Compute_Cloud_Services_#3.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

IT2314 Image Management Service Image Management Service (IMS) allows you to manage the entire lifecycle of your images. You can create ECSs or BMSs from public, private, or shared images. You can also create a private image from a cloud server or an external image file to make it easier to migrate...

IT2314 Image Management Service Image Management Service (IMS) allows you to manage the entire lifecycle of your images. You can create ECSs or BMSs from public, private, or shared images. You can also create a private image from a cloud server or an external image file to make it easier to migrate workloads to the cloud or on the cloud. An image is a server or disk template that contains an operating system (OS), service data, and necessary application software, such as database software. IMS provides public, private, Marketplace, and shared images. Why IMS? Convenient: You can create a private from an ECS or external image file, or batch-create ECSs from an image. Flexible: You can manage images through the management console or using APIs. Centralized: IMS provides a self-service platform to simplify image management and maintenance. Secure: Public images come with multiple mainstream OSs, such as Windows Server, Ubuntu, and CentOS, which have been thoroughly tested to provide secure and stable services. Image Types Public image: A public image is a standard image provided by the cloud platform and is available to all users. It contains an OS and various preinstalled public applications. If a public image does not contain the application environment or software you need, you can use a public image to create an ECS and then install the software you need. Public images include the following OSs to choose from: Windows, CentOS, Debian, openSUSE, Fedora, Ubuntu, EulerOS, and CoreOS. When you use certain public images, the system recommends the Host Security Service (HSS) and server monitoring. HSS supports two-factor authentication for logins, defense against account cracking, and weak password detection to protect your ECSs against brute-force attacks. Private image: A private image is only available to the user who created it. It contains an OS, service data, preinstalled public applications, and custom applications that the image creator added. A private image can be a system disk image, data disk image, or full-ECS image. o A system disk image contains an OS and pre-installed software for various services. You can use a system disk image to create ECSs and migrate your services to the cloud. o A data disk image contains only service data. You can use a data disk image to create EVS disks and use them to migrate your service data to the cloud. o A full-ECS image contains an OS, pre-installed software, and service data. Shared image: A shared image is a private image another user has shared with you. Marketplace image: A Marketplace image is a third-party image published in the Marketplace. It has an OS, application environment, and software pre-installed. You can use these images to deploy websites and application development environments in just a few clicks. No additional configuration is required. Marketplace images are provided by service providers who have extensive experience configuring and maintaining cloud servers. All the images are thoroughly tested and have been approved by HUAWEI CLOUD before being published. 03 Handout 1 *Property of STI  Page 1 of 4 [email protected] IT2314 Scenarios Migrating Servers to the Cloud or in the Cloud You can import local images to the cloud platform and use the images to quickly create cloud servers for service migration to the cloud. You can also share or replicate images across regions to migrate ECSs between accounts and regions. A variety of image formats can be imported, including VMDK, VHD, QCOW2, RAW, VHDX, QED, VDI, QCOW, ZVHD2, and ZVHD. Image files in other formats need to be converted to one of these formats before being imported. You can use the open-source tool qemu-img or the Huawei tool qemu-img- hw to convert the image. Deploying a Specific Software Environment You can use shared or Marketplace images to quickly build custom software environments without having to manually configure environments or install any software. This is especially useful for Internet startups. In traditional batch service deployment, you need to evaluate different service scenarios, select an OS, database, and software, and install them. The deployment quality depends on the skills of R&D and O&M personnel. On the cloud platform, you can quickly create ECSs by using public, private, Marketplace, or shared images. You only need to identify sources of shared images. Public, private, and Marketplace images have been thoroughly tested to ensure security and stability. Backing Up Server Environments You can create an image from an ECS to back up the ECS. If the ECS breaks down for some reason, you can use the image to restore it. This is similar to system restoration with Ghost. You can create a Ghost recovery point for your PC. If the PC is infected with a virus or the system breaks down for some reason, you can restore it to the recovery point you created. On the public cloud, you can create a private image to back up an ECS. If periodic backup is required, you are advised to use cloud services such as Cloud Server Backup Service (CSBS) and Volume Backup Service (VBS) for the backup. Other Compute Services Auto Scaling (AS) automatically adjusts resources to keep up with changes in demand based on pre-configured AS policies. You can specify AS configurations and policies based on service requirements. These configurations and policies free you from having to repeatedly adjust resources to keep up with service changes and spikes in demand, helping you reduce the resources and manpower required. 03 Handout 1 *Property of STI  Page 2 of 4 [email protected] IT2314 Why AS? Automatic resource adjustment: AS adds ECS instances and increases bandwidth for your applications when the access volume increases and reduces unneeded resources when the access volume drops, ensuring system stability. Enhanced cost management: AS enables you to use instances and bandwidth on demand by automatically adjusting system resources, so utilization goes up and costs go down. Improved availability: AS ensures there are always enough resources deployed for your applications. When working with ELB, AS automatically associates a load balancing listener with any instances newly added to the AS group. Then, ELB automatically distributes access traffic to all instances in the AS group through the listener, which improves system availability. High fault tolerance: AS monitors the status of instances in an AS group, and replaces any unhealthy instances it detects. AS Architecture AS automatically adjusts compute resources based on service demands and configured AS policies. The number of ECS instances changes to match service demands, ensuring service availability. AS allows you to adjust the number of ECSs in an AS group and EIP bandwidths bound to the ECSs. Scaling control: You can specify thresholds and schedule when different scaling actions are taken. AS will trigger scaling actions on a repeating schedule, at a specific time, or when configured thresholds are reached. Policy configuration: You can configure alarm-based, scheduled, and periodic policies as needed. Alarm-based: You can configure alarm metrics such as vCPU, memory, disk, and inbound traffic. Scheduled: You can schedule actions to be taken at a specific time. Periodic: You can configure scaling actions to be taken at scheduled intervals, at a specific time, or within a particular time range. When Cloud Eye generates an alarm for a monitoring metric, for example, CPU usage, AS automatically increases or decreases the number of instances in the AS group or the EIP bandwidth. When the configured triggering time arrives, a scaling action is triggered to increase or decrease the number of ECS instances or the bandwidth. Scenarios Web Applications E-commerce: During big promotions, E-commerce websites need more resources. AS automatically scales out ECS instances and bandwidth within minutes to ensure that promotions go smoothly. Heavy-traffic portals: Service load changes are difficult to predict for heavy-traffic web portals. AS dynamically scales in or out of ECS instances based on monitored ECS metrics, such as vCPU usage and memory usage. AS Basic Concepts AS group: An AS group consists of a collection of instances and AS policies that have similar attributes and apply to the same scenario. It is the basis for enabling or disabling AS policies and performing scaling actions. 03 Handout 1 *Property of STI  Page 3 of 4 [email protected] IT2314 AS configuration: An AS configuration is a template specifying specifications for the instances to be added to an AS group. The specifications include the ECS type, vCPUs, memory, image, disk, and login mode. AS policy: An AS policy can trigger scaling actions to adjust the number of instances in an AS group. An AS policy defines the condition to trigger a scaling action and the operations to be performed. When the triggering condition is met, the system automatically triggers a scaling action. Scaling action: A scaling action adds instances to or removes instances from an AS group. It ensures that the number of instances in an application system is the same as the expected number of instances by adding or removing instances when the triggering condition is met, which improves system stability. Cooldown period: To prevent an alarm policy from being repeatedly triggered for the same event, we use a cooldown period. The cooldown period specifies how long any alarm-triggered scaling action will be disallowed after a previous scaling action is complete. The cooldown period is not used for scheduled or periodic scaling actions. Bandwidth scaling: AS automatically adjusts a bandwidth based on the configured bandwidth scaling policy. AS can only adjust the bandwidth of pay-per-use EIPs and shared bandwidths. It cannot adjust the bandwidth of yearly/monthly EIPs. Cloud Container Engine (CCE) is a highly scalable, high-performance, enterprise-class Kubernetes service for you to run containers and applications. With CCE, you can easily deploy, manage, and scale containerized applications on HUAWEI CLOUD. A Dedicated Host (DeH) is a physical server fully dedicated to your own services. DeH allows you to ensure performance by keeping compute resources isolated. DeH also allows you to use your existing software licenses, so you can leverage existing investments to save money. FunctionGraph allows you to run your code without provisioning or managing servers, while ensuring high availability and scalability. All you need to do is upload your code and set execution conditions, and FunctionGraph will take care of the rest. You pay only for what you use and you are not charged when your code is not running. 03 Handout 1 *Property of STI  Page 4 of 4 [email protected]

Use Quizgecko on...
Browser
Browser