Licensing in ZStack Cloud is supplied in different functionality packages as Base and Plus. This topic describes features covered in the Enterprise Prepaid base license and add-on features provided in plus licenses.
For more information about the licensing details, see License Management. For differences about features provided in different editions, contact our official sales.
Type | Features | Description |
---|---|---|
Dashboard | Custom Dashboard | Displays multi-dimensional data statistics on cards and allows you to customize your own dashboard by adding and dragging cards. |
Provides a default dashboard for users with different roles. | ||
Monitor | Displays the platform resources in real time by using monitors with various themes. | |
Allows you to switch between the KVM monitor and the vCenter monitor as needed. | ||
Allows you to switch between zones. You can have the real-time monitoring on all zones or a specific zone. | ||
API Inspector | Allows you to view the details of API requests that are called by using various methods, including POST, DELETE, PUT, GET, and GET-ZQL, after you perform operations on the UI. ZStack Cloud supports a browser-based interface using HTML5 or later version for managing and monitoring of server resources. | |
VM Instance | Bulk Action | Allows you to manage VM instances in bulk. |
Create VM Instance | Allows you to create VM instances through different entries. | |
Allows you to specify the root volume capacity and batch attach data volumes via VM creation. | ||
Import VM Instance | Allows you to import a VM instance on a third-party platform by using the OVF template and customize the configurations of the VM instance. | |
View VM Instance | Provides two VM display methods: List View and Directory View. | |
Allows you to set a default view for the VM instance page in Global setting or switch view for the current page. | ||
Manage VM Instance | Allows you to manage the lifecycle of VM instances, such as creating, importing, stopping, booting, rebooting, powering off, recovering, pausing, exporting, and deleting VM instances. | |
VM Console | Allows you to access VM instances through terminals without using remote tools. | |
Supports three types of console mode: SPICE, VNC, and SPICE+VNC. | ||
The SPICE protocol supports SSL encrypted channel to further ensure desktop security. | ||
Allows you to paste texts into VNC consoles. | ||
Allows you to manage VM power status in VNC consoles, including stopping, rebooting, resuming, pausing, forcing stopping, and powering off VM instances. | ||
Allows you to set the console password, set the console password by force in the Global Setting, and configure the password strategy such as the password complexity and password length in the Global Setting. | ||
Clone VM Instance without Data Volumes | Copies data in the root volumes of the VM instance only. | |
Allows you to clone running, paused, and stopped VM instances on LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storage. | ||
Supports ImageStore and Ceph image storage. | ||
Allows you to choose clone method as needed, including full clone, instant full clone, and linked clone. | ||
Allows you to set a storage allocation policy, including system allocation and manual allocation. | ||
Allows you to configure network settings, including enable or disable NICs, assign IP, assign MAC address, and select security group. | ||
Clone VM Instance with Data Volumes | Copies data in the root volumes as well as data volumes of a VM instance. | |
Allows you to clone running, paused, and stopped VM instances on LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storage. | ||
Supports ImageStore and Ceph image storage. | ||
Does not clone shared volumes (if any) with VM instances. | ||
Allows you to choose clone method as needed, including full clone, instant full clone, and linked clone. | ||
Allows you to set a storage allocation policy, including system allocation and manual allocation. | ||
Allows you to configure network settings, including enable or disable NICs, assign IP, assign MAC address, and select security group. | ||
Flatten | Allows you to merge snapshots of a VM instance into one flat snapshot to improve resource performance and data security. | |
Allows you to unlink the dependency between linked clone VM instances and source VM instances by flattening to achieve data independence. | ||
Custom Tag | Allows you to customize tags for VM instances so that you can locate them quickly. | |
Change Group | Allows you to create groups to categorize and manage VM instances. You can create up to 4-level groups with the root directory as the first-level group. | |
Allows you to manage the lifecycle of a group, such as creating and deleting a group. | ||
Allows you to specify a group for a VM instance or change the group it belongs to. | ||
Change Host | Allows you to migrate a VM instance from a host to another without changing the primary storage. | |
Supports hot migration and cold migration. | ||
Hot migration: Migrates a VM instance in the running state. Hot migration applies to all types of the primary storage. | ||
Allows you to hot migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage or shared primary storage.Re | ||
If the migration is blocked because the VM instance has high I/O operations for a long time, you can enable auto converge to ensure a smooth migration. | ||
Cold migration: Migrates a VM instance in the stopped state. Cold migration applies to LocalStorage primary storage only. | ||
Allows you to cold migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage primary storage. | ||
Allows you to cold or hot migrate a VM instance based on the workloads of the destination host. | ||
Allows you to hot migrate a VM instance with a VF NIC attached. | ||
Change Primary Storage | Allows you to migrate a VM instance from a primary storage to another without changing the host. | |
Allows you to migrates valid data, and the migrated VM instance follows the provisioning type of the target primary storage. | ||
Supports hot migration and cold migration across SharedBlock primary storage. | ||
Supports hot migration across SharedBlock and Ceph primary storage. | ||
Hot migration: Migrates a VM instance in the running state. | ||
Snapshots of the VM instance to be migrated will not be saved after the hot migration across SharedBlock primary storage or across SharedBlock and Ceph primary storage. | ||
If you hot migrate a VM instance from a SharedBlock primary storage to a Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. | ||
Allows you to hot migrate a VM instance with a VF NIC attached. | ||
Cold migration: Migrates a VM instance in the stopped state. | ||
Allows you to hot or cold migrate a VM instance with all attached volumes (excluding shared volumes). | ||
Change Host and Primary Storage | Allows you to migrate a VM instance from a host and primary storage to another host and primary storage. | |
Supports hot migration and cold migration. | ||
Hot migration: Migrates a VM instance in the running state. | ||
Supports hot migration across the same type of primary storage, including Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock. | ||
Snapshots of the VM instances to be migrated will not be saved after the hot migration across the same type of primary storage. | ||
If you hot migrate a VM instance across Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. | ||
Allows you to hot migrate a VM instance across different types of primary storage, including Ceph↔SharedBlock, LocalStorage↔SharedBlock, LocalStorage↔Ceph, LocalStorage↔NFS, SharedBlock↔NFS, and Ceph↔NFS. | ||
Snapshots of the VM instances to be migrated will not be saved after the hot migration across different types of primary storage. | ||
If you hot migrate a VM instance from a SharedBlock, LocalStorage, or an NFS primary storage to a Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated. | ||
Supports hot migration across Ceph pools within the same Ceph primary storage and allows you to migrate only root volume or migrate data volumes with VM instances. | ||
Allows you to enable or disable auto-convergence policy during storage migration. | ||
Allows you to manually specify destination hosts. | ||
Allows you to hot migrate a VM instance with a VF NIC attached. | ||
Cold migration: Migrates a VM instance in the stopped state. | ||
Allows you to cold migrate a VM instance across the same type of primary storage, including Ceph↔Ceph and NFS↔NFS. | ||
Allows you to cold migrate a VM instance across the same type of primary storage without data volumes. | ||
If you cold migrate a VM instance across Ceph primary storage, you can specify a root volume pool for the volumes to be migrated. | ||
Supports cold migration of VM instances (with data volumes) across Ceph pools within the same Ceph primary storage. | ||
Allows you to clean up raw data after migration to release more space after you confirm the data integrity. | ||
Modify Instance Offering | Allows you to modify the instance offering (CPU and memory) of a running or stopped VM instance. | |
Set GPU Policy | Allows you to set the GPU policy for a stopped VM instance. You can attach pGPU/vGPU devices to the VM instance, or attach pGPU/vGPU specification to the VM instance. | |
Resize Root Volume | Allows you to expand the root volume of a running or stopped VM instance. The new size takes effect immediately. | |
Resize Data Volume | Allows you to expand the data volume of a running or stopped VM instance. The new size takes effect immediately. | |
Change Owner | Allows you to change the owner of a running or stopped VM instance. | |
Change System | Allows you to change the operating system of a stopped VM instance. | |
Reimage VM Instance | Allows you to restore a VM instance to the initial state of the VM image. All the data in the root volume will be overwritten. | |
Set Boot Order | Allows you to set the boot order for a VM instance. | |
Supports three boot types: boot from hard disk, boot from CD ROM, and boot from network. | ||
Boot from Host | Allows you to specify a host on which a VM instance boots. | |
VM High Availability | Allows you to set VM high availability (HA) so that the VM instance can reboot automatically in case of unexpected shutdown because of the VM errors or faults of compute, storage, or network that the VM instance is residing on. You can view the reboot progress on the UI. You can set Default HA Mode When Creating VM instance in Platform Setting > HA Policy > Advanced Setting to set the HA mode used for a newly created VM instance by default. You can change the HA mode for a VM instance individually during or after the creation. After the change, the default value does not take effect on this VM instance. | |
Time Synchronization | Allows you to set whether the base time of a VM instance is the same as that of the host. | |
SSH Key Attachment/Detachment | Allows you to attach/detach SSH keys to/from VM instances with the Linux or BSD operating system. | |
Allows you to create or delete an SSH key. | ||
Change VM Password | Allows you to change the password of a Windows or Linux running VM instance. | |
Set Hostname | Allows you to set the hostname when you create a VM instance. | |
Resource Priority | Allows you to set resource priority (Normal and High). When resource contention occurs, VM instances with High resource priority can compete for more resources than those with Normal resource priority. | |
Set Cluster Binding | Allows you to set whether make the VM instance bound with the current cluster to restrict the VM cross-cluster migrations. | |
USB Redirection | Allows you to redirect a USB device from a VDI client to a VDI VM instance. | |
VM Snapshot | Allows you to schedule snapshot creation at specified time points to record the state of the root volume, data volume, or memory of an instance before you perform a business-sensitive operation. This allows rollback in case of breakdowns. | |
Supports two snapshot types: Single snapshot and snapshot group. The snapshot group allows you to restore a group of VM instances in bulk. | ||
Allows you to create snapshots for VM instances that are in the running state. | ||
Allows you to create snapshots for VM instances that are in the stopped state. | ||
Supports VM auto boot after restoring from snapshots. | ||
Allows you to delete VM snapshots in bulk. | ||
Allows you to create a VM instance from a single snapshot or create a VM instance with data volumes from a snapshot group. | ||
VM Backup | Allows you to create a backup for a running VM instance. | |
Allows you to create either an incremental backup or a full backup for a VM instance. | ||
Allows you to create a backup for a VM instance with its volumes (excluding shared volumes) when the VM instance is in the running state. | ||
This feature is provided by the Backup Service module. | ||
VM Image | Allows you to create a template image based on a VM instance so that you can create VM instances in bulk in a custom way. | |
Allows you to create a VM image when the VM instance is in the running or stopped state. Supported image storage: ImageStore and Ceph. | ||
ISO-based Deployment | Creates VM instances based on an ISO disk which guides the VM system installation. | |
Supports multiple ISOs per VM instance, improving the business deployment efficiency. | ||
Template-based Deployment | Creates VM instances based on a system template. | |
Automated O&M | Allows you to execute scripts on VM instances, making the VM instances finish O&M operations automatically by running commands in the scripts. | |
Allows you to execute commands on VM instances and view the response conveniently. | ||
Allows you to upload local files to the specified path of VM instances. You can upload up to 10 files at one time with each file size not exceeding 128 KB. | ||
Allows you to attach/detach XML Hooks to/from VM instances, realizing customized configurations and extended capabilities by modifying the VM XML files automatically through XML Hooks. | ||
Add/Remove VM Scheduling Group | Allows you to add a running or stopped VM instance to or remove a VM instance from a VM scheduling group so as to associate with/disassociate from related VM scheduling policies. This way, you can manage the distribution of VM on hosts and ensure high performance and high availability. | |
Attach/Detach Volume | Allows you to attach/detach a data volume to/from a running or stopped VM instance. Allows you to optimize drive models and identify a volume by its SCSI WWN. | |
Shared Volume | Allows VM instances in Ceph or SharedBlock primary storage to share the same data volume. | |
Create Volume Image | Allows you to create an image for root volumes or data volumes attached to a VM instance when the VM instance is in the running or stopped state. | |
Before you can create an image for shared volumes on a SharedBlock primary storage, stop all the VM instances attached by the shared volume first. | ||
Set Volume QoS | Allows you to set QoS for root volumes and data volumes attached by a VM instance when the VM instance is in the running or stopped state. | |
Enable/Disable NIC | Allows you to enable or disable NICs of the vNIC type. | |
Attach/Detach NIC | Allows you to attach/detach a NIC to/from a running or stopped VM instance. You can set a default NIC. | |
Set NIC Type | Allows you to set the NIC type when the VM instance is in the stopped state. | |
Allows you to change the NIC type from a VF NIC to a vNIC only. | ||
Set NIC Model | Allows you to set the NIC model for a running or stopped VM instance. Supported VM NIC models: virtio, rtl8139, and e1000. | |
This operation applies to Linux and Paravirtualization operating systems only. | ||
Change L3 Network for VM NIC | Allows you to change the L3 network for a VM NIC without affecting the hardware information such as the MAC address and PCI address of the NIC. | |
Set Network QoS | Allows you to set the network QoS for a running or stopped VM instance. | |
Sync NIC Configurations | Allows you to update NIC configurations according to the NIC parameters you set on the Cloud, including IP address, netmask, gateway, DNS, and MTU. | |
Read NIC IP Configured in the VM Instance | Allows you to read a NIC IP address configured in the VM instance and make it displayed on and managed by the Cloud. Make sure that the NIC is belong to an L3 network disabled with IP address management and does not have an IP address assigned on the Cloud. | |
Customize MAC Address | Allows you to customize a MAC address when you create a VM instance. | |
Allows you to change the MAC address when the VM instance is in the stopped state. | ||
Customize IP Address | Allows you to customize an IP address when you create a VM instance. | |
Allows you to change the IP address when the VM instance is in the stopped or running state. | ||
Attach/Detach EIP | Allows you to attach an EIP to or detach an EIP from a VM NIC. | |
VM Multi-Gateway | Allows you to enable multi-gateway by running zstack-ctl . If enabled, each VM NIC has an independent gateway. | |
Create/Delete vDrive | Allows you to create/delete a vDrive for a stopped VM instance. You can attach/detach an ISO to/from a drive. | |
Attach/Detach Peripheral Device | Allows you to attach/detach a LUN to/from a running or stopped VM instance. | |
Allows you to attach/detach a physical GPU device to/from a running or stopped VM instance. | ||
Allows you to attach/detach a virtual GPU device to/from a running or stopped VM instance. | ||
Allows you to attach/detach a USB device to/from a running or stopped VM instance. | ||
Allows you to attach/detach other peripheral devices, such as Moxa cards, to/from a running or stopped VM instance. | ||
CPU Model | Allows you to set the CPU model for a VM instance through three entries: Global Setting, Cluster Setting, and VM Setting. The setting takes effect with the following priority: Global Setting < Cluster Setting < VM Setting. | |
CPU Pinning | Assigns the virtual CPUs (vCPUs) of a VM instance to specific host pCPUs, which improves VM performance. | |
vNUMA Configuration | Allows you to configure vNUMA for a VM instance to generate a topology of virtual NUMA nodes for the VM instance. This topology enables a vCPU on a vNUMA node to primarily access the local memory and thus improves VM performance. | |
EmulatorPin Configuration | Allows you to configure EmulatorPin for a VM instance so that all other threads than virtual CPU (vCPU) threads and IO threads of a VM instance are assigned to physical CPUs (pCPUs) of the host. | |
VM Performance Optimization | Allows you to install performance optimization tools (GuestTools) for the Qemu Guest Agent installation and internal monitoring of Linux VM instances. | |
Allows you to install performance optimization tools (GuestTools) for Windows and Windows Virtio VM instances for Qemu Guest Agent installation and internal monitoring. You can install the Virtio driver with one click to improve the disk and NIC performances. | ||
Import User Data | Allows you to import user data when you create a VM instance. You can upload user-defined parameters or scripts to customize configurations for VM instances or to accomplish specific tasks. | |
BIOS Mode | Inherits the BIOS mode from the image you selected when you create a VM instance. The BIOS mode includes Legacy and UEFI. | |
Inherits the BIOS mode of the original VM instance when you create a VM image or clone a VM instance. | ||
Allows you to change the BIOS mode when the VM instance is in the running or stopped state. | ||
Anti-Spoofing Mode | Provides IP/MAC anti-spoofing and ARP anti-spoofing. If enabled, VM instances can only communicate with outside networks using the IP/MAC addresses allocated by the Cloud. | |
VM Monitoring | External monitoring: Collects the VM data such as CPU, memory, disk I/O, NIC data from hosts by using libvirt. | |
Internal monitoring: Collects the VM data such as CPU, memory, and disk size data from VM instances by using an agent. An agent is required for internal monitoring. | ||
Advanced Settings | Allows you to enable Instance Offering Online Modification for a single VM instance so that you can online modify the instance offering (CPU and memory) for the VM instance. | |
Allows you to enable Hyper-V for a Windows VM instance. | ||
Allows you to disable the hypervisor for a VM instance, to make certain applications skip their virtualization detection on this VM instance. | ||
Allows you to disable hypervclock for a Windows VM instance. | ||
Allows you to set the number of queues when VirtIO NIC traffics are allocated to multiple CPUs, which improves the NIC performance. | ||
Allows you to enable Memory Balloon for a VM instance. It monitors in real time the memory usage of VM instances and the host. Its dynamic reclaim and allocation mechanism makes sure the efficient use of host memory | ||
Allows you to specify the reserve size of memory after you enable Memory Balloon. | ||
Allows you to enable Kernel-Same Page Merging for a VM instance. It detects VM memory pages mapped to physical memory pages with identical content and remaps these VM memory pages to the same physical memory page, allowing multiple VM instances share host memory resources and reducing resource wastes. | ||
Audit | Audits all of the actions performed on VM instances, which effectively ensures the security of the Cloud environment. | |
Custom Column | Allows you to customize the items to be displayed on a VM list. | |
Export CSV File | Allows you to export the VM information as a CSV table, which helps in statistical analysis and problem diagnosis. | |
Resource Deletion Policy | Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never. | |
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. | ||
Volume | Bulk Action | Allows you to manage data volumes/root volumes in bulk. |
Create Volume | Provides multiple strategies to create data volumes. | |
Manage Volume | Allows you to manage the lifecycle of data volumes, such as creating, enabling, disabling, and deleting data volumes. | |
Attach/Detach Instance | Allows you to attach/detach a data volume to/from an instance. | |
Change Host | Allows you to migrate a data volume to another host. This action applies to local primary storage only. | |
Allows you to migrate a data volume based on the workloads of the destination host. | ||
Change Primary Storage | Allows you to migrate a data volume to another primary storage. | |
Allows you to migrate valid data, and the migrated data volume follows the provisioning type of the target primary storage. | ||
Supports data volume migration across the same type of primary storage, including Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock. | ||
Allows you to migrate data volumes not attached to any instances between Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock. | ||
Allows you to migrate data volumes attached to a VM instance in the stopped state across SharedBlock primary storage. | ||
Supports data volume migration across Ceph pools within the same Ceph primary storage. | ||
Allows you to clean up raw data after migration to release more space after you confirm the data integrity. | ||
Change Owner | Allows you to change the owner of a data volume. | |
Resize Volume | Allows you to expand a volume that is not attached to any instance. | |
Allows you to expand the volume of a running or stopped instance. | ||
In Ceph primary storage, allows you to expand a shared volume that is not attached to any instance or is attached to a stopped instance. | ||
Custom Tag | Allows you to customize tags for volumes so that you can locate them quickly. | |
Volume Backup | Allows you to create a backup for a volume that is attached to a running instance. | |
Allows you to create either an incremental backup or a full backup for a volume. | ||
This feature is provided by the Backup Service module. | ||
Volume Image | Allows you to create a template image based on a volume, and helps you to create volumes in bulk in a custom way. | |
Allows you to create an image for a data volume that is not attached to any instance. | ||
Allows you to create an image for a data volume that is attached to a running or stopped instance. | ||
In SharedBlock primary storage, allows you to create an image for a shared volume that is not attached to any instance or is attached to a stopped instance. | ||
In Ceph primary storage, allows you to create an image for a shared volume that is not attached to any instance or is attached to a running or stopped instance. | ||
Volume Snapshot | Allows you to schedule snapshot creation at specified time points to record the state of a root volume or data volume before you perform a business-sensitive operation. This allows rollback in case of breakdowns. | |
Allows you to restore a volume snapshot as needed. | ||
Allows you to delete volume snapshots in bulk. | ||
Set Volume QoS | Allows you to set QoS for volumes. | |
Flatten | Allows you to merge snapshots of a volume to improve resource performance and data security. | |
Allows you to unlink the dependency between linked clone volumes and source volumes by flattening to achieve data independence. | ||
Shared Volume | Allows you to create shared volumes in Ceph or SharedBlock primary storage. | |
Audit | Audits all of the actions performed on volumes, which effectively ensures the security of the Cloud environment. | |
Export CSV File | Allows you to export the volume information as a CSV table, which helps in statistical analysis and problem diagnosis. | |
Allows you to specify volume information items to be contained in the CSV table. | ||
Allows you to export the information of the root volumes associated with selected data volumes simultaneously. | ||
Resource Deletion Policy | Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never. | |
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. | ||
Image | Bulk Action | Allows you to manage images in bulk. |
Add Image | Allows you to add two types of images: system image (ISO/Image) and volume image (Image). | |
Allows you to set the CPU architecture of an image, including x86_64, aarch64, and mips64el. Creating VM instances, creating VM images, and cloning VM instances will inherit the CPU architecture of the original image. | ||
Allows you to set the image platform, such as Linux,Windows, and Other. | ||
Allows you to upload an image by using an URL or local browser. | ||
Allows you to view the image uploading speed and remaining time if you upload an image by using the local browser. | ||
Allows you to set the BIOS mode for an image, including Legacy and UEFI. Creating VM instances, creating VM images, and cloning VM instances will inherit the BIOS mode of the original image. | ||
Calculates the MD5 values of images uploaded to ImageStore for you to validate the image integrity after the uploading. | ||
Manage Image | Allows you to manage the lifecycle of images, such as adding, enabling, disabling, and deleting images. | |
Change Image Storage | Allows you to migrate an image to another image storage. This action applies to Ceph image storage only. | |
Allows you to clean up raw data after migration to release more space after you confirm the data integrity. | ||
Export Image | Allows you to export an image from an ImageStore or Ceph image storage. | |
Provides the MD5 value of the downloaded image to check the image integrity. | ||
Sync Image | Allows you to synchronize images among different ImageStore image storage in the same management node. | |
Set Sharing Mode | Allows you to set the sharing mode of an image, including share globally, share to specified projects or accounts, and not share. | |
Audit | Audits all of the actions performed on images, which effectively ensures the security of the Cloud environment. | |
Resource Deletion Policy | Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never. | |
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed. | ||
Instance Offering | Bulk Action | Allows you to manage instance offerings in bulk. |
Create Instance Offering | Allows you to select a host allocation policy, including host with minimum number of running VMs (default policy), host with minimum CPU utilization, host with minimum memory utilization, host with maximum number of running VMs, host where the VM is located last time, and random host allocation to create VM instances. | |
When the host allocation strategy is host with minimum CPU utilization or host with minimum memory utilization, you can select the mandatory strategy mode or non-mandatory strategy mode (default mode). | ||
If the Cloud can obtain the host load information, it will create VM instances according to the host allocation strategy. If the Cloud could not obtain the host load information, it will create VM instances according to the strategy mode. | ||
Allows you to set disk QoS and network QoS for an instance offering. | ||
Allows you to set advanced parameters through JSON to customize an instance offering. | ||
Manage Instance Offering | Allows you to manage the lifecycle of images, such as creating, enabling, disabling, and deleting instance offerings. | |
Set Sharing Mode | Allows you to set the sharing mode of an instance offering, including share globally, share to specified projects or accounts, and not share. | |
Audit | Audits all of the actions performed on instance offerings, which effectively ensures the security of the Cloud environment. | |
Disk Offering | Bulk Action | Allows you to manage disk offerings in bulk. |
Create Disk Offering | Allows you to set the disk QoS for a disk offering. | |
Allows you to set advanced parameters through JSON to customize a disk offering. | ||
Manage Disk Offering | Allows you to manage the lifecycle of disk offerings, such as creating, enabling, disabling, and deleting disk offerings. | |
Set Sharing Mode | Allows you to set the sharing mode of a disk offering, including share globally, share to specified projects or accounts, and not share. | |
Audit | Audits all of the actions performed on disk offerings, which effectively ensures the security of the Cloud environment. | |
GPU Specification | Bulk Action | Allows you to manage physical GPU specifications in bulk. vGPU specifications do not support bulk actions. |
Manage Physical GPU Specification | Automatically detects available physical GPU specifications on the Cloud and lists them in the UI. | |
Allows you to enable or disable a physical GPU specification. | ||
Manage Virtual GPU Specification | Generates virtual GPU specifications from the detected physical GPU specifications and lists them in the UI. | |
Allows you to enable or disable a virtual GPU specification. | ||
Set ROM | Allows you to set ROM for physical GPU specifications for physical GPU passthrough. | |
Set Sharing Mode | Allows you to set the sharing mode of a GPU specification, including share globally, share to specified projects or accounts, and not share. | |
Audit | Audits all of the actions performed on GPU specifications, which effectively ensures the security of the Cloud environment. | |
Auto-Scaling Group | Create Auto-Scaling Group | Allows you to set a health check mechanism, including load balancer health check and VM health check to trigger elastic self-healing. |
Allows you to set the resource monitoring and alarm mechanism to trigger elastic scaling. The mechanism includes trigger metrics, scale-out policy, scale-in policy, and whether to enable alarm notification (if enabled, an endpoint is required). The trigger metrics include both external monitoring items (VM Memory Utilization Average, VM CPU Utilization Average) and internal monitoring items (VM Memory Utilization Average, VM CPU Utilization Average) of VM instances. Note that an agent is required for internal monitoring. | ||
Allows you to set a periodic policy (scale-out policy or scale-in policy) for an auto-scaling group. The scale-out/scale-in cycle can be accurate to minutes with a minimum cycle interval of 15 minutes. | ||
Manage Auto-Scaling Group | Allows you to manage the lifecycle of auto-scaling groups, such as creating, enabling, disabling, and deleting auto-scaling groups. | |
Add/Remove VM Scheduling Group | Allows you add an auto-scaling group to or remove an auto-scaling group from a VM scheduling group so as to associate with/disassociate from related VM scheduling policies. This way, you can manage the distribution of VM instances in 他和on hosts and ensure high performance and high availability. | |
Change Image | Changing image takes effect only on VM instances that are newly created or added to the group. The images of existing VM instances do not change. | |
Scaling Records | Allows you to view the scaling activities in an auto-scaling group. | |
Audit | Audits all of the actions performed on auto-scaling groups, which effectively ensures the security of the Cloud environment. | |
Snapshot | Create Snapshot | Allows you to schedule snapshot creation at specified time points to record the state of an instance before you perform a business-sensitive operation. This allows rollback in case of breakdowns. |
Manage Snapshot | Displays instances and snapshots on the snapshot management page with instances on the left and snapshots on the right. You can view the relationship between instances and snapshots dynamically. | |
The instance panel on the left allows you to sort instances according to their snapshot count or snapshot size. | ||
The snapshot panel on the right allows you to view the snapshots by list or by topology. | ||
Allows you to manage the lifecycle of snapshots, such as creating and deleting snapshots. | ||
Create Instance | Allows you to create an instance from an instance snapshot. | |
Revert Snapshot | Allows you to restore an instance from an instance snapshot. | |
Audit | Audits all of the actions performed on snapshots, which effectively ensures the security of the Cloud environment. | |
VM Scheduling Policy | Create VM Scheduling Policy | Allows you to create four types of VM scheduling policies: VM Exclusive from Each Other, VM Affinitive to Each Other, VMs Affinitive to Hosts, and VMs Exclusive from Hosts. The former two define the relationship between VM instances and the latter two define the relationship between hosts and VM instances. |
Every four of the VM scheduling policies can be executed based on either of the following two mechanism: Hard and Soft. | ||
Manage VM Scheduling Policy | Allows you to manage the lifecycle of VM scheduling policies, such as creating, editing, enabling, disabling, and deleting scheduling policies. | |
Associate/Disassociate VM Scheduling Group | Allows you to associate with/disassociate from one or more VM scheduling polices with a VM scheduling group. | |
Associate/Disassociate Host Scheduling Group | Allows you to associate/disassociate one or more VM scheduling polices with/from a host scheduling group. | |
You can associate/disassociate only VMs Affinitive to Hosts and VMs Exclusive from Hosts with/from a host scheduling group. | ||
Manage VM Scheduling Group | Allows you to add one or more VM instances to or remove one or more VM instances from a VM scheduling group. | |
Allows you to manage the lifecycle of VM scheduling groups, such as creating, editing, and deleting VM scheduling groups. | ||
Manage Host Scheduling Group | Allows you to add one or more hosts to or remove one or more hosts from a VM scheduling group. | |
Allows you to manage the lifecycle of host scheduling groups, such as creating, editing, and deleting host scheduling groups. | ||
Audit | Audits all of the actions performed on VM scheduling polices, which effectively ensures the security of the Cloud environment. | |
SSH Key | Create SSH Key | Allows you to generate SSH key pairs on the Cloud or import a generated SSH public key to the Cloud. |
Supported encryption methods: ssh-rsa、ssh-dss、ecdsa-sha2-nistp256、ssh-ed25519、ssh-ecdsa. | ||
Manage SSH Key | Allows you to manage the lifecycle of SSH keys, such as creating, editing, and deleting SSH keys. | |
VM Attachment/Detachment | Allows you to attach/detach SSH keys to VM instance. | |
Allows you to attach one SSH key to one or more VM instance. | ||
Zone | Create Zone | In a data center, a zone corresponds to an equipment room. You can create one or more zones as needed, and create clusters/network resources and primary storage to each zone. |
Manage Zone | Allows you to manage the lifecycle of zones, such as creating, enabling, disabling, and deleting zones. | |
Manage Associated Resources | Allows you to manage the clusters, baremetal clusters/elastic baremetal clusters (licenses are required), primary storage, image storage, L2 networks and other resources in a zone. | |
Audit | Audits all of the actions performed on zones, which effectively ensures the security of the cloud environment. | |
Cluster | Create Cluster | Allows you to define cluster attributes (KVM and XDragon) based on the hypervisor type of hosts. Hosts in a KVM cluster use the KVM virtualization technology, and hosts in a XDragon cluster use the X-Dragon architecture. |
Allows you to define cluster attributes based on the host CPU architecture, including x86_64, aarch64, and mips64el. | ||
Allows you to specify a VDI network and migration network for a cluster. | ||
Allows you to set the VM CPU model and host CPU model in a cluster as needed. | ||
Manage Cluster | Allows you to manage the lifecycle of clusters, such as creating, enabling, disabling, and deleting clusters. | |
Manage Associated Resources | Allows you to manage the VM instances, hosts, primary storage, iSCSI storage, NVMe storage, L2 networks, peripheral devices, and other resources in a cluster. | |
Advanced Settings | Allows you to set the CPU overcommit, memory overcommit, and host reserved memory for all VM instances in a cluster. | |
Allows you to enable vNIC multi-queue upgrading for all VM instances in a cluster to improve the VM performance. | ||
Allows you to enable multi-queue driver support for all VM NICs in a cluster to allocate Virtio NIC traffic to multiple CPUs. | ||
Allows you to enable huge page for all hosts in a cluster, which effectively reduce the CPU performance loss of VM instances. | ||
Allows you to enable Hyper-V simulation for all Windows VM instances in a cluster. | ||
Allows you to set the default graphics card type at the VM startup for all VM instances in a cluster. | ||
Allows you to enable KVM virtualization flag for all VM instances in a cluster. | ||
Allows you to enable Dynamic Resource Scheduling (DRS) for clusters. This feature monitors the CPU or memory load of hosts on a cluster basis, and allows you to configure manual or auto DRS strategy to balance cluster loads and improves O&M efficiencies. Manual DRS provides scheduling suggestions based on which you can schedule resources for load balancing. Auto DRS schedules resources based on the system scheduling algorithm without arousing your awareness. | ||
Allows you to enable Zero Copy for all hosts in a cluster. Enabling this feature will reduce the number of data copies between user space and kernel space, lower CPU usage, and improve vNIC performance. | ||
Allows you to set Resource Binding Policy for VMs/VPC vRouters with Cluster-Binding enabled to specify the scenarios where VM/vRouters' cross-cluster migrations are forbidden. | ||
Audit | Audits all of the actions performed on clusters, which effectively ensures the security of the cloud environment. | |
Host | Bulk Action | Allows you to manage hosts in bulk. |
Add Host | Allows you to add hosts manually or by importing a template. You can add up to 500 hosts at a time. | |
Supports two hypervisor types: KVM and XDragon. KVM hosts use the KVM virtualization technology and XDragon hosts use the X-Dragon architecture. | ||
Manage Host | Allows you to manage the lifecycle of hosts, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, deleting, starting, shutting down, and restarting hosts. | |
Custom Tag | Allows you to customize tags for hosts so that you can locate them quickly. | |
Change Host SSH Password | Allows you to change the SSH password of a host. The new password takes effect after the host automatically reconnects. | |
Modify IPMI Info | Allows you to modify the IPMI username and password of a host. | |
Enter Web Terminal | Allows you to enter the web terminal of a host and perform operations on the host. | |
Add Bond | Allows you to bind multiple physical NICs on the host. | |
Supports two bond modes: active-backup mode and LDAP mode. | ||
Manage Associated Resources | Allows you to manage the VM instances, VPC vRouters, and other virtual resources on a host. | |
After you deploy SAN storage (iSCSI storage and FC storage) on a host, you can manage the LUNs on the host and pass through them to VM instances. | ||
Allows you to manage the physical NICs detected on a host, generate VF NICs from these physical ones through SR-IOV, and pass through the VF NICs to VM instances, VPC vRouters, and LB instances. These VF NICs inherit the high performance of those physical ones. | ||
Allows you to manage the physical GPU devices detected on a host and pass through them with other peripheral devices (such as GPU graphics card and GPU sound cards) to VM instances. | ||
Allows you to generate virtual GPU devices from physical GPU devices (NVIDIA/AMD graphics cards) and attach these virtual GPU devices to VM instances. | ||
Allows you to manage the USB devices detected on a host and pass through them to VM instances. | ||
Allows you to manage the PCI devices detected on a host, edit the PCI allowlist, and pass through these PCI devices to VM instances. The PCI devices include Ali-NPU cards, IB cards in PCI mode, and FPGA cards. | ||
Allows you to view the FC-HBA devices detected on a host and monitor the port status of FC-HBA devivces. | ||
When the overall workload decreases, the Cloud is working on supporting the consolidation of workloads and the redistribution of VM instances among hosts in a cluster so that some hosts can be powered off to reduce power consumption. | ||
Intel EPT Hardware Assist | Allows you to enable Intel EPT hardware assist for Intel CPUs to improve the CPU performance. | |
Host Monitoring | Monitors and displays host metrics such as CPU, memory, disk read and write, disk size, and NIC throughput. | |
Monitors and displays the number and status of hardware devices on the host, such as CPU, memory, disk, RAID card, power supplu slot, fan, temperature sensor, physical GPU, and vGPU. | ||
Audit | Audits all of the actions performed on hosts, which effectively ensures the security of the Cloud environment. | |
Export CSV File | Allows you to export the host information as a CSV table, which helps in statistical analysis and problem diagnosis. | |
GPU Device | Bulk Action | Allows you to manage GPU devices in bulk, such as enabling/disabling GPU devices. |
View GPU Devices | Allows you to view all physical GPUs and vGPUs in the current zone. | |
Provides a directory tree, allowing you to locate a GPU device quickly by the cluster or the node that the GPU resides on or the instance that the GPU is attached to. | ||
Manage Physical GPU Devices | Allows you to manage the lifecycle of physical GPU devices, such as enabling/disabling physical GPU devices and editing the GPU name. | |
Allows you to execute virtualization and virtualization restoration actions on physical GPU devices. | ||
Allows you to set the sharing mode of a physical GPU device, including share globally, share to specified projects or accounts, and not share. | ||
Allows you to passthrough physical GPUs to VM instances. | ||
Monitors and displays physical GPU metrics such as GPU utilization, memory utilization, power consumption, temperature, fan speed, PCIe RX I/O (only of some NVIDIA GPU devices), and PCIe TX I/O (only of some NVIDIA GPU devices). | ||
Manage vGPU Devices | Allows you to manage the lifecycle of vGPU devices, such as enabling/disabling vGPU devices. | |
Allows you to set the sharing mode of vGPU device, including share globally, share to specified projects or accounts, and not share. | ||
Allows you to attach vGPU devices to VM instances. | ||
Monitors and displays vGPU metrics such as vGPU utilization and memory utilization. | ||
Audit | Audits all of the actions performed on GPU devices, which effectively ensures the security of the Cloud environment. | |
Export CSV File | Allows you to export the GPU device information as a CSV table, which helps in statistical analysis and problem diagnosis. | |
Primary Storage | Local Storage | Allows you to use the local disk directory of your host as a primary storage. |
Supported image storage: ImageStore. | ||
Allows you to manage the lifecycle of local primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting local primary storage. | ||
Allows you to manage VM instances, volumes, clusters, hosts, and other resources on a local primary storage. | ||
Monitors and displays the percentage of used capacity of the local primary storage. | ||
Supports predicting physical storage usage trend for local primary storage. | ||
NFS | Supports NFS protocols. All hosts can automatically mount the same NFS shared directory as the primary storage. | |
Supported image storage: ImageStore. | ||
Allows you to specify a storage network for NFS primary storage. The storage network is used to check the health status of VM instances. | ||
Allows you to manage the lifecycle of NFS primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting NFS primary storage. | ||
Allows you to manage VM instances, volumes, clusters, and other resources on a NFS primary storage. | ||
Allows you to clean up the raw data preserved after migration across NFS primary storage. | ||
Monitors and displays the percentage of used capacity of NFS primary storage. | ||
Supports predicting physical storage usage trend for NFS primary storage. | ||
SharedMountPoint | Supports network shared storage provided by commonly used distributed file systems, such as MooseFS, GlusterFS, OCFS2, and GFS2. | |
Supported image storage: ImageStore. | ||
Allows you to specify a storage network for SharedMountPoint primary storage. The storage network is used to check the health status of VM instances. | ||
Allows you to manage the lifecycle of SharedMountPoint primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedMountPoint primary storage. | ||
Allows you to manage VM instances, volumes, clusters, and other resources on a SharedMountPoint primary storage. | ||
Monitors and displays the percentage of used capacity of SharedMountPoint primary storage. | ||
Supports predicting physical storage usage trend for SharedMountPoint primary storage. | ||
Ceph | Supports Ceph distributed block storage. Supported editions: Ceph open source edition (J/L/N) and Ceph enterprise edition. | |
If you add Ceph enterprise to the Cloud, you can enjoy the license validity reminder. | ||
Supported image storage: ImageStore and Ceph. | ||
Allows you to specify Ceph pools such as root volume pool, data volume pool, and image cache pool when you add a Ceph primary storage. You can manage all the Ceph pool centrally, add more Ceph pools to expand the capacity, customize the display name of Ceph pool, and specify Ceph pools when you create VM instances, clone VM instances, and create volumes. You can also create alarms for Ceph pools. | ||
Allows you to specify a storage network for Ceph primary storage. The storage network is used to check the health status of VM instances. | ||
Allows you to add multiple Ceph monitors and manage all the monitors centrally. | ||
Allows you to manage the lifecycle of Ceph primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph primary storage. | ||
Allows you to manage VM instances, volumes, block storage volumes, clusters, and other resources on a Ceph primary storage. | ||
Allows you to clean up the original data preserved after migration across Ceph primary storage. | ||
Monitors and displays the percentage of used capacity of Ceph primary. | ||
Supports predicting physical storage usage trend for Ceph primary storage. | ||
SharedBlock | Allows you to use a block device divided from a SAN storage as a storage pool. SharedBlock primary storage supports iSCSI and FC shared access protocols. | |
Supported image storage: ImageStore. | ||
Allows you to specify a provisioning method (thick provisioning or thin provisioning) when you add a SharedBlock primary storage. You can also specify the provisioning method when you create VM instances, clone VM instances, or create volumes by using a SharedBlock primary storage. | ||
Allows you to specify a storage network for SharedBlock primary storage. The storage network is used to check the health status of VM instances. | ||
Allows you to add multiple shared blocks and refresh the storage capacity to view its changes when you expand or replace a block device. | ||
Allows you to forcibly clean up the data in a block device, such as the signature in the file system, RAID, and partition table. | ||
Allows you to manage the lifecycle of SharedBlock primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedBlock primary storage. | ||
Allows you to manage VM instances, volumes, clusters, LUNs, and other resources on a SharedBlock primary storage. | ||
Allows you to clean up the original data preserved after migration across SharedBlock primary storage. | ||
Monitors and displays the percentage of used capacity of SharedBlock primary storage. | ||
Supports predicting physical storage usage trend for SharedBlock primary storage. | ||
Supports viewing the path information of the LUN on associated hosts and the monitoring data of the LUN on different hosts. | ||
Vhost | Uses vhost-user mode to connect with high-performance SSD distributed storage. | |
Supported image storage: ImageStore. | ||
Allows you to manage the lifecycle of Vhost primary storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Vhost primary storage. | ||
Allows you to manage VM instances, volumes, block storage volumes, clusters, and other resources on a Vhost primary storage. | ||
Monitors and displays the percentage of used capacity of Vhost primary storage. | ||
Supports predicting physical storage usage trend for Vhost primary storage. | ||
Support Multiple Primary Storage Per Cluster | Supports more than one local primary storage per cluster. | |
Supports more than one NFS primary storage per cluster. | ||
Supports more than one SharedBlock primary storage per cluster. | ||
Supports one local primary storage and one NFS/SharedMountPoint/SharedBlock primary storage per cluster. | ||
Supports one Ceph primary storage and multiple SharedBlock primary storage per cluster. | ||
Supports one Ceph primary storage and up to 3 LocalStorage primary storage per cluster. | ||
Supports one Vhost primary storage per cluster. | ||
Supports multiple NFS storage and multiple SharedBlock storage per cluster. | ||
Advanced Settings | Allow you to set the space preallocation policy for volumes on local, NFS, SharedMountPoint, and SharedBlock primary storage. | |
Allow you to set the storage preallocation policy for SharedBlock primary storage. | ||
Allow you to set storage overcommit for all types of primary storage. | ||
Audit | Audits all of the actions performed on primary storage, which effectively ensures the security of the cloud environment. | |
Image Storage | ImageStore | Stores image files as image slices and supports incremental storage. |
Supported primary storage: LocalStorage, NFS, SharedMountPoint, Ceph, and SharedBlock. | ||
Allows you to obtain the existing image files under the mount path of the ImageStore image storage. | ||
Allows you to specify a data network for an ImageStore image storage for data communication with compute nodes. | ||
Supports image synchronization between different ImageStore image storage on the same management node, and allows you to specify an image synchronization network for ImageStore image storage. | ||
Allows you to manage the lifecycle of ImageStore image storage, such as adding, enabling, disabling, reconnecting, and deleting ImageStore image storage. | ||
Allows you to clean up invalid data stored in ImageStore backup stores to releases storage space. | ||
Allows you to change the password for an ImageStore image storage. | ||
Allows you to centrally manage images in an ImageStore image storage. | ||
Monitors and displays the percentage of used capacity of ImageStore primary storage. | ||
Ceph | Stores image files as Ceph distributed blocks. | |
Supported primary storage: Ceph. | ||
Allows you to add multiple Ceph monitors and manage all the monitors centrally. | ||
Allows you to specify Ceph pools when you add a Ceph image storage. | ||
Allows you to specify a data network for a Ceph image storage for data communication with compute nodes. | ||
Allows you to manage the lifecycle of Ceph image storage, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph image storage. | ||
Allows you to centrally manage images in a Ceph image storage. | ||
Allows you to clean up the original data preserved after migration across Ceph image storage. | ||
Monitors and displays the percentage of used capacity of Ceph image storage. | ||
Audit | Audits all of the actions performed on image storage, which effectively ensures the security of the cloud environment. | |
SAN Storage | iSCSI | Allows you to add an iSCSI server and directly log in to iSCSI storage after you add the server successfully. |
Synchronizes data on iSCSI storage and displays all block devices on iSCSI storage in real time. | ||
Allows you to add a block device divided from an iSCSI storage as a SharedBlock primary storage and pass through it to VM instances. | ||
Allows you to manage the lifecycle of iSCSI storage, such as enabling, disabling, and deleting iSCSI storage. | ||
Allows you to attach/detach an iSCSI storage to/from a cluster. | ||
FC | Synchronizes device information after you deployed an FC storage and displays the FC storage and its block devices in real time. | |
Allows you to add a block device divided from an FC storage as a SharedBlock primary storage and pass through it to VM instances. | ||
Synchronizes information about a single block device on an FC storage. | ||
Checks the status of the cluster where block devices are located. | ||
NVMe Storage | / | Synchronizes device information after you deployed an NVMe storage and displays the NVMe storage and its block devices in real time. |
Allows you to add a block device divided from an FC storage as a SharedBlock primary storage. | ||
Physical Network | / | Allows you to attach network-type tags to physical NIC ports to mark the actual usage of the networks they reside on. NIC ports with tags can be displayed on this page by network types or by cluster. |
Allows you to modify the network types of physical NIC ports. | ||
Allows you to view the flow monitoring based on network types. Three entries are provides: Dashboard, cluster details pages, and host details pages. | ||
Network Resource | L2 Network | Supports the following types of L2 networks: L2NoVlanNetwork, L2VlanNetwork, VxlanNetwork, and HardwareVxlanNetwork. |
VLAN (802 1Q) supports a maximum of 4094 logical networks, and VXLAN supports a maximum of 16 million logical networks. | ||
VxlanNetwork is a software VXLAN-based solution that effectively addresses the shortage of logical network segments in the cloud data center and MAC flooding in upper layer switches. | ||
HardwareVxlanNetwork is a solution for working with third-party hardware SDN. By adding an SDN controller, you can take over the SDN network of hardware switches on the Cloud, therefore reducing network latency and improving VXLAN network performance. | ||
Supports four types of network acceleration mode, including Normal, SR-IOV, and Smart NIC. The normal mode supports all types of L2 networks and the latter two support only L2VlanNetwork and L2NoVlanNetwork. | ||
Allows you to change an L2NoVlanNetwork to an L2VlanNetwork or change an L2VlanNetwork to an L2NoVlanNetwork. | ||
Allows you to modify the VLAN ID of an L2VlanNetwork. | ||
Allows you to modify the VNI of a VxlanNetwork. | ||
Allows you to manage the lifecycle of L2 networks, such as creating and deleting L2 networks. | ||
Allows you to centrally manage L3 networks and clusters on an L2 network. | ||
VXLAN Pool | Supports software SDN VXLAN pools and hardware SDN VXLAN pools. A software SDN VXLAN pool is a collection of VxlanNetwork L2 networks, and a hardware SDN VXLAN pool is a collection of HardwareVxlanNetwork L2 networks. | |
Allows you to manage the lifecycle of VXLAN pools, such as creating and deleting VXLAN pools. | ||
Allows you to manage VNI ranges in a VXLAN pool and customize the name of the VNI ranges. | ||
Allows you to centrally manage the VTEP, clusters, and VXLAN networks in a VXLAN pool. | ||
Public Network | A public network is an L3 network that has direct access to the Internet. | |
Allows you to manage the lifecycle of public networks, such as creating and deleting public networks. | ||
Allows you to add IP ranges of IPv4 and IPv6 types. | ||
Allows you to reserve network ranges of IPv4 and IPv6 addresses. | ||
IPv4 public networks allow you to add either an IP range or an address pool. An address pool can be used to create virtual IP addresses only. | ||
Allows you to customize the MTU of a public network to limit the size of network transmission packets. | ||
Monitors and displays the IP usage statistics of public networks, which helps to improve IP planning efficiency. | ||
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a public network. | ||
Allows you to enable or disable DHCP service and modify DHCP service IP. | ||
Flat Network | A flat network is an L3 network connected to the network where the host is located and has direct access to the Internet. | |
VM instances in flat network networks can use IP resources of an actual network. | ||
Allows you to manage the lifecycle of flat networks, such as creating and deleting flat networks. | ||
Allows you to enable or disable IP Address Management for a flat network. | ||
Allows you to add IP ranges of IPv4 and IPv6 types. | ||
Allows you to reserve network ranges of IPv4 and IPv6 addresses. | ||
IPv4 flat networks support the following network services: DHCP, User Data, elastic IP, security group, and port mirroring. | ||
IPv6 flat networks support the following network services: DHCP, DNS, elastic IP, and security group. | ||
Allows you to customize the MTU of a flat network to limit the size of network transmission packets. | ||
Monitors and displays the IP usage statistics of flat networks, which helps to improve IP planning efficiency. | ||
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a flat network. | ||
Allows you to enable or disable DHCP service and modify DHCP service IP. | ||
VPC Network | A VPC network is an L3 private network where VM instances can be created. A VM instance in a VPC network can access the Internet through a VPC vRouter. | |
Allows you to manage the lifecycle of VPC networks, such as creating and deleting VPC networks. | ||
Allows you to add IP ranges of IPv4 and IPv6 types. | ||
Allows you to reserve network ranges of IPv4 and IPv6 addresses. | ||
IPv4 VPC networks support the following network services: DHCP, User Data, DNS, SNAT, route table, elastic IP, port forwarding, load balancing, IPsec tunnel, security group, dynamic routing, multicast routing, VPC firewall, port mirroring, and netflow. | ||
IPv6 VPC networks support the following network services: DHCP, DNS, and security group. | ||
Allows you to attach/detach a VPC vRouter to/from a VPC network. | ||
Allows you to customize the MTU of a VPC network to limit the size of network transmission packets. | ||
Monitors and displays the IP usage statistics of VPC networks, which helps to improve IP planning efficiency. | ||
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a VPC network. | ||
VPC vRouter | A VPC vRouter is a dedicated VM instance that provides multiple network services. | |
Allows you to specify a host on which a VPC vRouter starts. | ||
Allows you to specify a primary storage when you create a VPC vRouter. | ||
Allows you to specify a default IPv4 address or IPv6 address for a VPC vRouter. | ||
Allows you to set a DNS (IPv4/IPv6) on a VPC vRouter and centrally manage all the DNS on the VPC vRouter. | ||
Allows you to associate the virtual CPUs (vCPUs) of a VPC vRouter with host pCPUs stringently and allocate specific pCPUs for the VPC vRouter, thus improving VPC vRouter performances. | ||
Allows you to manage the lifecycle of VPC vRouters, such as creating, starting, stopping, restarting, and deleting VPC vRouters. | ||
Allows you to migrate a VPC vRouter to another host without changing the primary storage. This action is supported only by VPC vRouters in the running state. We recommend that you perform this action during off-peak hours. | ||
Allows you to migrate a VPC vRouter to another primary storage and host. You can hot migrate a VPC vRouter across different types of primary storage, including LocalStorage↔SharedBlock, LocalStorage↔NFS, and SharedBlock↔NFS; You can hot migrate a VPV vRouter across primary storage of the same type, including SharedBlock↔SharedBlock | ||
Allows you to access a VPC vRouter by using a terminal. You can also set the console password for a VPC vRouter. | ||
Supports auto migration across clusters. Applicable scenarios: start up a VPC vRouter on another host to achieve HA or migrate a VPC vRouter to another host if the source host enters the maintenance mode. | ||
Allows you to set the CPU model for a VPC vRouter through three entries: Global Setting, Cluster Setting, and VPC vRouter Setting. The setting takes effect with the following priority: Global Setting < Cluster Setting < VPC vRouter Setting. | ||
Allows you to enable distributed routing for a VPC vRouter as needed to optimize east-west traffic. | ||
Allows you to enable the SNAT network service for a VPC vRouter as needed. | ||
Supports STS to improve network transmission efficiency. | ||
Supports external monitoring: Collects the VPC vRouter data such as CPU, memory, disk I/O, NIC data from hosts by using libvirt. | ||
Supports internal monitoring: Collects the VPC vRouter data such as CPU, memory, and disk size data from VM instances by using an agent of the VPC vRouter. | ||
Allows you to centrally manage the VPC networks, public networks, and DNS resources associated with a VPC vRouter. | ||
Allows you to set QoS for a VPC vRouter to limit its upstream and downstream bandwidth. | ||
Allows you to centrally manage the network services provided by a VPC vRouter, such as virtual IP addresses, elastic IP addresses, IPsec tunnels, port forwarding, and load balancing. | ||
Supports OSPF dynamic routing protocols in large-scale network environment. | ||
Supports multicast routing to forward multicast messages sent by multicast sources to VM instances. | ||
Has higher resource priority than VM instances by default. When resource contention occurs, the resource priority is as follows: VM instances with Normal priority < VM instances with High priority < VPC vRouters. | ||
Supports changing the OS of VPC vRouters using VyOS 1.1.7 to openEuler 22.03. | ||
VPC vRouter HA Group | A VPC vRouter HA group consists of two VPC vRouters. Either VPC vRouter can be a primary or secondary VPC vRouter for the group. If the primary VPC vRouter does not work as expected, the VPC vRouter becomes the secondary VPC vRouter in the group to ensure high availability of business. | |
Allows you to manage the lifecycle of VPC vRouter HA groups, such as creating and deleting VPC vRouter HA groups. | ||
Allows you to add a VPC vRouter to an HA group and centrally manage all VPC vRouters in this group. Any configuration changes on a VPC vRouter will apply to its partner VPC vRouter. | ||
vRouter Image | Supports VPC vRouter image. | |
Allows you to set the CPU architecture of a vRouter image, including x86_64 and aarch64. Creating VPC vRouters or load balancing instances will inherit the CPU architecture of the original image. | ||
Allows you to upload a vRouter image by using a URL or local browser. | ||
Allows you to manage the lifecycle of vRouter images, such as creating, enabling, disabling, deleting, recover, and completely deleting vRouter images. | ||
Allows you to export a vRouter image on the UI from ImageStore or Ceph image storage. | ||
Allows you to centrally manage exported vRouter images and provides the MD5 value of the downloaded image to check the image integrity. | ||
vRouter Offering | Allows you to manage the lifecycle of vRouter offerings, such as creating, enabling, disabling, and deleting vRouter offerings. | |
SDN Controller | Allows you to add external SDN controllers to control network devices such as external switches. This helps to reduce network latency and improve the VXLAN network performance. | |
Currently, only H3C SDN controllers (VCFC) are supported. | ||
Allows you to manage the lifecycle of SDN controllers, such as creating and deleting SDN controllers. | ||
Management Network | A management network is used to manage physical resources in the Cloud. | |
Allows you to manage the lifecycle of management networks, such as creating and deleting management networks. | ||
Allows you to add IP ranges of the IPv4 type. | ||
Allows you to customize the MTU of a management network to limit the size of network transmission packets. | ||
Monitors and displays the IP usage statistics of management networks, which helps to improve IP planning efficiency. | ||
Allows you to centrally manage the IP ranges (IPv4) on a management network. | ||
Flow Network | A flow network is a dedicated network for port mirror transmission. You can use a flow network to transmit the mirrors of data packets of NIC ports to the target ports. | |
Allows you to manage the lifecycle of flow networks, such as creating and deleting flow networks. | ||
Allows you to add IP ranges of the IPv4 type. | ||
Monitors and displays the IP usage statistics of flow networks, which helps to improve IP planning efficiency. | ||
Allows you to centrally manage the IP ranges (IPv4) on a flow network. | ||
Audit | Audits all of the actions performed on network resources, which effectively ensures the security of the cloud environment. | |
Network Service | Security Group | Provides security control over VM instances on L3 networks. |
Allows you to manage the lifecycle of security groups, such as creating, enabling, disabling, and deleting security groups. | ||
Allows you to add/delete ingress/egress rules to/from a security group and manage these rules centrally, including modifying,enabling, disabling, importing, and exporting rules and setting rule priorities.. | ||
Supports ALL, TCP, UDP, and ICMP protocols for security group rules. | ||
Allows you to set a source security group by security group rules. | ||
Security group rules apply the allowlist and blocklist mechanism. | ||
For newly created security groups, ingress and egress rules with the ALL protocol type are configured by default. The rules allow mutual communications among VM instances in the same security group. | ||
Allows you to centrally manage VM NICs associated with a security group. | ||
Virtual IP Address (VIP) | Provides multiple network services by using VIPs in bridged network environments. | |
Divides VIPs into public VIP, flat network VIP, and VPC VIP based on the network where the VIP is created. | ||
Divides VIPs into system VIP and custom VIP based on how the VIP is created. | ||
Allows you to manage the lifecycle of VIPs, such as adding and deleting VIPs. | ||
Allows you to set QoS for public network VIPs and flat network VIPs. You can set a QoS individually for a VIP or make it use a shared bandwidth. | ||
Monitors and displays VIP metrics such as network traffic and network packet rate. | ||
Elastic IP Address (EIP) | IP addresses in a private network are translated into an EIP that is in another network. This way, private networks can be accessed from other networks by using EIPs. | |
Divides EIPs into public EIP and flat network EIP based on the network where the EIP is created. | ||
Allows you to manage the lifecycle of EIPs, such as adding and deleting EIPs. | ||
Allows you to associate/disassociate an EIP with/from a VM NIC. | ||
Allows you to change the owner of an EIP. | ||
Port Forwarding | Works based on the layer-3 forwarding service provided by VPC vRouters and forwards traffic flows of specified IP addresses and ports in a public network to the specified ports of VM instances. If your public IP addresses are insufficient, you can configure port forwarding for multiple VM instances by using one public IP address and port. | |
Supports TCP and UDP. | ||
Allows you to manage the lifecycle of port forwarding, such as creating and deleting port forwarding. | ||
Allows you to associate/disassociate port forwarding with/from a VM NIC. | ||
Load Balancing | Distributes traffic flows of a VIP to backend servers. It automatically inspects the availability of backend servers and isolates unavailable servers during traffic distribution, which improves the availability and service capability of your business. | |
Supports two types of load balancing services: shared-performance load balancing that works based on VPC vRouters and dedicated-performance load balancing that works based on load balancer instances. | ||
Allows you to specify the HA mode for dedicated-performance load balancers: single node and dual node (active-backup). | ||
Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers. | ||
Allows you to create shared-performance load balancers by using public networks or VPC networks. | ||
Allows you to create dedicated-performance load balancers by using public networks, flat networks, or VPC networks. | ||
Supports network traffic transmission between IPv4 and IPv6 protocols. | ||
Monitors and displays load balancer metrics such as inbound/outbound traffic and active/concurrent/new sessions. | ||
Allows you to centrally manage listeners, backend server groups, and other resources associated with load balancers. | ||
Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers. | ||
Listener protocols support TCP, HTTP, HTTPS, and UDP. | ||
Supports multiple load balancing algorithms, including Round Robin, Min Connections, Source IP Hash, and Weighted Round Robin. | ||
Health check protocols support TCP, HTTP, and UDP. | ||
Listeners that use the HTTPS protocol allow you to associate/disassociate certificates. You can upload certificates or certificate chains and manage these certificates centrally. | ||
Listeners that use the HTTP or HTTPS protocol allow you to configure forwarding rules for domain forwarding and manage these rules centrally. | ||
Supports two session persistence mechanisms: TCP/UDP-based 4th-layer session persistence and HTTP/HTTPS-based 7th-layer session persistence | ||
4th-layer session persistence uses Source IP Hash algorithm to direct requests from clients of the same source IP address to a backend server. | ||
7th-layer session persistence supports Round Robin, Weighted Round Robin, and Weighted Round Robin. When using Round Robin or Weighted Round Robin algorithm, a load balancer inserts or rewrites a cookie to direct requests to the backend server previously responded. When using Source IP Hash algorithm, a load balancer uses the Hash function to direct requests from clients of the same source IP address to a backend server. | ||
Allows you to associate/disassociate listeners with/from backend server groups. | ||
Listeners that use a weighted round-robin load-balancing algorithm allow you to set the weight value for each backend server separately. | ||
Allows you to manage the lifecycle of backend server groups, such as creating and deleting backend server groups. | ||
Allows you to add/remove backend server to/from backend server groups. | ||
Allows you to add VM NICs or other servers outside of the Cloud as backend servers. Note that the later method applies to only dedicated-performance load balancers. | ||
Dedicated-performance load balancers allows you to create/delete load balancer offerings. | ||
VPC Firewall | Monitors ingress and egress traffic of VPC vRouters and decides whether to allow or block specific traffic based on a defined set of security rules. | |
Allows you to manage the lifecycle of VPC firewalls, such as creating and deleting VPC firewalls. | ||
Allows you to centrally manage rules and rule sets associated with VPC firewalls. | ||
Allows you to manage the lifecycle of rules, such as adding, enabling, disabling, and deleting rules. | ||
Configures ingress and egress rules by default after a VPC firewall is created and allows you to customize these rules as needed. | ||
Allows you to manually add rules to a VPC firewall by specifying a single IP address or an IP/port set. | ||
Allows you to add multiple rules to a VPC firewall by importing a template. You can also modify the rule template and upload it as needed. | ||
Allows you to set priorities for VPC firewall rules. | ||
VPC firewall rules have three behaviors: Accept, Drop, and Reject. | ||
VPC firewall rules support the following packet status: new (new connection requests), established (established connections), invalid (unidentifiable connections), and related (new connection requests that are associated with existing connections). | ||
VPC firewall rules support the following protocols: ALL, TCP, UDP, ICMP, GRE, ESP, AH, IPIP, VRRP, IPENCAP, PIM, OSPF, and IGMP. | ||
Allows you to manage the lifecycle of rule sets, such as adding and deleting rule sets. | ||
Allows you to centrally manage rules and network resources in a rule set. | ||
Modifications on rules in a rule set take effect after you synchronize the modifications. | ||
Allows you to save firewall rules as a rule template (managed by the Cloud or export them as a CSV file (offline). | ||
Allows you to manage the lifecycle of rule templates, such as creating and deleting rule templates. | ||
Allows you to save IP/port sets as a generic template. | ||
Allows you to manage the lifecycle of IP/port sets, such as adding, enabling, disabling, and deleting IP/port sets. | ||
IPsec Tunnel | Encrypts and verifies IP packets that transmit over a virtual private network (VPN) from one site to another. | |
IPsec negotiation mode: Supports only the Main mode due to security reasons. The Aggressive mode is not supported. | ||
IPsec IKE configurations: Support IKEv1 and IKEv2(default) | ||
IPsec security protocol: Supports only the Encapsulating Security Payload (ESP) protocol. | ||
IPsec encapsulation mode: Supports only the Tunnel mode. The Transport mode is not supported. | ||
IPsec routing model: Supports only policy-based IPSec VPN. Route-based IPSec VPN is not supported. Therefore, the tunnel supports only unicast data, and does not support multicast and broadcast. | ||
Allows you to manage the lifecycle of IPsec tunnels, such as creating and deleting IPsec tunnels. | ||
Monitors the connection status of IPsec tunnels | ||
Allows you to centrally manage network resources associated with an IPsec tunnel. | ||
Dynamic Routing | Supports Open Shortest Path First (OSPF) protocols. | |
Allows you to manage the lifecycle of OSPF areas, such as creating and deleting OSPF areas. | ||
Supports two types of OSPF areas: Standard and Stub. | ||
Provides three authentication methods for OSPF areas: None, Plaintext, and MD5. | ||
Allows you to centrally manage the routing configuration of OSPF areas. | ||
Netflow | Monitors the ingress and egress traffic of the NICs of VPC vRouters. | |
Allows you to manage the lifecycle of netflows, such as creating and deleting netflows. | ||
Supports two versions of data flows: V5 and V9. | ||
Allows you to centrally manage the routing configuration of netflows. | ||
Port Mirroring | Mirrors the traffic data of VM NICs and sends the traffic data to the target ports. This helps to analyze the data packets of ports, which simplifies the data monitoring and management and makes it easier to locate network errors and exceptions. | |
Allows you to manage the lifecycle of port mirroring, such as creating, enabling, disabling, and deleting port mirroring. | ||
Supports three types of sessions: Ingress, Egress, and Bi-direction. | ||
Allows you to centrally manage port mirroring sessions. | ||
Route Table | Allows you to customize routing configurations as needed. | |
Allows you to manage the lifecycle of route tables, such as adding, enabling, disabling, and deleting route tables. | ||
Allows you to centrally manage route entries and VPC vRouter resources in routing tables. | ||
Allows you to manage the lifecycle of route entries, such as adding and deleting route entries. | ||
Supports two types of route entries: static route entries and blackhole route entries. | ||
Allows you to set route priorities. | ||
Multicast Route | Forwards the multicast messages sent by the multicast source to VM instances, which realizes point-to-multipoint connection between the sender and the receiver. | |
Allows you to enable multicast route as needed. After enabled, the multicast route takes effect for all networks associated with VPC vRouters. | ||
Supports PIM-SM and PIM-SSM routing protocols. In the PIM-SM protocol, RP routers are the essential device in the PIM-SM domain. The RP addresses support static configuration and dynamic election through the BSR mechanism. | ||
Allows you to centrally manage the multicast configuration tables and multicast routing tables. | ||
Shared Bandwidth | Provides bandwidth sharing service and centralized speed control for public network VIPs. You can bind multiple VIPs to a shared bandwidth to allow instances using these VIPs to share the same bandwidth resource, thereby reducing the cost on public network communications. | |
Allows you to customize the size of a shared bandwidth. | ||
Allows you to manage the lifecycle of a shared bandwidth, such creating, editing, and deleting a shared bandwidth. | ||
Allows you to bind/unbind public network VIPs to/from a shared bandwidth. | ||
Allows you to centrally manage VIPs bound to a shared bandwidth. | ||
Allows you to view whether a shared bandwidth takes effect on VIPs bound to it. | ||
Provides an intuitive monitoring to display the flow data of all VIPs and each VIP bound to a shared bandwidth. | ||
Audit | Audits all of the actions performed on network resources, which effectively ensures the security of the cloud environment. | |
CloudFormation | Resource Stack | Allows you to manage the lifecycle of resource stacks, such as creating and deleting resource stacks. |
Allows you to create resource stacks by using a stack template (system template or custom template), uploading a file (in UTF8-encoded format), or customizing a text (in the designer). | ||
Allows you to preview the template configurations before you complete the creation. | ||
Allows you to centrally manage the templates, resources, and events associated with a resource stack. | ||
Stack Template | Allows you to manage the lifecycle of stack templates, such as creating, enabling, disabling, and deleting stack templates. | |
Allows you to create stack templates by customizing a text or uploading a file. | ||
Allows you to modify the template content as needed. | ||
Sample Template | Provides commonly used sample templates for your reference. | |
Allows you to manage the lifecycle of sample templates, such as enabling and disabling sample templates. | ||
Designer | Allows you to establish dependencies between resources by drag-and-drop connections on the canvas. | |
Allows you to undo, redo, zoom in, zoom out, fit to canvas, delete, and clear the canvas. | ||
Allows you to set global parameters of the following types: String, Number (integer or floating point), Comma-delimited list (equivalent to List<String> in Java), and Boolean. | ||
Allows you to preview templates, generate resource stacks, and save as stack templates. | ||
Audit | Audits all of the actions performed on CloudFormation, which effectively ensures the security of the cloud environment. | |
Network Topology | Global Topology | Displays the network topology in the Cloud, helping you to manage and maintain your networks more efficiently. |
Allows you to refresh the topology to view latest information. | ||
Allows you to export the global topology in PNG format. | ||
Allows you to hide or unhide VM instances, highlight the selected resources, view the resource information in hover, and view the VM/VPC vRouter status. | ||
Allows you to fit to window and zoom in, zoom our the canvas. | ||
Allows you to search for resources by resource category and attribute within the current global topology. | ||
Custom Topology | Allows you to generate a custom topology. | |
Allows you to refresh the topology to view latest information. | ||
Allows you to export the custom topology in PNG format. | ||
Allows you to highlight the selected resources, view the resource information in hover, and view the VM/VPC vRouter status. | ||
Allows you to fit to window and zoom in, zoom our the canvas. | ||
Allows you to search for resources by resource category and attribute within the current global topology. | ||
Performance Analysis | View Performance Analysis | Displays the performance metrics of key resources. |
Allows you to view the monitoring data by resources, including VM instance, VPC vRouter, host, image storage, L3 network, and virtual IP. | ||
Supports two monitoring methods: external monitoring and internal monitoring. | ||
Allows you to view the monitoring data by selecting a time span. Available time spans: 15 minutes, 1 hour, 1 week, and custom. | ||
Supports advanced filtering, including filter by monitoring items (metrics and thresholds), resource scope (all resources/specified resources), and owner scope (all owners/specified owners). | ||
Allows you to sort the items by resource name or monitoring metric. | ||
Allows you to view the monitoring data details of a single resource. | ||
Allows you to customize the number of items to be displayed on each page. By default, 10 items are displayed per page. | ||
Export Performance Analysis Report | Allows you to export all the report information or export the information on the current page in CSV format. | |
Allows you to export the average, maximum, or minimum values of the metrics for VM instances and VPC vRouters. | ||
Capacity Management | Resource Capacity Card | Displays the capacities and usages of key resources as cards in the Cloud. |
Supports the following resources: primary storage, image storage, management node, VM instance, volume, image, snapshot, and compute node. | ||
Allows you to jump to the corresponding resource list from the current card. | ||
Resource Capacity Top 10 | Allows you to view top 10 resources based on the capacity usage. | |
Supports the following resources: host, primary storage, image storage, VM instance, volume, image, and snapshot. | ||
Allows you to sort resources by capacity utilization, used physical capacity, available physical capacity, total physical capacity. | ||
Allows you to view the disk usage details of a single resource. | ||
Management Mode Monitoring | / | Allows you to view the health status of each management node in a multi-management node environment. |
Allows you to view the management IP and node status. | ||
Allows you to view the management service status, including whether the monitor IP is reachable, whether the peer management node is reachable, whether the virtual IP is reachable, and the database status. | ||
Monitoring and Alarm | Alarm | Monitors time-series data and events and sends alarm messages to specified endpoints. |
Supports default alarms and custom alarms. | ||
Supports resource alarms, event alarms, and extended alarms. | ||
Allows you to manage the lifecycle of default resource alarms, such as enabling and disabling default resource alarms. | ||
Allows you to manage the lifecycle of custom resource alarms, such as enabling and disabling custom resource alarms. | ||
Allows you to create resource alarms for two types of time-series data: resource utilization and resource capacity. | ||
Provides three emergency levels for resource alarms: emergent, major, and info. | ||
Allows you to enable alarm recovery notification for resource alarms as needed. If enabled, when a resource monitored by a resource alarm recovers from the alarmed status, the system receives a notification. | ||
Allows you to centrally manage the endpoints and alarm records of a resource alarm. | ||
Allows you to manage the lifecycle of custom event alarms, such as creating, deleting, enabling and disabling custom event alarms. | ||
Provides three emergency levels for event alarms: emergent, major, and info. | ||
Allows you to centrally manage the endpoints and alarm records of an event alarm. | ||
Allows you to manage the lifecycle of extended alarms, such as enabling and disabling extended alarms. | ||
Allows you to centrally manage the endpoints and alarm records of an extended alarm. | ||
One-click Alarm | Provides a set of alarm rules for critical resources, which can be used to quickly establish monitoring and alarm services for these resources. | |
Applies to resources such as hosts, VM instances, and VPC vRouters. | ||
Allows you to enable or disable one-click alarms. | ||
Allows you to enable, disable, and modify a single alarm rule for a one-click alarm. | ||
Alarm Template | Encapsulates alarm rules as a template and works with resource groups. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency. | |
Allows you to manage the lifecycle of alarm templates, such as creating and deleting alarm templates. | ||
Allows you to add/remove alarm rules to/from alarm templates and centrally manage these rules in an alarm template. | ||
Allows you to attach/detach tags to/from an alarm template. | ||
Allows you to clone an alarm template. | ||
Allows you to associate/disassociate resource groups with/from an alarm template and centrally manage these resource groups of an alarm template. | ||
Resource Group | Groups resources based on business requirements and works with alarm templates. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency. | |
Allows you to manage the lifecycle of resource groups, such as creating and deleting resource groups. | ||
Allows you to add/remove resources to/from a resource group and centrally manage these resources in a resource group. | ||
Allows you to attach/detach tags to/from a resource group. | ||
Allows you to associate/disassociate alarm templates with/from a resource group. | ||
Allows you to centrally manage the alarms, endpoints, and alarm records of a resource group. | ||
Message Template | Sends messages to endpoints by using a text template. | |
Allows you to manage the lifecycle of message templates, such as creating and deleting message templates. | ||
Supports the following endpoints: email, DingTalk, Microsoft Teams, Alibaba Cloud SMS, Universal SMS, WeCom, Lark, and Webhook. | ||
Supports the following alarm types: resource alarm and event alarm. | ||
Supports the following types of message texts: alarm message text and recovery message text. | ||
Allows you to make a template default or cancel the default setting. Only one default template is allowed. | ||
Allows you to modify the content in a message template. | ||
Message Source | Allows you to connect to extended message sources. | |
Allows you to manage the lifecycle of message sources, such as creating, enabling, disabling, and deleting message sources. | ||
Supports Ceph Enterprise. | ||
Provides preconfigured alarm message conversion template and allows you to customize parameters in the template. | ||
Endpoint | Allows you to obtain your subscribed information by using an endpoint. | |
Supports default endpoints and custom endpoints (email, short message, Webhook, DingTalk, Microsoft Teams, SNMP trap receiver, WeCom, and Lark). Short message endpoints support two SMS gateway service provider: Alibaba Cloud and Emay Softcom. | ||
Default endpoints receive messages sent from the Cloud. | ||
Allows you to manage the lifecycle of custom endpoints, such as creating, enabling, disabling, and deleting custom endpoints. | ||
Allows you to send test messages to custom endpoints to check whether the endpoints can receive Cloud alarm messages properly. | ||
Allows you to modify endpoints configurations flexibly, such as the message languages, addresses, mention members, and security settings. | ||
Allows you to add/remove alarms to/from an endpoint and centrally manage these alarms, including resource alarms and event alarms. | ||
Allows you to centrally manage messages (alarm messages and extended messages) received by an endpoint. | ||
Audit | Audits all of the monitoring and alarm actions, which effectively ensures the security of the cloud environment. | |
Alarm Message | Cloud Platform Alarm Message | Allows you to view and centrally manage alarm messages sent from the Cloud . |
Displays alarm messages of different emergency levels in the last seven days on a bar chart. | ||
Displays alarm messages of different resources in the last seven days on a pie chart. | ||
Allows you to view up to 1,000 alarm messages in the message list. | ||
Allows you to filter messages by resource. | ||
Allows you to filter messages by specifying a time span. | ||
Allows you to mark alarm messages as confirmed and filter confirmed or unconfirmed messages as needed. | ||
Allows you to filter messages by emergency levels (emergent, major, and info). | ||
Allows you to filter messages by alarm type (resource alarm and event alarms). | ||
Allows you to converge and sort alarm messages based on the alarm times. | ||
Allows you to set a silence period for alarm messages. During the silence period, no alarm messages will be generated. You can process the alarm information when you are convenient. | ||
Allows you to cancel the silence period for alarm messages. | ||
Allows you to view the details about an alarm. | ||
Allows you to export the alarm messages as a CSV table, which helps in statistical analysis and problem diagnosis, and allows you to export the filtered alarm messages. | ||
Extended Alarm Message | Allows you to take over third-party alarm messages and push, manage them centrally. | |
Allows you to mark alarm messages as read and filter read or unread messages as needed. | ||
Allows you to filter messages by specifying a time span. | ||
One-click Inspection | Five Inspection Categories | Provides five inspection categories, including platform, compute, network, storage, and global setting. These categories cover all key resources and services of the Cloud. |
Multi-layer Healthiness Scoring Mechanism | Provides an in-built three-layer healthiness scoring mechanism that scores resources and services, inspection items, and the overall Cloud. It also displays the score of healthiness for the overall Cloud. | |
O&M Suggestion | Provides O&M suggestions on resources in warning or fault status. | |
Inspection Report | Provides inspection introduction, summary, and results, and details of abnormal inspection items as well as O&M suggestions. | |
Inspection Management | Allows you to select inspection items for one-click inspection. | |
Allows you to pause, resume, and cancel inspection, implement re-inspection, and export PDF-formatted inspection reports. | ||
Operation Log | Current Task | Allows you to view and manage operations that are being performed. |
Displays the task progress and remaining time in real time. | ||
Allows you to cancel, suspend, and continue a current task as needed. | ||
Allows you to view the details about a current task. | ||
Historic Operation | Displays the historic operations performed in the Cloud. | |
Allows you to view all the operations that were performed. | ||
Allows you to filter operation logs by specifying a time span. | ||
Allows you to filter operation logs by task results, including succeeded, failed, canceled, canceling, exception, timeout, suspended, and unknown. | ||
Allows you to filter operation logs by operators. | ||
Allows you to export operation logs in CSV format. | ||
Allows you to view the details about an operation log. | ||
Allows you to set the operation log retention period in the Global Setting. | ||
Auto-Scheduling Logs | Displays the VM auto-scheduling logs triggered by the management node, such as VM recovery from HA and host maintenance. | |
Allows you to view all the auto-scheduling logs that were triggered. | ||
Allows you to filter auto-scheduling logs by specifying a time span. | ||
Allows you to filter auto-scheduling logs by task results, including succeeded and failed. | ||
Allows you to export auto-scheduling logs in CSV format. | ||
Allows you to view the details about an auto-scheduling log. | ||
Allows you to set the auto-scheduling log retention period in the Global Setting. | ||
Audit | / | Monitors and records all activities in the Cloud, which effectively ensures the security of the cloud environment. |
Allows you to filter audit records by resource actions and login actions. | ||
Allows you to filter audit records by specifying a time span. | ||
Allows you to filter audit records by task results, including succeeded and failed. | ||
Allows you export audit records in CSV format. | ||
Allows you to view the details about an audit record. | ||
Log Collection | Collect Log | Allows you to collect the logs of the Cloud and of various nodes on the Cloud that are generated in the specified time range. |
Manage Log | Allows you to collect, recollect, download, delete, and cancel the collection of logs. | |
Script O&M | Script Library | Centrally stores and manages script files. Allows you to manage the lifecycle of scripts, such as creating, modifying, and deleting scripts. |
Allows you to execute scripts on VM instances to finish automated O&M tasks. | ||
Provides script execution records, displaying the execution state, execution start time, completion time, operator, script configurations, VM instances that the scripts are executed on, and the VM response. | ||
XML Hook | XML Hooks helps you realize VM customized configurations and capability extends by modifying VM XML files. | |
Allows you to manage the lifecycle of XML Hooks, such as creating, modifying, and deleting XML Hooks. | ||
Provides XML Hook samples and detailed XML Hook writing methods for your reference. | ||
Allows you to attach/detach XML Hooks to/from VM instances. | ||
Autit | Audits all of the script O&M actions, which effectively ensures the security of the cloud environment. | |
Scheduled O&M | Scheduled Job | Allows you to manage the lifecycle of scheduled jobs, such as creating, enabling, disabling, and deleting scheduled jobs. |
Supports VM instances and volumes. | ||
Allows you to view job records centrally. | ||
Allows you to attach/detach schedulers to/from a scheduled job. | ||
Scheduler | Allows you to manage the lifecycle of schedulers, such as creating and deleting schedulers. | |
Allows you to centrally manage the scheduled jobs of a scheduler. | ||
Allows you to centrally manage schedulers that were completed. | ||
Audit | Audits all of the scheduled O&M actions, which effectively ensures the security of the cloud environment. | |
Tag | / | Allows you to customize tags for resources and quickly locate resources by tag type and tag name. |
Supports admin tags and tenant tags. | ||
Allows you to manage the lifecycle of tags, such as creating and deleting tags. | ||
Allows admins to attach/detach tags to/from all resources on the Cloud and tenants to attach/detach tags to/from resources of tenants. | ||
Allows you to centrally manage resources with a tag attached. | ||
Audits tag actions, which effectively ensures the security of the cloud environment. | ||
Billing Management | Bills | A bill is the expense of resources totaled at a specified time period. Billing is accurate to the second. |
Supported bill types; project bills, department bills, and sub-account bills. | ||
Allows you to filter bills by specifying a time span. | ||
Allows you to view project bills in a list, export all of the project bills in CSV format, view the billing details of a single project, and export the bills of a single project in CSV format. | ||
Allows you to view department bills in a list, view the bills of the current department or its sub-departments, view the bills of directly affiliated projects in a list, export total bills of all directly affiliated projects in CSV format, view the billing details of a single project, and export the bills of a single project in CSV format. | ||
Allows you to view sub-account bills in a list, export all of the sub-account bills in CSV format, view the billing details of a single sub-account, and export the bills of a single sub-account in CSV format. | ||
Allows you to disable the billing feature in Global Setting. Then, the system stops billing resources and bills are no longer generated. | ||
By default, bills are generated every day at 00:00. You can change the bill generation time in the Global Setting. | ||
Allows you to set the currency symbol displayed on the UI in the Global Setting. Default value: ¥. Valid values: ¥, $, €, £, A$, HK$, ¥, CHF, and C$. | ||
Pricing List | A pricing list is a list of unit prices of different resources. The unit price of a resource is set based on the specification and usage time of the resource. | |
Allows you to manage the lifecycle of pricing lists, such as creating and deleting pricing lists. | ||
Allows you to set the unit price for the following resources: CPU/memory, volume (root volume/data volume), GPU device (desktop GPU and compute GPU), network (VM public IP and virtual IP), and elastic baremetal instance (elastic baremetal offering). | ||
Allows you to generate bills based on disk performances. You can set the billing unit price for root volumes and data volumes with different performances by setting advanced parameters. | ||
Allows you to modify the billing unit price as needed. | ||
Allows you to centrally manage the price history and related resources. | ||
Access Control | Console Proxy | Allows you to set a console proxy to log in to a VM instance. |
Allows you to reconnect a console proxy. | ||
AccessKey Management | An AccessKey pair is a security credential that one party authorizes another party to call API operations and access its resources in the Cloud. | |
Supports two types of AccessKey: local AccessKey and third-party AccessKey. | ||
Allows you to manage the lifecycle of local AccessKeys, such as generating, enabling, disabling, and deleting local AccessKeys. | ||
Allows you to manage the lifecycle of third-party AccessKeys, such as generating and deleting third-party AccessKeys. | ||
Audits all of the AccessKey actions, which effectively ensures the security of the cloud environment. | ||
IP Allowlist/Blocklist | An IP blocklist or allowlist identifies and filters IP addresses that access the Cloud. | |
Allows you to enable the IP allowlist/blocklist feature in the Global Setting as needed. | ||
Allows you to manage the lifecycle of IP allowlists/blocklists, such as adding and deleting IP allowlists/blocklists. | ||
Audits all of the IP allowlist/blocklist actions, which effectively ensures the security of the cloud environment. | ||
Application Market | Default Application | Provides default application installation packages for you to quick install and use applications. Supported default applications: ZStack Zaku (Container Management) and ZStack ZMigrate (Miragetion Service). |
Allows you to manage the lifecycle of default applications, such as installing and uninstalling applications. | ||
Allows you to quickly open installed applications with one-click. | ||
Allows you to view the detailed information of applications and VM instances that applications run on. | ||
More Application | Allows you to more third-party applications to the Cloud via their URLs. | |
Supports the following types of applications: storage, database, security, IaaS, PaaS, and SaaS applications. | ||
Allows you to set the sharing mode of a resource, including share globally, share to specified projects or accounts, and not share. | ||
Allows you to manage the lifecycle of applications, such as adding and deleting applications. | ||
Sub-Account Management | / | A sub-account is created by the admin or synced from an SSO authentication system and is managed by the admin. Resources created under a sub-account are managed by the sub-account. |
Allows you to manage the lifecycle of local sub-accounts, such as creating and deleting local sub-accounts. | ||
Allows you to add an SSO server to the Cloud so as to integrate the SSO system and enable password-free login of related accounts in the system. | ||
The supported SSO server type includes OIDC. | ||
Allows you to configure user mapping rules for the OIDC server. | ||
Allows you to manage the lifecycle of the SSO server, such as adding and deleting the SSO server. | ||
Allows you to manage the lifecycle of SSO sub-accounts, such as synchronizing and deleting SSO sub-accounts. | ||
Allows you to set the initial password or change the password of a sub-account. | ||
Allows you to bill for resources used by sub-accounts, attach pricing lists to a sub-account, and change pricing lists for the sub-account. | ||
Allows you to set two-factor authentication for sub-account login, view the two-factor QR codes of the sub-account, and download the two-factor QR codes. | ||
Allows you to set and manage resource quota for sub-accounts, including compute resources, storage resources, and network resources. | ||
Allows you to centrally manage the associated or shared resources of a sub-account. | ||
Audits all of the sub-account actions, which effectively ensures the security of the cloud environment. | ||
System Setting | Theme and Appearance | Allows you to customize the theme and appearance of the Cloud. |
Allows you to set the global appearance (theme), titles (browser/login interface/platform interface), and monitor (title and appearance/data monitoring method). | ||
Allows you to reset to default settings with one click. | ||
Time Management | Allows you to configure NTP time servers for the Cloud to sync the clock of the time servers with all nodes of the Cloud. Three time protocol modes are supported: Internal, Internal and External, and External. | |
Allows you manually sync time by force to save your time. | ||
Displays the latest system UTC date, time, and time zone. | ||
Email Server | If you select Email as the endpoint of an alarm, you need to set an email server. Then alarm messages are sent to the email server. | |
Allows you to manage the lifecycle of email servers, such as adding, enabling, disabling, and deleting email servers. | ||
Supported email server type: SMTP. | ||
Supported encryption type: STARTTLS, SSL/TLS, and NONE. | ||
Allows you to test the email server connectivity. | ||
Allows you to change the owner of email servers. | ||
Audits all of the email server actions, which effectively ensures the security of the cloud environment. | ||
Log Server | A log server is used to collect logs of the management node. You can add a log server to the cloud and use the collected logs to locate errors and exceptions. This improves your O&M efficiency. | |
Allows you to manage the lifecycle of log servers, such as adding and deleting log servers. | ||
Allows you to set the log facility from LOCAL0 to LOCAL7.This value is used to match the log server. | ||
Allows you to select a log severity to make the log server only receive logs of this level or higher levels. Valid values: ALL, TRACE, DEBUG, INFO, WARN, ERROR, and FATAL. | ||
Allows you to test the log server connectivity. | ||
Audits all of the log server actions, which effectively ensures the security of the cloud environment. | ||
SNMP Management | Connects 3rd-party platform and Cloud through SNMP, enabling the 3rd-part platform to get monitoring data from Cloud or receive alarms pushed from Cloud. | |
Allows you to enable/disable SNMP Management. | ||
Allows you to configure SNMP parameters in a visual method. | ||
Allows you to add SNMP trap receivers to receive alarms from Cloud. | ||
Allows you to add SNMP trap receivers as endpoints and attach them to specified alarms. | ||
Platform Setting | HA Policy | HA Policy is a mechanism that ensures sustained and stable running of the business if VM instances are unexpectedly stopped or are errored because of errors occurred to compute, network, or storage resources associated with the VM instances. |
Provides None and NeverStop VM HA modes, which specify whether to enable auto restart if VM instances are stopped. | ||
Allows you to configure VM Failover Strategy in a table based on the management network connectivity status, storage network connectivity status, and business NIC status. | ||
Allows you to modify host error detection settings and advanced HA-related settings. These settings take effect on the Cloud. | ||
Allows you to view and filter VM HA logs. | ||
Scenario Template | Provides multiple templates that encapsulate scenario-based global settings. You can apply a template globally with one click based on your business needs. This improves your O&M efficiency. | |
Applies to VM performance optimization, restoration from high availability, cloud security setting, and production environment setting. | ||
Allows you to apply a scenario template with one click. | ||
Allows you to reset to default settings with one click. | ||
Allows you to modify settings of a single item in a scenario template. | ||
Global Setting | Allows you to configure settings that take effect on the whole platform. | |
Support basic settings and advanced settings. | ||
Allows you to reset to default settings with one click. | ||
Supports quick search and directory navigation to help you quickly locate target items. | ||
Allows you to modify settings of a single item in the Global Setting. | ||
System and Security | Version Detection | Allows you to enable version detection which periodically detects the latest version including production environment recommended versions or technical preview versions |
Allows you to specify the auto detection duration by day, week, month, or year. | ||
Allows you to implement manual detection or use the auto detection. It provides information about the version number and the highlights if the latest version is available. | ||
Experience Improvement Program | Allows you to join in or opt out the Experience Improvement Program. | |
Certificate Management | Allows you to configure and manage a SSL certificate, including third-party certificate and system self-signed certificate. | |
License Management | / | Licensing in the Cloud is supplied in different functionality packages as Base and Plus. |
You can purchase a package as needed. | ||
The Base license provides the basic and essential features of the Cloud, which can meet the mainstream business requirements. | ||
Functionalities covered in the Base license include Standard, Enterprise Trial, and Enterprise Prepaid. | ||
The Plus license provides add-on features or feature enhancements to meet the specific business requirements. | ||
Functionalities covered in the Plus license include VMware Management, Tenant Management, ARM64 Management, Backup Service, Continuous Data Protection (CDP) Service, Migration Service, Baremetal Management, Elastic Baremetal Management, Alibaba Cloud Hybrid Cloud Management, Cryptography Security Compliance, 5x8 (7x24) After-Sales Service, SR-IOV NIC Service, GPU Service, Billing Management, CloudFormation, Auto-Scaling Service, Smart NIC Service, Container Service-CPU, and Container Service-vCPU. | ||
A Base license is required to install the Plus license. | ||
Supports two licensing methods: USB key and request key. | ||
The USB key licensing method allows you to obtain the authorization by inserting only one USB key into the management node. | ||
The request key method allows you to obtain the authorization by uploading the license file to the management node. | ||
Allows you to view the current license status and licensing records. | ||
Allows you to delete a Plus license as needed. | ||
Provides license expiration reminders when your license is about to expire, expired, or license quota exceeds. | ||
Cloud Login | Login Method | Allows you to access the UI via HTTP or HTTPS. |
Supports account login and tenant login. | ||
Allows you to access the Cloud and experience all of the features by using command lines. | ||
Login Security | Allows you to set the maximum number of continuous login failures that trigger verification by verification code. Default: 6. | |
Supports two-factor authentication, which further enhances the account security. | ||
Allows you to set the login password complexity by set the password length and characters combined of digits, uppercase/lowercase letters, and special characters. | ||
Allows you to set the password validity period by customizing the password update cycle. We recommend that you change the login password regularly to ensure the login security. | ||
Supports historical password check and allows you to customize the number of recent passwords that cannot be reused. | ||
Allows you to specify whether to lock the login account if the logins continuously fail, the number of allowed failed attempts, and how long the account will be locked. | ||
Allows you to specify whether to disallow simultaneous connection sessions established by one user. If yes, one user can establish only one connection session with the platform. | ||
Allows you to set the login interface with the default link. | ||
VDI | Solution | Supports SPICE, RDP, and VNC protocols. |
Allows you to specify a VDI network. | ||
Supports USB redirection, which means multiple USB devices are compatible. | ||
Allows you to set an independent VDI network. | ||
Supports multi-screen display. | ||
Supports microphones. | ||
Supports SPICE to optimize traffics. | ||
UI Highlights | Quick Navigation | Provides a quick navigation entry, which is convenient for users to quickly locate and enter the required features and services. |
Global Search | Provides one-stop global search, allowing you to search for features, resources, and documents. | |
Embedded Document | Provides embedded documents in the help center. | |
Installation | / | Allows you to complete installing and deploying the Cloud from scratch within just 30 minutes with one simple command. |
Supports the following installation modes: Tenant Management Mode, Community Management Mode, Compute Node Mode, Expert Mode, and Simplified Expert Mode. | ||
Supports ISO: h84r ISO. | ||
Allows you to burn ISO images to U drives by using Rufus. | ||
Upgrade | Seamless Upgrade | Allows you to seamlessly upgrade the Cloud from an earlier version to a later version. |
Deployment Environment Upgrade | Allows you to specify the deployment environment from the Expert Mode. |
Type | Features | Description |
---|---|---|
vCenter | Basic Resource | Allows you to take over vCenter 5.5, 6.0, 6.5, 6.7, and 7.0. |
Supported protocols: HTTPS (default) and HTTP. | ||
Supports automatic and manual data synchronization. Automatic data synchronization occurs when a vCenter is added to the Cloud for the first time. You can also enable vCenter Data Auto Sync in the Global Setting and set an automatic synchronization interval to realize a regular automatic data synchronization. | ||
Allows you to centrally manage resources associated with a vCenter, including clusters, primary storage, image storage, hosts, and resource pools. | ||
Allows you to delete a taken over vCenter from the Cloud. This deletes only the local record of the vCenter and associated resources but does not affect the real resources in the remote vCenter. | ||
VM Instance | Allows you to manage the lifecycle of vCenter VM instances, such as creating, booting, stopping, rebooting, resuming, pausing, powering off, deleting, and recovering vCenter VM instances. | |
Allows you to launch the console of a vCenter VM instance and set the console password as needed. | ||
Allows you to clone a vCenter VM instance online or offline without data volumes. | ||
Allows you to hot migrate a vCenter VM instance across shared primary storage with data volumes attached. | ||
Allows you to modify the instance offering (CPU/memory) of a stopped vCenter VM instance. | ||
Allows you to change the owner of a running or stopped vCenter VM instance. | ||
Allows you to set the HA level (None/NeverStop) for a vCenter VM instance. You can enable VM HA in the Global Setting as needed. | ||
Allows you to attach custom tags to vCenter VM instances for an efficient resource location. | ||
Supports an external monitoring on the CPU, memory, disk, virtual disk, and NIC of a vCenter VM instance. | ||
Allows you to centrally manage resources associated with a vCenter VM instance, such as volumes and NICs. | ||
Network | Supported L2 networks: L2NoVlanNetworks and L2VlanNetworks. | |
Supported L3 networks: public networks, flat networks, and VPC networks. | ||
Supported switch types: dvSwitch and vSwitch. | ||
Supported VPC network services: SNAT, DHCP, elastic IP, port forwarding, load balancing, and IPsec tunnel. | ||
Allows you to manage the lifecycle of networks, such as creating L2/L3 networks and deleting L3 networks. | ||
Allows you to set the sharing mode for an L3 network. Valid values: share globally, share to specified projects or accounts, and not share. | ||
Provides a list displaying the IP usage of an L3 network to improve IP planning efficiency. | ||
Allows you to attach a cluster to the L2 network an L3 network belongs to. | ||
Allows you to centrally manage IPv4 network ranges of an L3 network. | ||
Volume | Allows you to manage the lifecycle of vCenter volumes, such as creating, enabling, disabling, deleting, recovering, and expunging vCenter volumes. | |
Allows you to attach/detach a volume to/from an instance. | ||
Allows you to change the owner of a vCenter volume. | ||
Image | Supported vCenter image types: system images in the VMDK format and volume images in VMDK format. | |
Allows you to select the image platform. Supported platforms: Linux, Windows, and Other. | ||
Allows you to upload a vCenter image by using a URL. | ||
Allows you to manage the lifecycle of vCenter images, such as adding, enabling, disabling, deleting, recovering, and expunging vCenter images. | ||
Allows you to set the sharing mode for a vCenter image. Valid values: share globally, share to specified projects or accounts, and not share. | ||
Allows you to change the owner of a vCenter image. | ||
Event Message | Provides a list to centrally display event alarm messages of the vCenter, helping you locate problems quickly. | |
Allows you to view event messages in a specified time period. | ||
Multi-account Management | Allows a tenant/sub-account to manage the lifecycle of resources such as VM instances and volumes of a vCenter it belongs to. | |
Allows a tenant/sub-account to use vCenter resources such as networks and images shared by the admin. | ||
Allows a tenant/sub-account to view the usage of KVM VM instances and vCenter VM instances on the dashboard. | ||
Allows a tenant/sub-account to view the billing information of KVM and vCenter resources. | ||
Allows a tenant to apply for vCenter VM instances by submitting tickets. | ||
Audit | Audits all of the vCenter actions, which effectively ensures the security of the cloud environment. |
Type | Feature | Description |
---|---|---|
Personnel and Permissions | Organization | The basic element constructing organization structures. An organization structure consists of organizations of various levels. |
Provides a tree diagram to show the organizations in an organization structure. The admin or platform managers see all structure trees on the Cloud, while a normal platform or project member see only the tree its organization belongs to. | ||
Divides organizations into the default department and custom departments according to the users they organize. A custom department is used to organize personnel assigned to this department, and the default department is used to organize personnel has not been assigned to any custom department. Once a personnel is assigned to a custom department, it is removed from the default department. | ||
The default department is generated automatically by the system. You cannot delete the default department or add a sub-department to it. | ||
Allows you to centrally manage immediate members of the default department. | ||
Divides custom departments into two types according their addition methods: creating on local and synchronizing from an SSO platform. The first method creates a custom department to organize local users and the second method provides a custom department to organize SSO users. | ||
Divides custom departments into new teams and sub-departments according to their structural levels. A new team is a top-level department that allows you to add sub-departments of various level to it. | ||
Allows you to manage the lifecycle of a custom department, such as creating and deleting a custom department. | ||
Allows you to add sub-departments to a custom department or change the superior department for a sub-department. | ||
Allows you to set a department manager for a top-level department and department admins for custom departments. | ||
Allows you to centrally manage the immediate members and associated project resources of a custom department. | ||
Allows you to set quotas on custom department resources, such as the compute resource quota, storage resource quota, network resource quota, and other resource quota. | ||
User | Natural persons performing as the most basic units in Tenant Management. | |
Divides users into local users and SSO users according to their origins. Local users are created on the Cloud while SSO users are synchronized from SSO platforms. | ||
Allows you to manage the lifecycle of a local user, such as creating and deleting a local user. | ||
Supports two methods to create local users: custom creation and template import. | ||
Allows you to change the login password for a local user. | ||
Allows you to enable the certificate login feature for a local user to authenticate its identity when it logs in to the Cloud. | ||
Allows you to change a deleted AD/LDAP user from an SSO user to a local user. | ||
Allows you to delete an SSO user. | ||
Allows you to add/remove a user to/from a department, user group, or project. | ||
Allows you to set a platform or project role for a user. | ||
Allows you to specify a zone for a user to manage. | ||
Allows you to export the user information as a CSV table, which helps in statistical analysis and problem diagnosis. | ||
User Group | A collection of natural persons as well as a collection of project members. | |
Allows you to manage the lifecycle of a user group, such as creating and deleting a user group. | ||
Allows you to add users to a user group and centrally manage the users in the user group. | ||
Allows you to add a user group to a project and assign unified project roles to the users in the user group. | ||
Role | A collection of permissions, granting users and user groups with permissions to perform actions on resources with APIs. | |
Divides roles into platform roles and project roles according to the scenarios in which their permissions take effect. A platform role has permissions to manage the zone assigned to it while a project member has permissions to manage the project it belongs to. | ||
Divides roles into system roles and custom roles according to their generation mechanisms. | ||
System roles including admin, platform manager, department manager, monitor role, project admin, and project manager. Roles other than these are all custom roles. | ||
System roles are generated by the system automatically. You can view the UI permissions and API permissions of a system role. | ||
Allows you to manage the lifecycle of a custom role, such as creating and deleting a custom role. | ||
Allows you to modify the UI permissions and UI permissions of a custom role. | ||
Allows you to view the users and user groups bond with a role. | ||
SSO | Supports seamlessly access to SSO systems to enable SSO users to log in to the Cloud. | |
Supports SSO server types: AD, LDAP, OIDC, OAuth2, and CAS. | ||
Allows you to enable the SSL/TSL encryption for AD and LDAP servers. | ||
Allows you to enable SSL Certificate Check Skipping for LDAP servers configured with SSL certificates in Global Setting to skip all SSL certificate checks when the Cloud accesses these servers. | ||
Allows you to configure allowlist or blocklist filter mechanism and filter rules for an AD or LDAP server to filter the users that does not need or need to be synchronized from the base DN. | ||
Allows you to configure synchronize mapping rules for an SSO server. | ||
Allows you to manage the lifecycle of an SSO server, including adding and deleting an SSO server. | ||
Allows you to manually synchronize the latest user information from a AD or LDAP server. | ||
Allows you to manually test the connectivity of a AD or LDAP server. | ||
Audit | Audits all personnel and permissions actions, which effectively ensures the security of the cloud environment. | |
Project Management | Project | A project is a tenant. You can plan resources based on projects and create a separate resource pool for a project. |
Supports two project configuration methods: manual configuration and configuration with a project template. | ||
Supports project reclaim policies: unlimited, reclaim by specifying time, and reclaim by specifying cost. | ||
A project set as reclaimed by specifying time or reclaimed by specifying cost allows you to specify one of the following reclaim actions: disable project member login, disable project login and stop project resource, and delete project. | ||
Allows you to set an access control for a project as needed, allowing project members to log in to the Cloud during a specified time period, or prohibiting project member from logging in to the Cloud during a specified time period. | ||
Allows you to enable security group constraint for a project to associate a security group by force to each VM instance created by the project members. | ||
Allows you to manage the lifecycle of a project, such as creating, enabling, disabling, deleting, recovering, and expunging a project. | ||
Allows you to restore an expired project. The project member can log in to the project and the project resources work normally after the restoration. | ||
Allows you to generate a project template from an existing project for the fast creation of later projects. | ||
Allows you to set a project admin who can set project managers to help the project management. | ||
Allows you to set a department for a project. The project bill is merged into the department bill. | ||
Allows you to stop project resources, including VM instances and VPC vRouters. This action does not disable the project members from logging in to the project. | ||
Allows you to set quotas on project resources, such as compute resource quota, storage resource quota, network resource quota, and other resource quota. | ||
Allows you to centrally manage the members, user groups, associated resources, and shared resources of a project. | ||
Project Template | A template that identifies various resource quotas. You can use a project template to create a template quickly. | |
Allows you to manage the lifecycle of a project template, such as creating and deleting a project template. | ||
Allows you to set quotas for a project template, such as compute resource quota, storage resource quota, network resource quota, and other resource quota. | ||
Audit | Audits all project management actions, which effectively ensures the security of the cloud environment. | |
Ticket Management | Process Management | Helps you provide basic resources to project more efficiently. |
Divides processes into the default process and custom processes according to their generation mechanisms. | ||
The default process is generated by the system and consists of two flows: the submitting ticket flow and the final approval and execution flow. The default process allows project admins, project managers, and normal project members to submit tickets, and the admin to approve and execute tickets. | ||
The default process applies to following tickets: tickets to modify project cycle, tickets to modify project quota, and tickets that are not specified with a custom process. | ||
Allows the admin, platform managers and normal platform members with corresponding permissions to create custom processes. A custom process consists of following flows: the submitting ticket flow, intermediate approval flows, and the final approval and execution flow. A custom process allows project admins, project managers, and normal project members to submit tickets; project admins, project mangers, normal project members, and department managers joining the projects to be responsible for intermediate approval flows, and the admin and project admins to be responsible for the final approval and execution flow. | ||
A custom process applies to following tickets: tickets to apply for VM instance, tickets to delete VM instance, and tickets to modify VM configuration. | ||
Supports the process lifecycle management, such as creating, enabling, disabling, and deleting a custom process. | ||
Supports ticket flow modifications. | ||
Ticket Application | Allows project admins, project managers, and normal project members to submit tickets. | |
Supports following ticket types: apply for VM instance (KVM/ESX), delete VM instance, modify VM configuration, modify project quota, and modify project cycle. | ||
Supports ticket lifecycle management, such as creating and deleting a ticket. | ||
Allows project members to recall a pending ticket, or resubmit a recalled or rejected ticket. | ||
Provides intuitive ticket processing records. | ||
Ticket Approval | Allows project admins, project managers, normal project members, and department managers joining the projects to be responsible for intermediate approval flows. Allows the admin and project admins to be responsible for the final approval and execution flow. | |
Allows you to view pending and resolved tickets. | ||
Allows you to approve or reject a pending ticket. | ||
Provides intuitive ticket processing records. | ||
Allows the admin to view archived tickets, including resolved tickets that are deleted. | ||
Audit | Audits all ticket management actions, which effectively ensures the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Backup Service | Backup Job Dashboard | Supports intuitive viewing and unified management of backup jobs on the Cloud to improve O&M efficiency. |
Displays backup job overview on different cards, including the number, state, and status of backup jobs. | ||
Displays backup job statistics in line chart and list format. | ||
Allows you to set a time filter to view the execution of backup jobs within the selected time period. The time filter applies to both the line chart and list. | ||
Allows you to view backup job execution details. | ||
Backup Job | Allows you to create a backup job to back up local VM instances, volumes, or databases to a specified storage server. Local backup, remote backup, and Public Cloud backup are currently supported. | |
Allows you to manage the lifecycle of backup jobs, such as creating, enabling, disabling, and deleting backup jobs. | ||
Allows you to specify a local backup server for a backup job. If two local backup servers are specified, the failover mechanism is supported. | ||
Allows you to specify a remote backup server for a backup job. Only one remote backup server is supported. Supported types: Remote Backup and Alibaba Cloud Backup. | ||
Allows you to set a network QoS and disk QoS for VM/volume backup jobs. | ||
Allows you to back up a VM instance with its attached volumes. | ||
Allows you to set a backup mode for a VM instance/volume backup job (incremental backup + default full backup, incremental backup + custom full backup, full backup policy). | ||
Allows you to specify a backup mode for a backup job of management node database (full backup mode). | ||
Supports backup immediately after the job creation (VM instances/volumes backup jobs only). | ||
Allows you to manually perform a backup job, providing convenience for backing up important operations at any time. | ||
Allows you to set a data retention policy for a backup job, including local retention policy (by count/by time) and remote retention policy (permanently/by count/by time). | ||
Allows you to manage the backup resource of a backup job, including associating, disassociating, and viewing monitoring data in real time. | ||
Allows you to set a time filter to view backup job records within the selected time period. | ||
Significantly improves large file backup performance by optimizing the large file backup mechanism, supporting both physical and virtual tape libraries (requires tape library to provide file system mounting software, such as LTFS). | ||
Local Backup Data | Allows you to view the local backup data of VM instances, volumes, and databases in a list format. | |
Allows you to view the backup data usage statistics of VM instances and volumes, including dependent incremental, incremental, and full. | ||
Allows you to recover the local backup data of VM instances/volumes to local. Supported recovery policy: New Resource and Overwrite Original Resource. | ||
Allows you to recover a VM instance with its attached volumes. (The local backup data of the VM instance needs to contain volume backup data.) | ||
Allows you to recover local backup data from management node database to local. | ||
Allows you to change the owner of the local backup data of a VM instance. | ||
Allows you to scan a local backup server, and displays local backup data of the management node database on the cloud platform. | ||
Allows you to export the local backup data of the management node database to the specified path of the local backup server, which is available for download. | ||
Allows you to delete the local backup data. | ||
Allows you to view the details of the VM/volume local backup data. | ||
Local Backup Server | Supports two types of addition: Existing Image Storage (ImageStore only) and Add Server. | |
Allows you to specify the backup network. In local backup scenarios, both data backup and recovery are implemented by using the backup network. | ||
Allows you to manage the lifecycle of local backup servers, such as creating, enabling, disabling, reconnecting, and deleting local backup servers. | ||
Allows you to scan a local backup server and display the local backup data record on the cloud platform. | ||
Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from the local backup server to free up the storage space. | ||
Allows you to update the password of the local backup server. | ||
Allows you to manage the backup data on local backup server, including VM instances, volumes, and the local backup data on database. | ||
Displays local backup server resource in a real time by using monitors, including capacity percent used, NIC, CPU, memory, and disk. | ||
Remote Backup Server | Allows you to add only one remote backup server. Supported types: Remote Backup and Alibaba Cloud Backup. | |
Allows you to manage the lifecycle of remote backup servers, such as adding, enabling, disabling, reconnecting, and deleting remote backup servers. | ||
Allows you to update the password of a remote backup server. | ||
Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from a remote backup server to free up the storage space. | ||
Allows you to manage the resources on a remote backup server, including backup data (VM instances, volumes, and the remote backup data on database) and zone. | ||
Remote Backup Data | Allows you to view the remote backup data of VM instances, volumes and management node database in a list format. | |
Allows you to synchronize the remote backup data of VM instances and volumes to a local backup server. | ||
Allows you to recover the remote backup data of VM instances/volumes to local. Note that the remote backup data needs to synchronize to local backup server first before recovering to local. | ||
Allows you to recover the remote backup data of management node database to local. | ||
Allows you to scan the remote backup server, and display remote backup data of the management node database on the cloud platform. | ||
Allows you to export the remote backup data of the management node database to the specified path of the remote backup server, which is available for download. | ||
Allows you to delete the remote backup data. | ||
Audit | Audits all of the backup service actions, which effectively ensures the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Continuous Data Protection (CDP) | CDP Dashboard | Displays the critical CDP information on different cards, including the number and status of CDP tasks and recovery tasks, the CPU and memory utilization of backup servers, top 5 backup server usage, the total disk I/O of backup servers, and unread alarm statistics in recent 7 days. |
CDP Task | Allows you to create CDP tasks to continuously back up your VM data to a specified backup server to achieve continuous data protection. | |
Allows you to create CDP tasks in bulk for multiple VM instances. One CDP task corresponds to one VM instance. | ||
Allows you to perform a full backup for VM instances without installing any third-party agent. | ||
Performs a full backup for VM instances immediately after you create CDP tasks. | ||
Supports second/minute-level RPO settings | ||
Recommends the desired capacity required by a CDP task based on an algorithm when you create a CDP task for the first time, helping you to plan the backup space reasonably. | ||
Supports multiple primary storage: The CDP service applies to VM instances in different primary storage scenarios, including LocalStorage, NFS, SharedBlock, and Ceph primary storage. | ||
Allows you to manage the lifecycle of CDP tasks, such as creating, enabling, disabling, and deleting CDP tasks. | ||
Allows you to modify the protection policy of a disabled CDP task, including the recovery point interval, backup aggregation frequency, recovery point retention policy, and the backup rate. | ||
Allows you to modify the task running policy to adjust the desired size and RPO policy for a CDP task. | ||
Allows you to view the creation progress of a CDP task. | ||
Provides CDP task resource alarms and event alarms and allows you to create these alarms. | ||
CDP Data | Allows you to back up CDP data on a local backup server. | |
Displays the CDP running status in charts and tables and allows you to view the details by specifying a time span. | ||
Displays hourly data changes so that you plan the backup capacity more reasonably. | ||
Provides a recovery point calendar, which identifies the dates with recovery points with colors and helps you to locate recovery points quickly. | ||
Allows you to lock recovery points. After a recovery point is locked, data of the recovery point will not be automatically cleared or deleted. | ||
Provides recovery point list and locked recovery point list and allows you to view the details by specifying a time span. | ||
Supports fast recovery based on selected recovery points (including locked recovery points). | ||
Supports instant recovery with a minimum RTO in seconds. | ||
Supports entire restoration and file-level restoration. | ||
Entire restoration allows you to restore data to the original VM instance or to a newly-created VM instance. | ||
Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. | ||
The newly created VM instance will quickly start up for business recovery. | ||
Restore data to the original VM instance: Allows you to create new volumes or overwrite current volumes. | ||
Create new volumes: Allows you to retain and attach volumes before the recovery to the original VM instance to ensure data security. | ||
Overwrite current volumes: Overwrites the original data in the VM instance and retain the snapshots in the current volumes. | ||
After the data restoration, the original VM instance will quickly start up for business recovery. | ||
File-level restoration allows you to retrieve files without restoring the system. Supported file format include picture, text, and PDF. | ||
Allows you to clear CDP data, which will delete all the CDP data of the VM instance, including the locked recovery points. The Cloud performs full backup for the VM instance the next time the CDP task is enabled. | ||
Recovery Task | Provides a list of recovery tasks, allowing you to view the recovery records and progress for later audits and traceback. | |
Allows you to restore data through a wizard-style process. | ||
Supports multiple primary storage: The CDP service applies to VM instances in different primary storage scenarios, including LocalStorage, NFS, SharedBlock, and Ceph primary storage. | ||
Supports instant recovery with a minimum RTO in seconds. | ||
Allows you to restore data to the original VM instance or to a newly-created VM instance. | ||
Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance. | ||
The newly created VM instance will quickly start up for business recovery. | ||
Restore to the original VM instance: Allows you to create new volumes or overwrite current volumes. | ||
Create new volumes: Allows you to retain and attach volumes before the recovery to the original VM instance to ensure data security | ||
Overwrite current volumes: Overwrites the original data in the VM instance and retain the snapshots in the current volumes. | ||
After the data restoration, the original VM instance will quickly start up for business recovery. | ||
Allows you to manage the lifecycle of recovery tasks, such as creating, enabling, disabling, and deleting recovery tasks. | ||
Allows you to redo a failed or canceled recovery task. | ||
Allows you to cancel a recovery task during the recovery progress. After a recovery task is canceled, intermediate data generated during the recovery process will not be retained. | ||
Local Backup Server | Allows you to back up CDP data on a local backup server. | |
Allows you to use the ImageStore deployed in your local data center as the local backup server, or deploy a new local backup server. | ||
Allows you to add multiple local backup servers. | ||
Allows you to view the CDP data saved to a local backup server on a local backup server details page. | ||
Audit | Audits all of the CDP actions, which effectively ensures the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Migration Service | V2V Migration (VMware → the Cloud) | Allows you to migrate VM instances from a taken-over vCenter to the Cloud. |
Supported vCenter versions: 5.5, 6.0, 6.5, 6.7, and 7.0. | ||
Supported vCenter VM operating systems: RHEL 4.x/5.x/6.x/7.x, CentOS 4.x/5.x/6.x/7.x, SLES 11/12/15, Ubuntu 12/14/16/18, and Windows 7/Server 2003 R2/Server 2008 R2/Server 2012 R2/Server 2016/Server 2019. | ||
Supported source primary storage: Unlimited. | ||
Supported destination primary storage: LocalStorage, NFS, Ceph, and Shared Block. | ||
Allows you to manage the lifecycle of V2V jobs, including creating, rebooting, and deleting V2V jobs. | ||
Allows you to create V2V jobs for VM instances in bulk. The Cloud supports one V2V job per source VM instance. | ||
Allows you to enable the compression mode as needed, which effectively compresses the migration data cache and improves the cache space utilization of the V2V conversion host. | ||
Allows you to customize the configurations of destination VM instances. | ||
Allows you to view progress bars of V2V jobs. | ||
Automatically installs Windows VirtIO drivers for Windows VM instances during the migration process, which improves the NIC and disk operating efficiency. | ||
V2V Migration (KVM → the Cloud) | Allows you to migrate VM instances from a KVM platform to the Cloud. | |
Allows you to migrate running or paused VM instances. | ||
Supported source primary storage: Unlimited. | ||
Supported destination primary storage: LocalStorage, NFS, Ceph, and Shared Block. | ||
If the source primary storage or the destination primary storage is a Ceph storage, make sure that the libvirt is of 1.2.16 or above version, and QEMU version is of 1.1 or above version before you perform the V2V migration. If neither the source primary storage nor the destination primary storage is a Ceph storage, make sure that the libvirt is of 1.2.9 or above version, and QEMU is of 1.1 or above version before you perform the V2V migration. | ||
Allows you to manage the lifecycle of V2V jobs, including creating, rebooting, and deleting V2V jobs. | ||
Allows you to create V2V jobs for VM instances in bulk. The Cloud supports one V2V job per source VM instance. | ||
Allows you to enable the compression mode as needed, which effectively compresses the migration data cache and improves the cache space utilization of the V2V conversion host. | ||
Allows you to customize the configurations of destination VM instances. | ||
Allows you to view progress bars of V2V jobs. | ||
V2V Conversion Host | Allows you to specify a host in the destination cluster as a V2V conversion host. The migration data is firstly cached in the V2V conversion host and then migrated to the destination primary storage. | |
Allows you to attach data volumes to a V2V conversion host, so that you can cache data to your local disk or data volume as needed. | ||
Allows you to manage the lifecycle of V2V conversion hosts, such as adding, enabling, disabling, and deleting V2V conversion hosts. | ||
Make sure that the type of the V2V conversion host is consistent with that of the source platform. | ||
The state of a V2V conversion host is decoupled from that of the host added as the V2V conversion host. When the V2V conversion host is enabled but the host is disabled, the V2V conversion host is used exclusively for V2V migrations, and other VM instances will not be dispatched to this host. This improves the migration efficiency. | ||
Allows you to set an independent migration network and network QoS to control transmission bottleneck and improve the migration efficiency. | ||
Monitors and displays the capacity usage of V2V conversion hosts. | ||
Audit | Audits all of the V2V actions, which effectively ensures the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Baremetal Management | Baremetal Cluster | Provides independent cluster management for baremetal chassis. |
Allows you to manage the lifecycle of baremetal clusters, such as creating, enabling, disabling, and deleting baremetal clusters. | ||
Allows you to attach/detach a deployment server to/from a baremetal cluster. | ||
Allows you to attach/detach L2 networks to/from a baremetal cluster. | ||
Allows you to centrally manage the resources associated with a baremetal cluster, such as the deployment server, baremetal chassis, and L2 networks. | ||
Deployment Server | Allows you to specify an independent server as the deployment server to provide PXE services and console proxies for baremetal chassis. | |
Allows you to manage the lifecycle of deployment servers, such as creating, enabling, disabling, reconnecting, and deleting deployment servers. | ||
Allows you to attach/detach baremetal clusters to/from a deployment server. | ||
Baremetal Chassis | Allows you to create baremetal instances based on baremetal chassis, which can be uniquely identified by their BMC interfaces and IPMI configurations. | |
Supports two types of addition: manual addition and template import. You can add up to 500 baremetal chassis at a time. | ||
Allows you to manage the lifecycle of baremetal chassis, such as adding, enabling, disabling, powering on, powering off, rebooting, and deleting baremetal chassis. | ||
Allows you to automatically or manually obtain the hardware information of a baremetal chassis. | ||
Allows you to launch the console of a baremetal chassis and jump to its IPMI management page. | ||
Allows you to view the hardware configuration of a baremetal chassis in a list format. | ||
Preconfigured Template | Quickly generates preconfigured files to achieve unattended bulk installation of baremetal instance operating systems. | |
Divides preconfigured templates into system templates and custom templates based on how the preconfigured template is created. | ||
System templates are provided by the Cloud, which include the basic system variables and can be applied to simple unattended deployment scenarios. | ||
Custom templates are generated from the uploaded custom template files (in the UTF8 format), which include custom variables in addition to the basic system variables, and can be applied to complex unattended deployment scenarios. | ||
Supports the following operating systems: the custom OSs of the Cloud, mainstream Linux OSs (RHEL/CentOS series, Debian/Ubuntu series, and SUSE/openSUSE series), and other OSs. | ||
Supports the following types of template: kickstart (applies to the custom OSs of the Cloud, and RHEL/CentOS OSs), preseed (applies to Debian/Ubuntu OSs), and autoyast (applies to SUSE/openSUSE OSs). | ||
Allows you to manage the lifecycle of custom templates, such as adding, enabling, disabling, and deleting custom templates. | ||
Allows you to download a preconfigured template. | ||
Allows you to view the details of a preconfigured template. | ||
Baremetal Instance | Created based on baremetal chassis as virtual instances of the baremetal chassis. You can add up to 50 baremetal instances at a time. | |
Allows you to select images (in ISO format and are not live CDs) to deploy operating systems for baremetal instances. | ||
Allows you to achieve unattended bulk installation of baremetal instance operating systems with preconfigured files generated from the preconfigured templates. | ||
Allows you to configure business networks for a baremetal instance. Supports the following networks: flat network and public network. Supports the following network devices: NICs and NIC bonds. | ||
Allows you to manage the lifecycle of baremetal instances, such as creating, starting, stopping, rebooting, deleting, recovering, and expunging baremetal instances. | ||
Allows you to launch the console of a baremetal instance. | ||
Allows you to customize tags for baremetal instances so that you can locate them quickly. | ||
Supports internal monitoring: displays the baremetal instance data such as CPU, memory, disk I/O, disk size, and NIC I/O. An agent is required for internal monitoring. | ||
Allows you to centrally view the resources associated with a baremetal instance, such as NICs and disks. | ||
Audit | Audits all of the baremetal management actions, which effectively ensure the security of the cloud environment. |
Type | Resource | Description |
---|---|---|
Elastic Baremetal Management | Quick Start Wizard | Visualizes and displays the logical architecture of elastic baremetal management feature, guiding you to quickly use the elastic baremetal management. |
Provides five quick start steps, including Preparation → Provision Network → Elastic Baremetal Cluster → Gateway Node → Baremetal Node. After finishing the quick start wizard, you can create elastic baremetal instances. For ZStack Ceph Enterprise, you need to make sure that the configuration is correct before creating elastic baremetal instances. | ||
Provision Network | Specifies a dedicated network for PXE processes and image downloading when elastic baremetal instances are created. | |
Supported network type: IPv4. | ||
Allows you to manage the lifecycle of provision networks, such as creating and deleting provision networks. | ||
Allows you to view the associated elastic baremetal clusters. | ||
Elastic Baremetal Cluster | Provides independent cluster managements for baremetal nodes. | |
Allows you to set the CPU architecture of an elastic baremetal cluster, including x86_64 and aarch64. | ||
Allows you to manage the lifecycle of elastic baremetal clusters, such as creating, enabling, disabling, and deleting elastic baremetal clusters. | ||
Allows you to attach/detach an L2 network of the NoVLAN/VLAN type to/from an elastic baremetal cluster. | ||
Allows you to change provision network for an elastic baremetal cluster. | ||
Allows you to attach/detach primary storage of the Ceph/Shared Block/Vhost type to/from an elastic baremetal cluster. | ||
Allows you to centrally manage resources associated with an elastic baremetal cluster, including gateway node, baremetal node, primary storage, iSCSI storage, and L2 network. | ||
Gateway Node | Forwards traffics of the Cloud and elastic baremetal instances. | |
Allows you to manage the lifecycle of gateway nodes, such as adding, enabling, reconnecting, and deleting gateway nodes. | ||
Allows you to change the password of a gateway node. | ||
Allows you to change elastic baremetal cluster of a gateway node. | ||
Monitors and displays gateway node metrics such as NIC, CPU, and memory. | ||
Allows you to centrally manage elastic baremetal instances associated with a gateway node. | ||
Baremetal Node | A baremetal node is used to create elastic baremetal instances and is universally identified by its BMC interface and IPMI configurations. | |
Supports two types of addition: custom and template import. You can add up to 500 baremetal nodes at a time. (You can modify the maximum number of bulk addition in global setting.) | ||
Allows you to set the CPU architecture of a baremetal node, including x86_64 and aarch64. | ||
Allows you to set the start method of a baremetal node, including volume and local disk (non take-over/take-over). | ||
Allows you to manage the lifecycle of baremetal nodes, such as adding, enabling, disabling, powering on, powering off, rebooting, and deleting baremetal nodes. | ||
Allows you to automatically or manually obtain the hardware information of a baremetal node. | ||
Allows you to modify the IPMI info when the power supply of the baremetal node is in Unknown state. | ||
Allows you to launch the console of a baremetal node and jump to its IPMI management page. | ||
Allows you to view the hardware information of baremetal nodes in a list format. | ||
Elastic Baremetal Offering | An elastic baremetal offering defines the number of vCPU cores, memory size, CPU architecture, CPU model, and other configuration settings of elastic baremetal instances. You can use an elastic baremetal offering to create an elastic baremetal instance. | |
Allows you to obtain an elastic baremetal offering by obtaining the hardware information of baremetal nodes. | ||
Allows you manage the lifecycle of elastic baremetal offerings, such as enabling and disabling elastic baremetal offerings. | ||
Allows you to set the sharing mode of an elastic baremetal offering, including share globally, share to specified projects or accounts, and not share. | ||
Allows you to centrally manage the baremetal nodes associated with an elastic baremetal offering. | ||
Elastic Baremetal Instance | Comparable to instances virtualized through physical servers in performance, leverages resource scalability in the Cloud to achieve flexible applications and on-demand usages. | |
Supports two types of creation: add by baremetal node and add by baremetal offering. | ||
Allows you to power off to release baremetal node. When elastic baremetal instances are stopped, baremetal nodes will be automatically released to avoid idle resources (only elastic baremetal instances added by elastic baremetal offerings and baremetal nodes that start on volume). | ||
Allows you to specify the storage allocation policy of an elastic baremetal instance, including system allocation and custom (only elastic baremetal instances added by elastic baremetal offerings and baremetal nodes that start on volume). | ||
Allows you to select an image to install the operating system for an elastic baremetal instance. Supported operating systems: x86 Windows (2012/2016/2019/10), x86 Linux (CentOS 7/8, Ubuntu 18 LTS/20 LTS), and ARM Linux (CentOS 7/Kylin V10) (only elastic baremetal instances added by elastic baremetal offerings and baremetal nodes that start on volume/non take-over local disk). | ||
Allows you to specify the gateway node allocation policy, including LeastBmPreferredGatewayAllocationStrategy, Last Gateway Node, and Random. You can select a gateway node as the first assigned gateway node for an elastic baremetal instance. | ||
Allows you to manage the lifecycle of elastic baremetal instances, such as creating, starting, stopping, rebooting, powering off, deleting, recovering, and expunging elastic baremetal instances. | ||
Allows you to automatically or manually obtain the status of an elastic baremetal instance. | ||
Allows you to launch the console of a running elastic baremetal instance (agent required). | ||
Allows you to customize tags for elastic baremetal instances so that you can locate them quickly. | ||
Allows you to attach/detach a volume to/from an elastic baremetal instance (agent required). | ||
Allows you to attach/detach a block storage volume to/from an elastic baremetal instance (agent required). | ||
Allows you to change system of an elastic baremetal instance. | ||
Allows you to change the password of an elastic baremetal instance (agent required). | ||
Allows you to create an image for an elastic baremetal instance (only elastic baremetal instances that start on volume). | ||
Allows you to create a single snapshot for an elastic baremetal instance (only elastic baremetal instances that start on volume). | ||
Monitors and displays elastic baremetal instance metrics such as CPU, memory, disk, disk capacity, and NIC (agent required). | ||
Allows you to configure business networks for elastic baremetal instances. Supported business network: flat network, public network, and VPC network. Supported network device: NIC and NIC Bond. | ||
Allows you to centrally manage resources associated with elastic baremetal instance, including volume, NIC (provision NIC and business NIC), and local disk. | ||
Audit | Audits all of the elastic baremetal management actions, which effectively ensure the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Hybrid Cloud Management | Sync Data | Allows you to synchronize Alibaba Cloud resources from added regions and zones to local, such as ECS instances, disks, VPCs, vSwitches, security groups, images, EIPs, VPNs, virtual border routers, and router interfaces. |
Supports automatic and manual data synchronizations. Automatic synchronizations occur when regions or zones are newly added to local. | ||
Quick Start Wizard | Visualizes the logical architecture of Hybrid Cloud Management, guiding you to use Hybrid Cloud Management quickly. | |
Provides three quick start steps: Create ECS Instance, Establish VPN Connection, and Create Alibaba Cloud Express Connect. | ||
ECS Instance | ECS is Elastic Compute Service provided by Alibaba Cloud. | |
Allows you to manage the lifcycle of an ECS instance, such as creating, starting, stopping, rebooting, and deleting an ECS instance. | ||
Allows you to launch the console of an ECS instance and modify the console password as needed. | ||
Allows you to modify the system user password of an ECS instance. The new password takes effect after you reboot the ECS instance. | ||
Allows you to centrally manage disks attached to an ECS instance. | ||
Disk | Alibaba Cloud disks that provide extended storage spaces for ECS instances. | |
Supports two types of disks: ultra cloud disks and SSD disks. | ||
Allows you to manage the lifecycle of a disk, such as creating and deleting a disk. | ||
Allows you to attach/detach disks to/from ECS instances. | ||
Allows you to set whether to delete a disk simultaneously when you delete the ECS instance it attached to. | ||
Image | Alibaba Cloud images that provide template files to create ECS instances. | |
Divides images into two types according to their origins: Alibaba Cloud images and custom images. Alibaba Cloud images are synchronized from Alibaba Cloud to local. Custom images are created locally and uploaded to Alibaba Cloud through buckets in corresponding regions. | ||
Allows you to choose the format of uploaded local images in Hybrid Cloud Settings. Valid values: .qcow2 and .raw. | ||
Displays the upload progress of local images. | ||
Allows you to delete images. | ||
VPC | Provides 3 CIDRs for you to create VPCs (Alibaba virtual private clouds) dedicated for ECS instances: 192.168.0.0/16, 172.160.0.0/12, and 10.0.0.0/8 | |
Allows you to manage the lifecycle of a VPC, such as creating and deleting a VPC. | ||
Allows you to create VPN connections and express connects based on VPCs. | ||
Allows you to centrally manage associated resources of a VPC, such as vSwitches, vRouters, security groups, and VPN gateways. | ||
Allows you to manage the lifecycle of a vSwitch, such as creating and deleting a vSwitch. | ||
Allows you centrally manage the ECS instances associated with a vSwitch. | ||
Allows you to add/delete route entries to/from vRouters. | ||
Provides three next hop options for route entries: hop to route interface, hop to ECS instance, and hop to VPN gateway. | ||
VPN | An IPsec tunnel created between a VPN gateway and a VPN customer gateway that enables communications between local private networks and VPC networks on Alibaba Cloud. | |
A VPN gateway is a network connection service provided by Alibaba Cloud. You need to purchase it on Alibaba Cloud Console before you can use it. | ||
Allows you to delete a VPN gateway from local without influencing the corresponding actual resource on Alibaba Cloud. | ||
Allows you to centrally manage the VPN connections based on a VPN gateway. | ||
A VPN customer gateway provides services for the local data center. | ||
Allows you to manage the lifecycle of a VPN customer gateway, such as creating and deleting a VPN customer gateway. | ||
Allows you to centrally manage the VPN connections based on a VPN customer gateway. | ||
Allows you to establish a VPN connection between a VPN gateway and a VPN customer gateway to enable encrypted communications between the local data center and Alibaba Cloud. | ||
Provides three entries for you to create VPN connections: from Quick Start Wizard, from a VPC action list, and on the VPN Connection page. | ||
Allows you attach multiple local VPC networks to a VPN connection. | ||
Supports NAT Traversal that ensures normal data transmissions even though a NAT device exists between the local data center and Alibaba Cloud. | ||
Express Connect | A physical circuit to connect the local data center and the access point of Alibaba Cloud that ensures fast, stable and secure communications between local private networks and Alibaba Cloud VPCs. | |
Provides 2 creation entries for express connect: from Quick Start Wizard and on a VPC action list. | ||
Allows you to centrally manage resources used for express connects, such as router interfaces and virtual border routers. | ||
Allows you to add router interfaces to virtual border routers and VPC vRouters for message forwards. | ||
Allows you to specify regions to synchronize virtual border routers to local. | ||
Allows you to add/delete route entries to/from a virtual border router. | ||
Provides four next hop options for route entries: hop to ECS instance, hop to router interface, hop to VPN gateway, and hop to physical connection interface. | ||
Allows you to modify the interconnection address of a virtual border router. | ||
Security Group | Alibaba Cloud security groups that provide security control services for ECS instances on the L3 network layer. | |
Provides four initial rule options for security groups: Prohibit All (Default), Allow All, Disable Some Vulnerable Ports, and Allow Commonly Used Ports. | ||
Allows you to manage the lifecycle of a security group, such as creating and deleting a security group. | ||
Allows you to add/delete ingress or egress rules to/from a security group. | ||
Provides two authorization policy options for ingress/egress rules: Accept and Reject. | ||
Provides five protocol options for ingress/egress rules: ALL, TCP, UDP, ICMP, and GRE. | ||
Allows you to set priorities for ingress/egress rules. The rule with the highest priority takes effect when you set multiple rules on a same object. | ||
EIP | Elastic IP addresses (EIP) in Alibaba Cloud public networks that enable ECS instances to access public networks. | |
Allows you manage the lifecycle of an EIP, such as creating and deleting an EIP. | ||
Allows you to attach/detach EIPs to/from ECS instances. | ||
Alibaba Cloud NAS | Integrates Alibaba Cloud NAS to provide file systems as backend storage systems for AliyunNAS primary storage. | |
Supports two methods to add NAS file systems: add an existing file system deployed on Alibaba Cloud, or create a new file system. | ||
NAS files systems supports two storage types: Performance and Capacity. | ||
NAS file systems supports two protocol types: NFS and SMB. | ||
Allows you to manage the lifecycle of an NAS file system, such as creating and deleting a file system. | ||
Allows you to create permission groups to limit accesses to a file systems. | ||
Permission groups support allowlist mechanisms, allowing you to add rules to allow specified IP addresses and CIDRs to access the file system. | ||
Supports two methods to create permission groups: add an existing permission group on Alibaba Cloud, or create a new permission group. | ||
Allows you to add/delete rules to/from a permission group. | ||
Allows you to set the permission range when you create a permission group rule, enabling an authentication objects to only read from the file system (RDONLY), or read from as well as write in the file system (RDWR). | ||
Allows you to set priorities for permission group rules. The rule with the highest priority takes effect when you set multiple rules on a same authentication object. | ||
Allows you to create an AliyunNAS primary storage based on a file system and permission groups. | ||
AliyunNAS primary storage supports image storage: ImageStorage image storage. | ||
Allows you to manage the lifecycle of an AliyunNAS primary storage, such as adding, enabling, disabling, reconnecting, deleting an AliyunNAS primary storage or making it enter the maintenance mode. | ||
Allows you to centrally manage the resources associated with an AliyunNAS primary storage, such as VM instance, volumes, and clusters. | ||
Allows you to clean up garbage data of an AliyunNAS at a specified interval. You can modify the interval in Hybrid Cloud Settings. | ||
Monitors and displays the percentage of used capacity of an AliyunNAS primary storage. | ||
Alibaba Cloud EBS | Integrates Alibaba Cloud EBS to serve as a local primary storage type, AliyunEBS. | |
AliyunEBS primary storage supports image storage: AliyunEBS image storage. | ||
Allows you to manage the lifecycle of an AliyunEBS primary storage, such as adding, enabling, disabling, reconnecting, and deleting an AliyunEBS primary storage or making it enter the maintenance mode. | ||
Allows you to centrally manage the resources associated with an AliyunEBS primary storage, such as VM instances, volumes, and clusters. | ||
Monitors and displays the percentage of used capacity of an AliyunEBS primary storage. | ||
Allows you to clean up garbage data of an AliyunEBS at a specified interval. You can modify the interval in Hybrid Cloud Settings. | ||
Integrates Alibaba Cloud Object Storage Service (OSS) to serve as a local image storage type, AliyunEBS. | ||
AliyunEBS image storage supports primary storage: AliyunEBS primary storage. | ||
Allows you to set a dedicated data network for an AliyunEBS image storage to improve the data transmission efficiency between compute nodes and the image storage. | ||
Allows you to manage the lifecycle of an AliyunEBS image storage, such as adding, enabling, disabling, reconnecting, and deleting an AliyunEBS image storage. | ||
Allows you to centrally manage the images in an AliyunEBS image storage. | ||
Monitors and displays the percentage of used capacity of an AliyunEBS image storage. | ||
Region | Allows you to add Alibaba Cloud regions can be accessed by your AccessKey. The zones and resources in the regions can be synchronized to local. | |
Supports two types of regions: Alibaba Cloud regions and Private Alibaba Cloud regions. | ||
Divides Private Alibaba Cloud regions into two types: AliyunNAS region and AliyunEBS region. | ||
Allows you to centrally manage the zones and buckets in a region. | ||
Allows you to use a bucket to transfer a local image to Alibaba Cloud. | ||
Supports two methods to add buckets: add an available bucket existing in the region, or create a new bucket. | ||
Allows you to manage the lifecycle of a bucket, such as adding and deleting a bucket. | ||
Allows you to set a bucket as the default bucket for the image upload. Allows you to cancel the default state of a bucket. | ||
Allows you to delete a region from local without influencing the corresponding actual resource on Alibaba Cloud. | ||
Zone | Allows you to synchronize zones in a region you added, or manually add zones that can be accessed by your AccessKey. Resources in an added zone can be synchronized to local. | |
Allows you to centrally manage the resources associated with a zone, such as vSwithes and ECS instances. | ||
Allows you to delete a zone from local without influencing the corresponding actual resource on Alibaba Cloud. | ||
AccessKey Management | An identity credential that has access to APIs of Alibaba Cloud or Private Alibaba Cloud, thus enabling you to use relevant Cloud services. | |
Supports two types of AccessKeys: Alibaba Cloud AccessKeys and Private Alibaba Cloud AccessKeys. | ||
Divides Private Alibaba Cloud AccessKeys into two types: AliyunNAS AccessKey and AliyunEBS AccessKey. | ||
Allows you to manage the lifecycle of an AccessKey, such as adding and deleting an AccessKey. | ||
Allows you to set an AccessKey as default to call APIs of Alibaba Cloud or Private Alibaba Cloud. Allows you to cancel the default state of an AccessKey. | ||
Displays the basic information of an AccessKey, which helps in the user management. | ||
Hybrid Cloud Settings | Allows you to configure settings that take effect on the whole platform. | |
Supports quick search and directory navigation to help you quickly locate target items. | ||
Allows you to modify settings of a single item in Hybrid Cloud Settings. | ||
Audit | Audits all of the Hybrid Cloud Management actions, which effectively ensure the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Cryptography Security Compliance | 3rd-Party Cryptographic Service | Allows you to add a 3rd-party cryptographic platform to provide external cryptographic services, such as signature and encryption. |
Allows you to manage the lifecycle of 3rd-party cryptographic services, such as adding and deleting 3rd-party cryptographic services. | ||
Supports following 3rd-party cryptographic service platforms: Haitai Service Platform, Aisino Service Platform, and China Telecom Quantum Technology Service Platform. | ||
Provides event alarms for status metrics of the 3rd-party cryptographic service. | ||
HSM Pool | An HSM pool is a logical group of hardware security modules (HSMs) and is used to provide unified cryptography services such as signature validation and encryption. | |
Allows you to manage the lifecycle of HSM pools, such as creating and deleting HSM pools. | ||
Supports two HSM Type: Cryptographic Server and Signature Verification Server. | ||
Supports one Cryptographic server model: FLKSEC | ||
Supports 5 signature verification server model: FLKSEC, Netsign, Jit, Fisec, and Sansec. | ||
HSM | Allows you to manage the lifecycle of HSMs, such as adding, enabling, disabling, and deleting HSMs. | |
Provides event alarms for state and status metrics of the HSM. | ||
Platform Cryptography Security Compliance | Provides certificate login and data protection by using hardware security modules (HSMs) that are tested and certified by the State Cryptography Administration. The Cloud manages these HSMs by using HSM pools and therefore can provide the certificate login and data protection services in a unified way. | |
Allows you to enable both Certificate Login and Data Protection for the Cloud or enable either one separately. | ||
Allows you to view the enabling progress in a visualized way. | ||
Certificate Login | The certificate login feature is implemented based on the SM2 algorithm. After this feature is enabled, UKey authentication is required during login, which helps to ensure the identity authenticity. | |
Allows you to enable certificate login for admin or tenants (Tenant Management Plus License is required). | ||
Data Protection | The data protection feature is implemented based on the SM3, HMAC-SM3 and SM4 algorithms. After this feature is enabled, important data such as logs, passwords, and images can be encrypted and protected. This helps to ensure the data confidentiality and integrity. | |
Allows you to customize a protection scope for log data. You can choose to protect logs produced in the last 30, 60, 90, or 180 days, or protect all log data. | ||
Audit | Audits all of the Cryptography Security Compliance actions, which effectively ensures the security of the cloud environment. |
Type | Features | Description |
---|---|---|
Container Management | Install Container Management | Allows you to quickly install the container management service through Container Management automatically appears in the main menu of the Cloud. You can enter the submenu to use container services conveniently. | . After installation, a submenu
Use Container Management | Provides rich container services such as resource overview, container orchestration, artifact repositories, container O&M , DevOps, container cluster management, and container service configuration. For more information, see Container Management Features |
Back to Top
Email Us
contact@zstack.ioEmail Us
contact@zstack.ioEmail Us
contact@zstack.ioThe download link is sent to your email address.
If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.Thank you for using ZStack products and services.
Submit successfully.
We'll connect soon.Thank you for using ZStack products and services.