A cloud host is a complete system formed by a set of files. It has CPUs, memory, network, and storage resources, and even the BIOS. Therefore, operating systems and programs run in the same way on a cloud host as they run on a physical PC. Through cloud services, such as security group, hard disk, AZ, and key pair, cloud hosts can provide users with a secure and highly efficient compute environment.
Compared with traditional virtualization platforms, the cloud host service focuses more on resource delivery as services, allowing users to obtain computing resources on demand.
High flexibility—Adjusts cloud host resource flavors flexibly to meet changing specification requirements of different cloud hosts.
Improved security—Combines security services provided by UIS Cloud with the cloud host service to provide various security protections (such as access control) for cloud hosts.
Ease of use—Allows users to configure all CPU, memory, and image parameters through the configuration wizard to fast create required cloud hosts.
An image is a cloud host template that contains an OS and basic cloud host settings. Images include public and private images.
Image type |
Description |
Public |
A public image can be created by a cloud administrator and is available to all users. |
Private |
A private image can be created by an organization administrator or cloud administrator. A private image created by an organization administrator is available only to users in the organization, and a private image created by a cloud administrator is available only to the cloud administrator. |
A security group is a logical group of cloud hosts that trust one another and have the same security requirements. You can configure access control rules to filter incoming and outgoing traffic for cloud hosts in a security group. A security group uses the whitelisting mechanism, which means it permits only traffic that matches its rules. For example, you can configure access control rules to permit ping messages, UDP traffic, or SSH access to DNS servers on cloud hosts.
For more information, see security groups in Network and Security.
A key pair contains a public key and a private key used in key authentication for remote access to a cloud host. UIS Cloud supports only SSH-RSA key algorithm.
UIS Cloud saves and manages only public keys, and private keys are saved and managed by users.
Each QoS policy contains a bandwidth limit rule. UIS Cloud supports binding QoS policies to cloud hosts to control cloud host bandwidth, improving bandwidth efficiency.
The system creates a virtual NIC (vNIC) for each cloud host after host creation by using the specified network for the host. You can bind multiple NICs to one cloud host if the host requires multiple network interfaces or multiple interfaces of one network. This provides the following benefits:
Fast fault migration—Enables the system to assign the vNIC of a failed cloud host to a backup cloud host, ensuring fast service recovery.
Fine-grained network management—Enables service network isolation by assigning different private networks to vNICs of one cloud host, and allows strict traffic access per NIC by configuring on-demand security group settings to different NICs.
A snapshot records the system disk data and state of a host at the time when the snapshot is created, through which you can recreate the cloud host at that time. Operations executed on the cloud host do not affect host snapshots created before.
Table-2 Relationship between cloud host and the other cloud services
Service |
Relationship with cloud host |
Networks |
Provides secure and flexible private networks for cloud hosts. |
Images |
Provides public images and private images as OSs for cloud hosts. You can convert a snapshot into an image. |
Security groups |
Provides group-based access control for cloud hosts. |
Key pairs |
Provides public and private keys for cloud host login authentication. |
QoS |
Provides bandwidth control for cloud hosts. |
vNICs |
Allows cloud hosts to communicate with the network. The system creates a NIC for each cloud host at cloud host creation. You can create custom NICs and bind the NICs to cloud hosts. |
Hard disks |
Provides data disks for cloud hosts. |
Snapshots |
Records system disk data and state of a cloud host at a specific time. You can convert a snapshot to an image. |
UIS Cloud supports the following virtualization platforms:
H3C UIS Manager
H3C CAS
VMware