory size, CPU architecture, CPU model, and other configuration settings of elastic baremetal instances. Issue: V5.1.8 249Technical Whitepaper / Glossary vCenter The Cloud allows you to take over vCenter and manage resources on the vCenter. VM Instance A VM instance is an ESXi virtual machine instance running on a host. A VM instance has its own IP address to access public networks and can run application services. Network A vCenter network defines the network settings of VM instances on vCenter, such as IP range, gateway, DNS, and network services. Volume A volume provides storage space for a VM instance on vCenter. A volume attached to a VM instance can be used as a root volume or data volume. A root volume provides support for the system operations of a VM instance. A data volume provides extended storage space for a VM instance. Image An image is a template file used to create a VM instance or volume on vCenter. Images are categorized into system images and volume images. Event Message Event Message displays event alarm messages of vCenter that is took over by the Cloud. This feature allows you to locate errors and exceptions efficiently. Network Topology A network topology visualizes the network architecture of the Cloud. It allows for efficient planning , management, and improvement of network architecture. Network topologies can be categorized into global topologies and custom topologies. Performance Analysis Performance Analysis displays the performance metrics of key resources monitored externally or internally in the Cloud. You can view the performance analysis or export the analysis report as needed to improve the O&M efficiency. 250 Issue: V5.1.8Technical Whitepaper / Glossary Capacity Management Capacity Management visualizes the capacities and usages of key resources in the Cloud. You can use this feature to improve O&S efficiency. MN Monitoring Management Node (MN) monitoring allows you to view the health status of each management node when you use multiple management nodes to achieve high availability. Alarm An alarm is used to monitor the status of time-series data and events and respond to the status change. Alarms can be categorized into resource alarm, event alarm, and extended alarm. One-Click Alarm A one-click alarm integrates multiple metrics of a resource. You can create one-click alarms for multiple resources to monitor these resources. Alarm Template An alarm template is a template of alarm rules. If you associate an alarm template with a resource group, an alarm is created to monitor the resources in the group. Resource Group A resource group consists of resources grouped based on your business needs. If you associate an alarm template with a resource group, the alarm rules specified by the template take effect on all the resources in the group. Message Template A message template specifies the text template of a resource alarm message or event alarm message sent to an SNS system. Message Source A message source is used to take over extended alarm messages. If you configure alarms for message sources, extended alarm messages can be sent to various endpoints. Issue: V5.1.8 251Technical Whitepaper / Glossary Endpoint An endpoint is a method that users obtain subscribed messages. Endpoints are categorized into system endpoints, email, DingTalk, HTTP application, short message service, and Microsoft Teams. Alarm Message An alarm message is a message sent the time when an alarm is triggered. Current Task A current task is an ongoing operation performed in the Cloud. You can perform centralized management over ongoing operations. Operation Log An operation log is a chronological record of operations on the specified objects and their operation results. Audit Audit monitors and records all activities on the Cloud. You can use this feature to implement operation tracking, cybersecurity classified protection compliance, security analysis, troublesho oting, and automatic O&M. Log Collection Allows you to collect with one click the log data from the Cloud and various nodes on the Cloud generated in the specified time period and download the log data. One-Click Inspection Comprehensively inspects the health status of key resources and services of the Cloud and scores their healthiness based on the inspection results. In addition, the one-click inspection service provides O&M suggestions and inspection reports. Backup Management Backup management integrates multiple disaster recovery technologies such as incremental backup and full backup that are suitable for multiple business scenarios. You can implement local backup and remote backup based on your business needs. 252 Issue: V5.1.8Technical Whitepaper / Glossary Backup Job You can create a backup job to back up local VM instances, volumes, or databases to a specified storage server on a regular basis. Local Backup Data Local backup data of VM instances, volumes, and databases is stored in the local backup storage. Local Backup Server A local backup server is located at the local data center and is used to store local backup data. Remote Backup Server A remote backup server is located at a remote data center or a public cloud and is used to store remote backup data. Continuous Data Protection (CDP) Continuous Data Protection (CDP) provides second-level and fine-grained continuous backups for important business systems in VM instances, allowing users to restore VM data to a specific time state, and retrieve files without restoring the system. CDP Task You can create a CDP task to continuously back up your VM data to a specified backup server to achieve continuous data protection and recovery. CDP Data The backup data generated from continuous data protection on VM instances is stored in local backup servers. Recovery Point A recovery point is a data point generated during continuous data protection. A recovery point corresponds to a data record within the recovery point interval specified by the user. Locked Recovery Point You can lock or unlock a recovery point as needed. After a recovery point is locked, data of the recovery point will not be automatically cleared or deleted. Issue: V5.1.8 253Technical Whitepaper / Glossary Recovery Task A recovery task helps you quickly restore data by specifying a CDP task and recovery point, and allows you to view the recovery progress and logs in a more friendly way. Cryptography Security Compliance The Cryptography Security Compliance service provides applications with cloud security capabiliti es based on commercial cryptography, meeting the requirements of commercial cryptography application security assessments. HSM Pool An HSM pool is a logical group of hardware security modules (HSMs) and is used to provide unified cryptography services such as signature validation and encryption. HSM A hardware security module (HSM) is a dedicated device that encrypts, decrypts, and authentica tes information by using the cryptographic technology. Platform Cryptography Security Compliance Enables the Cloud to meet the requirements of Cryptography Security Compliance through the cryptography capabilities provided by HSM pools. Certificate Login Authenticates the identity of a user by using a UKey device. Data Protection Protects important data on the Cloud to ensure the data confidentiality and integrity. Scheduled Job A scheduled job defines that a specific action be implemented at a specified time based on a scheduler. Scheduler A scheduler is used to schedule jobs. It is suitable for business scenarios that last for a long time. Tag A tag is used to mark resources. You can use a tag to search for and aggregate resources. 254 Issue: V5.1.8Technical Whitepaper / Glossary Migration Service The Cloud provides V2V migration service that allows you to migrate VM instances and data from other virtualized platform to the current cloud platform. V2V Migration V2V Migration allows you to migrate VM instances from the VMware or KVM platform to the current cloud platform. V2V Conversion Host A V2V conversion host is a host in the destination cluster that you need to specify during V2V migration to cache VM instances and data when you implement V2V migration. After the VM instances and data are cached in the V2Vconversion host, they are migrated to the destination primary storage. User A user is a natural person that constructs the most basic unit in Tenant Management. User Group A user group is a collection of natural persons or a collection of project members. You can use a user group to grant permissions. Role A role is a collection of permissions that can be granted to users. A user that assumes a role can call API operations based on the permissions specified by the role. Roles are categorized into platform roles and project roles. Single Sign On The Single Sign On service provided by the Cloud. It supports seamless access to SSO systems . Through the service, related users can directly log in to the Cloud and manage cloud resources. Currently, AD/LDAP/OIDC/OAuth2/CAS servers can be added. Project A project is a task that needs to be accomplished by specific personnel at a specified time. In Tenant Management, you can plan resources at the project granularity and allocate an independent resource pool to a project. The word Tenant in Tenant Management mainly refers to projects. A project is a tenant. Issue: V5.1.8 255Technical Whitepaper / Glossary Project Member A project member is a member in a project who is granted permissions on specific project resources and can use the resources to accomplish tasks. Project members include the project admin, project managers, and normal project members. Process Management Process management is part of ticket management that manages the processes related to the resources of projects. Processes can be categorized into default processes and custom processes . My Approvals In the Cloud, only the administrator and project administrators are granted approval permissions. the administrator and project administrators can approve or reject a ticket. If a ticket is approved, resources are automatically deployed and allocated to the specified project. Bills A bill is the expense of resources totaled at a specified time period. Billing is accurate to the second. Bills can be categorized into project bills, department bills, and account bills. Pricing List A pricing list is a list of unit prices of different resources. The unit price of a resource is set based on the specification and usage time of the resource. Console Proxy Console proxy allows you to log in to a VM instance by using the IP address of a proxy. AccessKey Management An AccessKey pair is a security credential that one party authorizes another party to call API operations and access its resources in the Cloud. AccessKey pairs shall be kept confidential. IP Blocklist/Allowlist An IP blocklist or allowlist identifies and filters IP addresses that access the Cloud. You can create an IP allowlist or blocklist to improve access control of the Cloud. 256 Issue: V5.1.8Technical Whitepaper / Glossary Application Center Application Center allows you to add third-party applications to the Cloud and then access the applications by using the Cloud. It extends the functionality of the Cloud. Sub-Account Management A sub-account can be created by the admin or synced from an SSO authentication system and is managed by the admin. Resources created under a sub-account are managed by the sub-account . Theme and Appearance You can customize the theme and appearance of the Cloud. Email Server If you select Email as the endpoint of an alarm, you need to set an email server. Then alarm messages are sent to the email server. Log Server A log server is used to collect logs of the management node. You can add a log server to the cloud and use the collected logs to locate errors and exceptions. This makes your O&M more efficient. Global Setting Global Setting allows you to configure settings that take effect on the whole platform. Scenario Template Scenario Template provides multiple templates that encapsulate scenario-based global settings . You can apply a template globally with one click based on your business needs. This improves your O&M efficiency. HA Policy HA Policy is a mechanism that ensures sustained and stable running of the business if VM instances are unexpectedly stopped or are errored because of errors occurring to compute, network, or storage resources associated with the VM instances. By enabling this feature, you can customize VM HA policies to ensure your business continuity and stability. Issue: V5.1.8 257Technical Whitepaper / Glossary Time Management Manages the Cloud system time and allows you to configure time servers for the Cloud. After you configure NTP time servers for the Cloud, the clock of the time servers is synced with all nodes of the Cloud. GPU Device A GPU device is a powerful microprocessor with high computational capabilities. You can use a GPU device to handle intricate graphics rendering and parallel computing jobs, thus improving the efficiency of businesses such as graphic production, video processing, and machine learning. 258 Issue: V5.1.8">
To view the full page, please visit: ZStack Cloud Enterprise-x86-perpetual Product Userguide

ZStack Cloud Enterprise-x86-perpetual

ZStack Cloud Enterprise is a productized Infrastructure as a Service (IaaS) software that provides a unified platform to manage compute, network, and storage resources in data centers.
Buy now