About cloud hosts

A cloud host is a complete system formed by a set of files. It has CPUs, memory, network, and storage resources, and even the BIOS. Therefore, operating systems and programs run in the same way on a cloud host as they run on a physical PC. Through cloud services, such as security group, hard disk, AZ, and key pair, cloud hosts can provide users with a secure and highly efficient compute environment.

Compared with traditional virtualization platforms, the cloud host service focuses more on resource delivery as services, allowing users to obtain computing resources on demand.

Benefits

Concepts

Images

An image is a cloud host template that contains an OS and basic cloud host settings. Images include public and private images.

Table-1 Image types

Image type

Description

Public

A public image can be created by a cloud administrator and is available to all users.

Private

A private image can be created by an organization administrator or cloud administrator. A private image created by an organization administrator is available only to users in the organization, and a private image created by a cloud administrator is available only to the cloud administrator.

 

Security groups

A security group is a logical group of cloud hosts that trust one another and have the same security requirements. You can configure access control rules to filter incoming and outgoing traffic for cloud hosts in a security group. A security group uses the whitelisting mechanism, which means it permits only traffic that matches its rules. For example, you can configure access control rules to permit ping messages, UDP traffic, or SSH access to DNS servers on cloud hosts.

For more information, see security groups in Network and Security.

Key pairs

A key pair contains a public key and a private key used in key authentication for remote access to a cloud host. UIS Cloud supports only SSH-RSA key algorithm.

UIS Cloud saves and manages only public keys, and private keys are saved and managed by users.

QoS

Each QoS policy contains a bandwidth limit rule. UIS Cloud supports binding QoS policies to cloud hosts to control cloud host bandwidth, improving bandwidth efficiency.

vNICs

The system creates a virtual NIC (vNIC) for each cloud host after host creation by using the specified network for the host. You can bind multiple NICs to one cloud host if the host requires multiple network interfaces or multiple interfaces of one network. This provides the following benefits:

Snapshots

A snapshot records the system disk data and state of a host at the time when the snapshot is created, through which you can recreate the cloud host at that time. Operations executed on the cloud host do not affect host snapshots created before.

Relationship with other cloud services

Table-2 Relationship between cloud host and the other cloud services

Service

Relationship with cloud host

Networks

Provides secure and flexible private networks for cloud hosts.

Images

Provides public images and private images as OSs for cloud hosts. You can convert a snapshot into an image.

Security groups

Provides group-based access control for cloud hosts.

Key pairs

Provides public and private keys for cloud host login authentication.

QoS

Provides bandwidth control for cloud hosts.

vNICs

Allows cloud hosts to communicate with the network. The system creates a NIC for each cloud host at cloud host creation. You can create custom NICs and bind the NICs to cloud hosts.

Hard disks

Provides data disks for cloud hosts.

Snapshots

Records system disk data and state of a cloud host at a specific time. You can convert a snapshot to an image.

 

Restrictions and guidelines

Virtualization platforms

UIS Cloud supports the following virtualization platforms:

Key authentication

Key authentication is available only for Linux cloud hosts.