0% found this document useful (0 votes)
108 views35 pages

2.1 - Compute Cloud Services-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views35 pages

2.1 - Compute Cloud Services-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Compute Cloud Services

Foreword

 Computing resources have always been the main artery for the development of the
entire enterprise service system. Without computing resources, enterprise services
cannot run properly. In the cloud computing era, computing services are also the first
type of cloud services. Therefore, the importance of computing resources can be
seen.
 This chapter describes the computing services on HUAWEI CLOUD.

1 Huawei Confidential
Objectives

 On completion of this course, you will be able to:


 Understand common computing services on HUAWEI CLOUD.
 Understand the basic concepts, features, usage methods, and application scenarios of ECSs.
 Have a good command of the basic concepts, features, usage methods, and application scenarios of IMS.
 Understand the basic concepts, features, usage methods, and application scenarios of the AS service.
 Have a good command of the basic concepts and features of the BMS service.

2 Huawei Confidential
Contents

1. Elastic Cloud Server (ECS)

2. Image Management Service (IMS)

3. Auto Scaling (AS)

3 Huawei Confidential
What Is Elastic Cloud Server (ECS)?
 An ECS is a basic computing unit that consists of vCPUs, memory, an OS, and Elastic Volume Service (EVS)
disks. After an ECS is created, you can use it on the cloud similarly to how you would use your local
computer or physical server.

Memory
NIC

Disk Network

vCPU vCPU
Image

ECS
4 Huawei Confidential

• An ECS is a computer system that has complete hardware, operating system, and network
functions and runs in a completely isolated environment.

• ECS has the following advantages:


▫ A variety of specifications to choose from: Different ECS types are available for
different applications. There are multiple, customizable specifications for each type.
▫ A wide range of available images: Public, private, and shared images can be selected.
▫ Different types of EVS disks: Common I/O, high I/O, general-purpose SSD, and ultra-
high I/O EVS disks are available for different service requirements.
▫ Flexible billing: Yearly/monthly and pay-per-use billing modes are available for
different applications. You can purchase and release resources as service levels
fluctuate.
▫ Reliable data: Virtual block storage based on a distributed architecture provides
robust throughput that is scalable and reliable.
▫ Security: The network is isolated from viruses and Trojans by security group rules.
Security services, such as Anti-DDoS, Web Application Firewall and Vulnerability Scan
Service are also available to protect your ECSs.
▫ Flexible, easy-to-use: Elastic computing resources are automatically adjusted based
on service requirements and policies to efficiently meet service requirements.
▫ Highly efficient O&M: Multi-choice management via the management console,
remote access, and APIs with full management permissions.
▫ Cloud monitoring: Cloud Eye monitors your ECSs in real time, generating alarms and
sending notifications when it detects abnormal metrics.
▫ Load balancing: Elastic Load Balance automatically distributes traffic to multiple ECSs
to keep the loads on the servers balanced. It improves the fault tolerance of your
applications and enhances application capabilities.
ECS Advantages

Scalability Hardware and Software


 Automatic adjustment of  Professional hardware
compute resources devices
 Flexible adjustment of ECS  Virtual resources accessible
configurations anytime, anywhere
 Flexible billing modes Scalability

Hardware and Security


Reliability Reliability
Software  A range of security services
 A variety of EVS disk types available for multi-
 Reliable data dimensional protection
Backup and restoration of  Security evaluation
Security

ECSs and EVS disks  Intelligent process


management
 Vulnerability scans

5 Huawei Confidential

• Reliability

▫ A variety of EVS disk types: Common I/O, high I/O, ultra-high I/O, general purpose
SSD, and extreme SSD disks are available for different service requirements.

▫ Reliable data: Scalable, reliable, high-throughput virtual block storage is based on a


distributed architecture. This architecture ensures that data can be quickly migrated
or restored, if necessary, which means you will not lose your data as the result of a
single hardware fault.

▫ Backup and restoration of ECSs and EVS disks: You can configure backup policies on
the management console or use an API to back up ECSs and EVS disks periodically or
at a specified time.

• Security Protection

▫ A range of security services provide multi-dimensional protection: Security services,


such as Web Application Firewall and Vulnerability Scan Service, are available to
protect your ECSs.

▫ Security evaluation: The security of cloud environments is evaluated to help you


quickly detect security vulnerabilities and threats. Security configurations are
reviewed and suggestions provided on how to improve system security. Actions will
be recommended to reduce or avoid altogether potential losses resulting from
viruses or other malicious attacks.
• Hardware and Software

▫ Professional hardware devices ECSs are equipped with professional hardware devices
and can be optimized for virtualization. Users do not need to build their own
equipment rooms.

▫ Virtual resources can be obtained at any time from the virtual resource pool and
exclusively used. Elastic cloud servers can be used on the cloud like local PCs,
ensuring reliable, secure, flexible, and efficient application environments.

• Scalability

▫ Automatic scaling of computing resources: Based on the monitoring data of the


scaling group, ECSs are dynamically added or deleted based on the running status of
applications.

▫ Scheduled scaling: Based on service expectations and operation plans, you can
customize scheduled and periodic policies to automatically add or delete ECS
instances on time.

▫ ECS configuration specifications and bandwidth can be flexibly adjusted based on


service requirements, efficiently matching service requirements.

▫ Flexible billing modes: yearly/monthly, pay-per-use, and bidding ECSs can be


purchased and released at any time based on service fluctuation.
ECS Architecture

ECS works with other products and


services to provide computing, storage,
and network resources.

7 Huawei Confidential

• ECS works with other products and services to provide computing, storage, network, and
image installation functions.

▫ ECSs are deployed in multiple Availability Zones (AZs) connected with each other
through an intranet. If an AZ becomes faulty, other AZs in the same region will not be
affected.

▫ With the Virtual Private Cloud (VPC) service, you can build a dedicated network,
configure subnets and security groups, and allow the VPC to communicate with the
external network through an EIP with bandwidth assigned.

▫ With the Image Management Service (IMS), you can create images for ECSs, or create
ECSs using private images for rapid service deployment.

▫ EVS provides storage and Volume Backup Service (VBS) provides data backup and
recovery functions.

▫ Cloud Eye is a key service to help ensure ECS performance, reliability, and availability.
You can use Cloud Eye to monitor ECS resource usage.

▫ Cloud Backup and Recovery (CBR) backs up data for EVS disks and ECSs and creates
snapshots in case you need to restore them.
Purchasing an ECS

Confirm the
Configure basic Configure advanced End
Start Configure network. configurations and
settings. settings.
buy the ECS.

 Billing Mode  Network  ECS Name  Confirm the


 Region  Security Group  Login Mode configurations.
 AZ  EIP  Cloud Backup and  Buy the ECS.
 CPU Architecture Recovery
 Specifications  ECS Group
 Image  Advanced Options
 Host security
 System Disk

8 Huawei Confidential

• Select a billing mode, yearly/monthly or pay-per-use.

▫ You can purchase a yearly/monthly ECS subscription and enter your required
duration. Yearly/monthly subscriptions are pre-paid, using a single, lump sum
payment.

▫ If you choose pay-per-use billing, you do not need to choose a required duration.
Pay-per-use usage is postpaid.

• Select required specifications: HUAWEI CLOUD provides various ECS types for you to select
based on different applications. You can view the available ECS types and specifications in
the list. Alternatively, you can enter a flavor (such as c3) or search for a flavor by vCPU and
memory.

• Set Network by selecting an available VPC and subnet from the drop-down list, and
specifying a private IP address assignment mode. You can also create a VPC if needed. VPC
provides a network, including subnets and security groups, for an ECS.

• Set EIP. If you want the ECS to connect to the Internet, it needs to have an EIP bound.

• Set Login Mode. Key pair is recommended because key pair authentication is more secure
than using a password.
Billing Mode
 Yearly/Monthly
 prepaid billing mode and is cost-effective for long-term use.

 Pay-per-Use
 A postpaid billing mode in which an ECS will be billed based on usage frequency and duration.

 Spot price
 Spot price ECSs are billed based on the market price, which varies according to the changes in supply
and demand.

9 Huawei Confidential

• Yearly/Monthly: The ECS will be billed based on the service duration. This cost-effective
mode is ideal when the duration of ECS usage is predictable.

• Pay-per-use: The ECS will be billed based on usage frequency and duration. This mode is
ideal when you want more flexibility and control on ECS usage.

• Spot price: The ECS will be billed based on the price that is effective for the time it is being
used. This mode is more cost-effective than pay-per-use, and the spot price will be adjusted
based on supply-and-demand changes.
Region
 Regions are divided based on geographical location and network latency. Public services, such as ECS,
EVS, OBS, VPC, EIP, IMS, are shared within the same region.
 It is recommended that you select the closest region for lower network latency and quick access.

10 Huawei Confidential

• A region can be regarded as a large independent data center, which is divided by


geographical location. Intranets in different areas are not connected

• Huawei Cloud provides services in many regions around the world. You can select a region
and an AZ based on requirements. For more information,
see https://www.huaweicloud.com/intl/en-us/global/.

• Regions are classified into universal regions and dedicated regions. A universal region
provides universal cloud services for common tenants. A dedicated region provides specific
services for specific tenants.

• If your target users are in Asia Pacific (excluding the Chinese mainland), select the CN-Hong
Kong, AP-Bangkok, or AP-Singapore region.

• If your target users are in Africa, select the AF-Johannesburg region.

• If your target users are in Latin America, select the LA-Santiago region. The LA-
Santiago region is located in Chile.

• Resource prices may vary in different regions. .

• https://www.huaweicloud.com/intl/en-us/
Availability Zone
 An AZ contains one or more physical data centers. Each AZ has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.

HUAWEI CLOUD

Region 1 Region 2

AZ 1 AZ 1

AZ 3 AZ 2 AZ 3 AZ 2

11 Huawei Confidential

• AZs within a region are interconnected using high-speed optical fibers, to support cross-AZ
high-availability systems.

• When deploying resources, consider your applications' requirements on disaster recovery


(DR) and network latency.

▫ For high DR capability, deploy resources in different AZs within the same region.

▫ For lower network latency, deploy resources in the same AZ.

• A region has multiple equipment rooms, and each equipment room is an AZ. A region can
have multiple AZs, and an AZ can belong to only one region. Each AZ is independent of each
other, for example, an independent network and a separate power supply system.

• In addition, AZs in each region can communicate with each other. Although each AZ has its
own independent network (in the HA layer), they can communicate with each other at the
network layer.
Specifications
 ECS specifications refer to ECS configurations, including the CPU, memory,
bandwidth, disk, and OS.
Number of vCPU Cores
 AB indicates the ECS type and type ID.
 A specifies the ECS type.
 Kunpeng flavor names start with letter k. For example, kc indicates Kunpeng
AB. C. D
general computing-plus.
Generation Memory/vCPU
 B specifies the type ID. Name ratio

 C specifies the flavor size (the number of vCPUs), such as small, medium,
large, xlarge, 2xlarge, 4xlarge, and 8xlarge. s2. medium. 4
 D specifies the ratio of memory to vCPUs and is expressed in a digit. For example,
value 4 indicates that the ratio of memory to vCPUs is 4.

12 Huawei Confidential

• A: For example, s indicates a general-computing ECS, c indicates a general computing-plus


ECS, and m indicates a memory-optimized ECS.

• B: For example, 1 in s1 indicates the first-generation general-computing ECS, and 2 in s2


indicates the second-generation general-computing ECS. Generally, a larger number
indicates a newer generation, which is more cost-effective. For example, compared with s1
and s2, s6 is more cost-effective.
Access Methods
 HUAWEI CLOUD provides a web-based management platform. You can access ECSs through the
management console or HTTPS-based REST APIs.

API Management Console

Use an API if you need to integrate the ECSs into a third- After registering on HUAWEI CLOUD, log in to the
party system for secondary development. management console and click Elastic Cloud Server
under Compute on the homepage.

13 Huawei Confidential

• You can also access your ECSs using SDKs.


Logging In to a Windows ECS
 Select a login method and log in to the ECS.

Password- VNC
authenticated ECS

RDP

Key-pair- Decrypt the key file for a


MSTSC
authenticated ECS password

Mobile terminal

Mac

14 Huawei Confidential

• Select a login method and log in to the Windows ECS.

▫ Through the management console (VNC): The login username is Administrator.

▫ Using the RDP file provided on the management console: The login username is
Administrator, and the ECS must have an EIP bound.

▫ Using MSTSC: The login username is Administrator, and the ECS must be bound with
an EIP.

▫ From a mobile terminal: The login username is Administrator, and the ECS must have
an EIP bound.

▫ From a Mac: The login username is Administrator, and the ECS must have an EIP
bound.

• For more login methods, visit https://support.huaweicloud.com/intl/en-us/usermanual-


ecs/en-us_topic_0092494943.html.
Logging In to a Linux ECS
 The method of logging in to an ECS varies depending on the login authentication configured
when you purchased the ECS.
VNC+Password

Password-
SSH password+EIP
authenticated ECS

Mobile terminal

Key-pair-
SSH key+EIP
authenticated ECS

15 Huawei Confidential

• To log in to Linux ECS using a password for the first time, you can log in as root:

▫ Through the management console (VNC).

▫ Using an SSH password, as long as the ECS has an EIP bound.

▫ From a mobile terminal, as long as the ECS has an EIP bound.


Reinstalling/Changing an ECS OS
 Scenarios: If the OS of an ECS fails to start, requires optimization, or cannot meet service
requirements, reinstall or change the OS.

Notes
• Only the original image of the ECS can be used to reinstall the OS.
• Changing the OS will change the system disk of the ECS. After the change,
there will be a new system disk ID, and the original system disk will be gone.

16 Huawei Confidential

• Procedure

▫ Log in to the management console.

▫ Click the map icon in the upper left corner and select the desired region and project.

▫ Under Compute, select Elastic Cloud Server.

▫ Locate the row containing the target ECS. Click More in the Operation column and
select Manage Image/Disk > Reinstall OS. Before reinstalling the OS, stop the ECS or
select Automatically stop the ECSs and then reinstall OSs.

▫ Configure the login mode. If the target ECS used key pair authentication, you can
replace the original key pair.
Resetting the ECS Login Password
 Scenarios: The ECS password is lost or has expired.
 Prerequisites: One-click password reset plug-ins have been installed on the ECS.
 Notes: ECSs created using a public image have the one-click password reset plug-in installed by default.

17 Huawei Confidential

• Plug-in name: CloudResetPwdAgent and CloudResetPwdUpdateAgent.

• After installing the one-click password reset plug-ins, do not delete the
CloudResetPwdAgent or CloudResetPwdUpdateAgent process, or one-click password reset
will not be supported.
Scenarios – Internet
Application Scenarios

Website R&D and testing, and small-scale databases

Recommended ECS
General-computing ECSs and general computing-plus ECSs

Recommendation Reasons
ELB VPC  Requirements: To minimize upfront deployment and
O&M costs, applications need to be deployed on only
one or just a few servers, but there are no special
requirements for CPU performance, memory, disk
capacity, or bandwidth, strong security and reliability.
 Solution: General-computing ECSs provide a balance of

compute, memory, and network resources. They are


appropriate for medium-workload applications and meet
ECS ECS ECS the cloud service needs of both enterprises and
individuals.

18 Huawei Confidential

• General-computing ECSs provide a balance of compute, memory, and network resources


and a baseline level of vCPU performance with the ability to burst above the baseline.
These ECSs are suitable for many applications, such as web servers, enterprise
development, and small databases.

• General computing-plus ECSs use dedicated vCPUs to deliver powerful performance. In


addition, the ECSs use latest-generation network acceleration engines and Data Plane
Development Kit (DPDK) to provide high network performance.
Contents

1. Elastic Cloud Server (ECS)

2. Image Management Service (IMS)

3. Auto Scaling (AS)

19 Huawei Confidential
What Is IMS?
 Image Management Service (IMS) allows
you to manage the entire lifecycle of your
images. You can create ECSs or BMSs from
public, private, or shared images. You can
also create a private image from a cloud
server or an external image file to make it
easier to migrate workloads to the cloud
or on the cloud.

20 Huawei Confidential

• An image is a server or disk template that contains an operating system (OS), service data,
and necessary application software, such as database software. IMS provides public, private,
Marketplace, and shared images.
Why IMS?

Secure Saving Time and Effort


 Multiple copies of our images  You can create a private image
ensure high data reliability. from an ECS or external image
file, also use an existing image
Secure to create ECSs.

Saving Time
Unified
and Effort

Unified Flexible
 Images can be used to Uniformly Flexible  Image can be easily managed
deploy or upgrade applications, through the management
ensuring consistency of your console or APIs.
application enviroments.

21 Huawei Confidential

• Saving Time and Effort


▫ Deploying services on cloud servers is much faster and easier when you use images.
▫ A private image can be created from an ECS, a BMS. It can be a system, disk, or full-
ECS image that suites your different needs.
▫ Private images can be transferred between accounts, regions, or cloud platforms
through image sharing, replication, and export.
• Secure
▫ Public images use mainstream OSs such as Ubuntu, and CentOS. These OSs have
been thoroughly tested to provide secure and stable services.
▫ Multiple copies of image files are stored on Object Storage Service (OBS).
▫ Private images can be encrypted for data security by using envelope encryption
provided by Key Management Service (KMS).
• Flexible
▫ You can manage images through the management console or using APIs.
▫ You can use a public image to deploy a general-purpose environment, or use a
private image or Marketplace image to deploy a custom environment.
▫ You can use IMS to migrate servers to the cloud or on the cloud.
• Unified
▫ IMS provides a self-service platform to simplify image management and maintenance.
▫ IMS allows you to batch deploy and upgrade application systems, improving O&M
efficiency and ensuring consistency.
▫ Public images comply with industry standards.
Image Types
 A public image is a standard image provided by the
cloud platform. It contains an OS and various
preinstalled applications, and is available to all users.
 A private image is created by users and is visible only to
the user who created it.
 A shared image is a private image another user has
shared with you.
 A Marketplace image is a third-party image published
in the Marketplace. It has an OS, various applications,
and custom software preinstalled.

22 Huawei Confidential

• Public image: A public image is a standard image provided by the cloud platform and is
available to all users. It contains an OS and various preinstalled public applications. If a
public image does not contain the application environment or software you need, you can
use a public image to create an ECS and then install the software you need. HSS supports
two-factor authentication for logins, defense against account cracking, and weak password
detection to protect your ECSs against brute force attacks.
• Private image: A private image is only available to the user who created it. It contains an OS,
service data, preinstalled public applications, and custom applications that the image
creator added. A private image can be a system disk image, data disk image, or full-ECS
image.
▫ A system disk image contains an OS and pre-installed software for various services.
▫ A data disk image contains only service data. You can use a data disk image to create
EVS disks and use them to migrate your service data to the cloud.
▫ An ISO image is created from an external ISO image file. It is a special image that is
not available on the ECS console.
▫ A full-ECS image contains an OS, pre-installed software, and service data.
• Shared image: A shared image is a private image another user has shared with you.
• Marketplace image: A Marketplace image is a third-party image published in the
Marketplace. It has an OS, application environment, and software pre-installed. No
additional configuration is required. Marketplace images are provided by service providers
who have extensive experience configuring and maintaining cloud servers. All the images
are thoroughly tested and have been approved by HUAWEI CLOUD before being published.
Creating a Private Image

Creating a system disk image from a Windows Creating a Windows system


ECS disk image from an external
image file

Creating a system disk image from a Linux ECS


Creating a Linux system disk
image from an external
image file
Creating a full-ECS image from an ECS

Creating a data disk image


Creating a full-ECS image from a CSBS backup from an external image file

Creating a data disk image from an ECS


...

23 Huawei Confidential

• You can use an ECS or external image file to create an ECS private image.

• You can also:

▫ Use an ISO file to create an ECS system disk image.

▫ Use a CBR backup to create a full-ECS image.

▫ Use a BMS to create a system disk image.


Common IMS Operations
 Modifying an Image
 You can modify the following information of an image: name, description, minimum memory, maximum memory, NIC multi-queue, and SR-IOV
driver.
 Sharing images
 You can share your images with other tenants. The tenants can use the shared images to quickly create identical ECSs or EVS disks.
 Exporting Images
 You can export private images to your OBS bucket and download them to your local PC for backup.
 By exporting an image of a cloud server from the cloud platform, you can reproduce the cloud server and its running environments in on-
promises clusters or private clouds. The following figure shows the process of exporting an image.
 image replication
 In-region replication: This is used for conversion between encrypted and unencrypted images or for enabling advanced features (such as fast ECS
creation) for images.
 Cross-region replication: This is used for replicating a private image in the current region to the same account in another region. You can use this
private image to deploy the same application environment in the two regions.

24 Huawei Confidential

• You can modify the following attributes of a private image: Name/Description/Minimum


Memory/Maximum Memory/NIC Multi-Queue(NIC multi-queue enables multiple CPUs to
process NIC interruptions for load balancing.)/Boot Mode/SR-IOV driver(After the SR-IOV
driver is installed on an image, the network processing performance of the ECS is greatly
improved.)
Encrypting an Image
 You can create an encrypted image to
securely store data.
 Encrypted images cannot be shared with
other users or published in the Marketplace.
 The system disk of an ECS created from an
encrypted image is also encrypted, and its
key is the same as the image key.
 If an ECS has an encrypted system disk,
private images created from the ECS are also
encrypted.

25 Huawei Confidential
Scenarios - Migrating Servers to the Cloud or in the Cloud
Recommendation Reasons

You can import local images to the cloud platform and use the images to quickly create cloud servers for service migration to the cloud.
You can also share or replicate images across regions to migrate ECSs between accounts and regions.

26 Huawei Confidential

• A variety of image formats can be imported, including VMDK, VHD, QCOW2, RAW, VHDX,
QED, VDI, QCOW, ZVHD2, and ZVHD. Image files in other formats need to be converted to
one of these formats before being imported. You can use the open-source tool qemu-img
or the Huawei tool qemu-img-hw to convert the image.

• https://support.huaweicloud.com/intl/en-us/productdesc-ims/ims_01_0001.html
Contents

1. Elastic Cloud Server (ECS)

2. Image Management Service (IMS)

3. Auto Scaling (AS)

27 Huawei Confidential
What Is AS?
 Auto Scaling (AS) automatically adjusts resources to keep up with changes in demand based on pre-
configured AS policies. You can specify AS configurations and policies based on service requirements.
These configurations and policies free you from having to repeatedly adjust resources to keep up with
service changes and spikes in demand, helping you reduce the resources and manpower required.

vCPU

3 GB 32 GB ROM

ECS ECS specifications ECSs

Define AS policies and


Create an AS group. AS automatically scales ECSs.
configurations.

28 Huawei Confidential

• Auto Scaling (AS) helps you automatically scale Elastic Cloud Server (ECS) and bandwidth
resources to keep up with changes in demand based on pre-configured AS policies. It allows
you to add ECS instances or increase bandwidths to handle load increases and also save
money by removing resources that are sitting idle.
Why AS?

Automatic resource adjustment Enhanced cost management

AS automatically adjusts resources on AS adjusts ECS instances and bandwidths


demand for applications. on demand, enabling you to pay for what
Automatic
you need.
resource Scaling

High fault Enhanced cost


tolerance management

Higher
High fault tolerance Availability Improved availability
AS checks ECSs powering AS ensures proper resources deployed
applications and replaces faulty for applications.
instances with new ones.

29 Huawei Confidential

• AS advantages:

▫ Automatic resource Scaling: AS adds ECS instances and increases bandwidths for your
applications when the access volume increases and removes unneeded resources
when the access volume drops, ensuring system stability and availability.

▫ Enhanced cost management: AS enables you to use ECS instances and bandwidths on
demand by automatically scaling resources for your applications, eliminating waste of
resources and reducing costs.

▫ Higher Availability: AS ensures that you always have the right amount of resources
available to handle the fluctuating load of your applications. When working with ELB,
AS automatically associates a load balancing listener with any instances newly added
to the AS group. Then, ELB automatically distributes access traffic to all instances in
the AS group through the listener, which improves system availability.

▫ High fault tolerance: AS monitors instances in an AS group, and replaces any


unhealthy instances it detects with new ones.
AS Architecture
 AS automatically adjusts compute resources based on service demands and configured AS policies. The number of
ECS instances changes to match service demands, ensuring service availability.
Configure a scheduled or periodic
Configure an alarm-based policy.
policy.

Add Remove
300 visits 1000 visits 300 visits
Cloud Eye ECS Scheduled

10 Mbit/sIncrease 20 Mbit/s Decrease


10 Mbit/s
Bandwidth

Controls
Scaling triggered by alarms based on scaling. Scaling triggered by a scheduled or
metrics, such as vCPUs, memory, disk, periodic policy
or incoming traffic

30 Huawei Confidential

• AS allows you to adjust the number of ECSs in an AS group and EIP bandwidths bound to
the ECSs.

▫ Scaling control: You can specify thresholds and schedule when different scaling
actions are taken. AS will trigger scaling actions on a repeating schedule, at a specific
time, or when configured thresholds are reached.

▫ Policy configuration: You can configure alarm-based, scheduled, and periodic policies
as needed.

▫ Alarm-based: You can configure alarm metrics such as vCPU, memory, disk, and
inbound traffic.

▫ Scheduled: You can schedule actions to be taken at a specific time.

▫ Periodic: You can configure scaling actions to be taken at scheduled intervals, a


specific time, or within a particular time range.

▫ When Cloud Eye generates an alarm for a monitoring metric, for example, CPU usage,
AS automatically increases or decreases the number of instances in the AS group or
the EIP bandwidth.

▫ When the configured triggering time arrives, a scaling action is triggered to increase
or decrease the number of ECS instances or the bandwidth.
Process of creating an AS
3 Scaling policy:
AS policies can trigger scaling actions and adjust the number of instances in an AS group. A
CPU scaling policy specifies the conditions for triggering a scaling action and the operations to be
performed. When the scaling conditions are met, the system automatically triggers a scaling
action.

3 GB 32 GB ROM

1 AS configuration: ECS Specifications Alarm policy: When the value of xx is greater than xx, add or delete instances.
An AS configuration is a Scheduled policy... xx hours xx minutes, adding or deleting instances
template for ECS Periodic policy: daily/weekly/monthly, adding/reducing instances
instances in an AS
group. It defines the
specifications of the Configuring the AS policy
instances to be added
to the AS group.
including the ECS type, Add or delete instances in
vCPU, memory, image, an AS group based on the
disk, and login mode. … AS policy and AS
ecs-as01 ecs-as02 ecs-asN configuration.

2 AS group:
An AS group is a collection of instances that have the same application
scenario. It is the basic unit for starting and stopping AS policies and
performing scaling actions.

31 Huawei Confidential

• AS Basic Concepts
▫ AS group: An AS group consists of a collection of instances and AS policies that have
similar attributes and apply to the same scenario. It is the basis for enabling or
disabling AS policies and performing scaling actions.
▫ AS configuration: An AS configuration is a template specifying specifications for the
instances to be added to an AS group. The specifications include the ECS type, vCPUs,
memory, image, disk, and login mode.
▫ AS policy: An AS policy can trigger scaling actions to adjust the number of instances in
an AS group. An AS policy defines the condition to trigger a scaling action and the
operations to be performed. When the triggering condition is met, the system
automatically triggers a scaling action.
▫ Scaling action: A scaling action adds instances to or removes instances from an AS
group. It ensures that the number of instances in an application system is the same
as the expected number of instances by adding or removing instances when the
triggering condition is met, which improves system stability.
▫ Cooldown period: To prevent an alarm policy from being repeatedly triggered for the
same event, we use a cooldown period. The cooldown period specifies how long any
alarm-triggered scaling action will be disallowed after a previous scaling action is
complete. The cooldown period is not used for scheduled or periodic scaling actions.
▫ Bandwidth scaling: AS automatically adjusts a bandwidth based on the configured
bandwidth scaling policy. AS can only adjust the bandwidth of pay-per-use EIPs and
shared bandwidths. It cannot adjust the bandwidth of yearly/monthly EIPs.
Creating an AS Configuration
 Configuration Template options

Create a specifications template Use specifications of an existing ECS

If you have special requirements on the You can use an existing ECS to quickly create
specifications of the ECSs used for capacity an AS configuration. Then, the specifications
expansion, specify the specifications in a of this ECS, such as the vCPUs, memory,
template and use it to create an AS image, disk, and ECS type, will be applied to
configuration. Then, the specifications will be ECSs added to the AS group in scaling actions.
applied to the ECSs added to the AS group in
scaling actions.

32 Huawei Confidential
Scenarios – Web Applications

Application Scenarios
E-commerce
website
 E-commerce websites
 Heavy-traffic web portals
ELB
Recommendation Reasons
....
 E-commerce: During big promotions, E-commerce websites
AS ECS ECS
need more resources. AS automatically scales out ECS
instances and bandwidth within minutes to ensure that
Content update promotions go smoothly.
 Heavy-traffic portals: Service load changes are difficult to
Website data (images, static web pages, large files,
and videos) predict for heavy-traffic web portals. AS dynamically scales
in or out ECS instances based on monitored ECS metrics,
such as vCPU usage and memory usage.
OBS

33 Huawei Confidential

• Using ELB with AS

▫ Working with ELB, AS automatically increases or decreases resources based on


changes in demand while ensuring that the load of all the ECS instances in the AS
group stays balanced.

▫ After ELB is enabled in an AS group, AS automatically associates a load balancing


listener with instances newly added to the AS group. Then, ELB automatically
distributes access traffic to all instances in the AS group through the listener, which
improves system availability. If the instances in the AS group are running a range of
different types of applications, you can bind multiple load balancing listeners to the
AS group to listen to each of these applications, improving scalability.
Thank Users. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2023 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that could
cause actual results and developments to differ materially from those
expressed or implied in the predictive statements. Therefore, such
information is provided for reference purpose only and constitutes
neither an offer nor an acceptance. Huawei may change the information
at any time without notice.

You might also like